IP security solutions
VIVOTEK, globally renowned IP surveillance solution provider, and CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, has announced they have entered into a strategic partnership, which will integrate CyberLink’s FaceMe AI facial recognition engine into VIVOTEK’s IP surveillance solutions. The initial collaboration will be showcased in VIVOTEK’s booth (#SAD37) at Intersec 2020 in Dubai, United Arab Emirates. VIVOTEK – CyberLink IP partne...
Pelco’s Sarix Enhanced 3 cameras are designed to handle a broad range of lighting conditions while always delivering sharp footage. They also feature resolutions of up to 4K and true WDR as well as ultralow light performance and image stabilization capabilities. And with frame rates of up to 120 FPS at 1080p, the user also has the ability to slow down scenes of interest and capture detailed images in applications like traffic and gaming. This solution also comes with Pelco Smart Compressi...
Fujitsu Limited and Upstream Security, cutting-edge security solution provider for connected vehicles, have announced a partnership for vehicle cyber security. The companies will collaborate in the development of security operations solutions for connected vehicles. Vehicle security As more vehicles are connected to the network, they are increasingly prone to the growing risk of cyber-attacks. International and domestic committees such as UNECE/WP.29 (The UNECE World Forum for Harmonization of...
Infusion Direct Marketing, a public relations firm specializing in the security industry, announced that the company has kicked off 2020 with a new sales representative agreement in the Florida territory with Security Network Associates (SNA) of Colorado. In this new sales role, Infusion Direct will be responsible for supporting SNA’s sales efforts for IPVideo Corporation’s HALO IOT Smart Sensor in the state of Florida. HALO has taken off this year in response to the nationwide youth...
VSS, a division of the BCD International brand of companies, specializes in offering video recording appliances via authorized security distributors. These are pre-engineered with Milestone XProtect video management software, built on the latest generation of Intel Xeon Scalable processors and Seagate Skyhawk surveillance-grade drives. VSS appliances also feature innovative and disruptive technology such as its Storage Accelerator, which significantly increases storage scalability, performance a...
Money may not buy happiness or peace of mind, but it can buy today’s high-tech home security systems that seem to deliver both to customers, according to the J.D. Power 2019 Home Security Satisfaction Study, which was released recently. The study expanded to include not only the professionally installed (Pro Install) home security systems but also do-it-yourself (DIY Install) systems. Rise of DIY home security systems The growth of the DIY home security market has fueled customer satisf...
Connected Technologies LLC, based out of Monument, Colorado, USA wants dealers to have it their way—so it’s changing the landscape of manufacturer support by providing additional customization services tailored to the security dealer. Knowing that one size does not fit all when it comes to project demands, the Connect ONE management interface in its original state is already highly customizable. Now, and because of popular demand, dealers can request additional integrations or capabilities — allowing them to meet the user’s challenges, expand their scope of projects and gain profitability in every market vertical. Integration with Connect ONE interface Integrators have many different business strategies, so we work to give them a unique offering specific to their goals" “When dealers have the opportunity to integrate other products and provide functions the user specifically requests it creates a stronger relationship between the dealer and their customers,” said Dan Simon, co-founder and managing partner of Connected Technologies and creator of the integrations. He adds, “Integrators have many different business strategies, so we work to give them a unique offering specific to their goals. We invite dealers to contact us with their challenges, so we can work together to design a solution through the Connect ONE interface. Our goal is to help dealers reach their highest potential.” Panic buttons and card readers Jeff Kesterson, owner of Nightwatch Security & Telephone LLC in Sedalia, Mo., had programming requests turn into actual features to solve customer problems. “In one application, we have multiple schools programmed so door alarms, panic buttons and card readers trigger on-screen alerts at selected locations, while simultaneously sending email and text messages with embedded video to security officers,” said Kesterson. He said security personnel wanted a better way to assess threats proactively so they could respond accordingly during emergencies. In another example, Connected Technologies developed a software integration to a 2N (an Axis Company) IP intercom and door entry system to permit management and control of the 500+ user population through Connect ONE. Force Security Solutions LLC, Washington, D.C., contacted Connected Technologies to see if the integration was possible—and the necessary capabilities were delivered in a minimal timeframe. Simple and intuitive application For Ryan Christen of Corbeck Technologies LLC, in Raleigh N.C., Connected Technologies customization has allowed the company to tailor its projects and meet new demands. “Whether it’s a commercial office, retail, storage, or multifamily development, the incredibly versatile Connect ONE has allowed me to gain the flexibility needed to confidently meet the demands of those development markets”. Ryan adds, “By customizing the customer’s Connect ONE interface to the user’s operational needs, it gives them a simple and intuitive application that they can tell was customized specifically for them. This is a big reason why we have the customer retention and growth that we do.” Technical and customer support Connect ONE platform offers a lot of flexibility so we can design a system that works for each customer" Having a manufacturer partner who has your back is rare in this day and age, but something dealers look for to add value to their business and a contracting edge with customers. “The Connect ONE platform offers a lot of flexibility so we can design a system that works for each customer,” said James Lee, president and partner at Alarmguard Security, Greensboro, N.C. “We rely on Connected Technologies for technical and customer support. We have requested software and feature upgrades for our customers and if it’s possible it happens within 24 hours. We use Connect ONE in our own business and the reporting features are outstanding.” Security software solutions For Phoenix Security Systems Inc., Philadelphia, a national accounts dealer with security, surveillance and access control customers in 40 states, manufacturer support is critical to staying competitive and profitable. “Connect ONE was paramount in allowing Phoenix to offer a service that is truly connected across platforms,” according to Eric Burroughs, vice president. Eric adds, “The Company is unique in the respect that they operate with software solutions that can be edited and modified — without having to wait years to get it. They were the first company I thought of when my security software vendor could not accomplish a special mobile app for our national accounts, and Connected Technologies delivered on this request as well.” It’s uncommon to find a manufacturer who will work directly with the security dealer to fully customize software to meet the needs of their business and challenges of the customer; with this type of collaboration comes a sharp competitive edge.
Discreetly place emergency calls at the touch of a button with reliable emergency communication provided at fingertips of users with the PB-3-IP Panic Button from Viking Electronics. “This is what people have been asking for – it’s quick, it’s discrete, it’s reliable. People know they can trust the PB-3-IP when it counts.” said Greg Yocom, Engineering Manager, Viking Electronics. PB-3-IP Panic Button The PB-3-IP is designed for VoIP SIP systems and is PoE powered. The panic button can be programmed using Viking’s IP Programming software and receives automatic firmware updates. The versatile PB-3-IP also features an on-board relay for activating security cameras, emergency lighting, or any other device triggered by a dry-contact.The panic button can be programmed using Viking’s IP Programming software and receives automatic firmware updates The PB-3-IP panic button is designed to mount under a desk or countertop and place discreet emergency phone calls when activated. A built-in auto dialer will roll through up to 5 phone numbers until the call is answered. Silent monitoring After answering, a prerecorded location announcement is delivered to the called party and one-way audio is sent from the PB-3-IP for silent monitoring. The called party can easily engage in two-way communication after the call is connected by pressing touch tone “#”. Viking Electronics engineers and manufactures over 500 security and communication products in the USA. Products include Emergency Phones, Entry Systems, Paging Interfaces, Mass Notification Systems, Hotline Phones, Autodialers, Enclosures and more. In addition to their extensive analog line, Viking offers a large selection of IP products that are SIP compliant. Enhanced weather protection Based in Hudson, Wisconsin, in USA, the company’s legacy is of reliability and electronic innovation that spans 50+ years. Viking builds products that are designed to last and they also offer many of their products with Enhanced Weather Protection. Offering free lifetime product support they also back their products with a two-year limited warranty.
Member companies and representatives of the Open Security & Safety Alliance (OSSA) will be present at the INTERSEC 2020 show in Dubai next month. OSSA – an industry body comprised of leaders, influencers and innovative organizations from all facets within the security, safety and surveillance space – formed to help the industry focus on creating new value by reducing market fragmentation and addressing common challenges. The aim is to bring together the industry to move forward together with one united, global approach to: Create harmony across security and safety solutions focused on common Operating Systems and Application Programming Interfaces (API); Drive the creation of one digital marketplace regardless of brand; Define hardware and software measures to increase the levels of data security and privacy protection across brands; Define specifications to ensure the right levels of performance OSSA Technology Stack specification In the first full year of existence, OSSA member companies by creating the first common Technology Stack specification In the first full year of existence, OSSA member companies achieved a major component of the organization’s vision by creating the first common Technology Stack specification including a vendor-agnostic Operating System (OS) hardened for the security and safety market. This first big step allows for installation and execution of third-party apps on video security devices. It enables app developers to develop one single software application that is suitable for all cameras leveraging OSSA’s Technology Stack, independent of brand. The next steps in early 2020 are firstly for the OSSA-driven digital marketplace to go live and secondly for camera manufacturers to introduce their first commercial versions of products leveraging OSSA’s Technology Stack. The marketplace will give integrators and users the ability to easily add customized functionality to their cameras and security systems by way of installing apps (already developed by the early adopters and available at the launch of the marketplace) on video security cameras. It’s expected additional app developers will soon contribute solutions downloadable across devices and brands. INTERSEC Dubai 2020 From INTERSEC, some OSSA member companies will showcase prototype cameras based on OSSA’s commonly defined Technology Stack. Visitors can learn more about the vision of OSSA, its progress and how involved companies are revolutionizing the market, by visiting the Hanwha Techwin booth and enquiring with one of the OSSA representatives.
Videx, globally renowned manufacturer and supplier of access control and door entry systems, has strengthened its presence in the international access market by launching a new web server access control system, WS4. WS4 web server access control The WS4 web server access control system can manage up to 20 entrances locally or remotely from anywhere via a mobile phone, tablet or PC using a web browser to connect to the system. Additionally an app is available for both iOS and Android. The WS4 can have up to 2,500 users and store up to 50,000 events which can also be viewed online or via the app. The system also has up to 250 programmable access levels to restrict access to certain days and times for users. Easy and flexible installation The WS4 is designed to ensure installation and use is extremely easy and flexible" Sian Luxton, Key Accounts Manager at Videx, said “The WS4 is designed to ensure installation and use is extremely easy and flexible. There’s no need for a dedicated computer or requirement to download specific software; it’s completely managed via the web server. Operators simply need to register online with their serial number to start using the system’s software application and get it up and running.” The heart of the system is the WS4 controller available in a one entrance, two entrance and four entrance control cabinet complete with battery backed power supply. The cabinet includes an Ethernet connection to connect to a LAN or the internet allowing programming and management to be carried out from anywhere. Remote access control and management Sian Luxton adds, “What’s extremely attractive about the WS4 is that full management of the system can be carried out remotely. This can include the adding and deleting of users, the changing of settings and the viewing of event logs. Up to 10 operators can be setup with different access rights." He gave an example saying, “An administrator/manager or an installer or monitoring facilities only. Additionally, the firmware of the devices can also be updated remotely”. Seamless integration with Mifare proximity readers Mifare proximity readers and coded access keypads connect to the control cabinet via an RS485 link further simplifying the installation. Readers are available as a standalone surface in the compact black finish of the mini range of readers and can also be integrated into door entry panels, both vandal resistant and modular. Sian added, “Email alerts to inform the administrator or engineer of certain situations such as mains failure, devices offline or doors left open can also be set up. These can be categorized specifically too, so that the right person is alerted to any issue. For instance, offline device alerts can be emailed to the engineer, and ‘door open too long’ events to the system manager. Additionally, a daily or weekly email can be scheduled to inform the administrator or engineer of the health of the system, all online and connected to the internet.”
Genea has announced that it has acquired cloud-based physical access control company, Sequr, Inc., thereby further expanding its portfolio of commercial real estate technology solutions. Submeter billing software solutions “Sequr is an ideal fit for us,” said Michael Wong, CEO of Genea. He stated, “Almost all of our customers who use our OTHVAC and/or submeter billing software solutions have been searching for help with access control. Similar to our other offerings, Sequr’s software typically integrates directly with properties’ existing hardware which allows for major enhancements in functionality of access control systems while being significantly more cost-effective than a complete rip and replace”. Sequr shares Genea’s philosophy of providing outstanding customer experiences to its clients" Michael adds,”Sequr also shares Genea’s philosophy of providing outstanding customer experiences to its clients. Adding the best cloud-based physical access control solution to our technology suite has been a priority for us and we have found the perfect complement.” On-premise access control software Sequr addresses the limitations and pain points related to using on-premise access control software with a cloud-based offering that improves convenience, transparency, security and safety. Their combination of enterprise-level security, management portal and limitless scalability means that customers can access features normally reserved for the Fortune 500 at an affordable price. Even more, Sequr turns everyone’s phones into their access card. No more retractable badges, no more getting locked out of the office. “Since its inception in 2014, Sequr was designed to automate physical access control to reduce the cost and time associated with managing access to your facilities,” said Mike Maxsenti, co-founder of Sequr. Cloud-based physical access control Mike further states, “When we evaluated strategic alternatives to accelerate our growth, Genea immediately stood out. Our similar customer-centric values and product alignment made us confident that this partnership would best position us as a leader in the fast-growing cloud-based physical access control market. The Genea team has earned the trust of its property management and engineering customers which make it an outstanding platform for Sequr.” This acquisition marks Genea’s second in less than a year. It acquired Moylan Energy Management, Inc. in July 2019.
Johnson Controls has announced the release of its new product offering, EntraPass v8.20 which will further simplifies how users remotely access the EntraPass go Mobile App. EntraPass v8.20 With EntraPass v8.20, EntraPass go Pass Mobile App users gain improved search capabilities and other efficient upgrades to deliver a remote and real-time access control solution. EntraPass go Pass requests will no longer be attached to a selected SmartLink, eliminating the need to configure every connection. Users will now be able to access any inbound connection with little to no obstacles. Enhanced users/card search functionality is also a significant enhancement to the EntraPass v8.20 Enhanced users/card search functionality is also a significant enhancement to the EntraPass v8.20. Users will be able to search for a profile, while keeping the search menu open, thereby eliminating the need to start each search fresh. This solves the previous pain point of having to reopen the search menu, if a user had clicked on the wrong profile. EntraPass Security Management Software The update also opens the EntraPass Security Management Software to macOS users. EntraPass v8.0 will be compatible with the High Sierra system or higher. Additionally, EntraPass v8.20 includes an ‘email’ field in the CSV report exports, which will be particularly beneficial for hattrix partners. This feature allows a manager to easily choose a set of accounts/owners and export email addresses, along with additional account statistics. Additional benefits of EntraPass v.8.20 with EntraPass go Pass Mobile App include the ability to view exacqVision video in hattrix, with seamless connection, easier configuration and no port forwarding. By enabling this feature within the server, the need for IT involvement is eliminated and customers will be able to connect their exacqVision NVR to the hattrix system.
It seems that only a few days pass between cyber security stories of concern to the public such as personal data leaks and DIY home camera hacks. With this in mind and the need for increased connectivity, the industry is in need for guidance in cyber security. 2020 is set to be a year of change for the physical security industry. Here are the top four predictions to stay head of market trends in the year ahead. 1. There will be more clarity for installers about industry-standard for cyber security The professional security industry will next year see the launch of a new set of cybersecurity guidelines Through the work being conducted by the BSIA Cyber Security Product Assurance Group (CySPAG), the professional security industry will next year see the launch of a new set of cybersecurity guidelines. This will provide the industry with the guidance and clarity that is currently missing. A key area of clarification is the chain of responsibility. It is not just the responsibility of the manufacturer to keep everything secure from a cyber-perspective. The whole supply chain is responsible - once a product leaves the lab where they’re manufactured, conditions change. Those who maintain, install and operate the product have a shared responsibility to ensure that a product or system remains cyber secure. As the sector develops and more cyber-enabled products become available to the market, this cyber security approach will become more important, and a key differentiator to the DIY market, which can only be a good thing. 2. Cloud and 4G connectivity are giving end-customers better physical security The percentage of panels connected to cloud services is now increasing every year Manufactures have been producing cloud-ready products for several years. Initially, not all installers had been taking advantage of benefits of cloud-connected panels, however the percentage of panels connected to cloud services is now increasing every year. Trust and education have improved, meaning that installers and end-users have realised that connectivity is positive, enabling consumers to check on their properties remotely and allow installer to remotely support their customers. However, one area of constraint has been the dependency on customers networks which may, or may not, offer the level of performance that a robust and resilient security system demands. With the introduction of mobile data connectivity to connected products over the past few years, and as connectivity becomes more widespread across physical security products there will also be a greater shift toward mobile technologies such as 4G, either as a back up to a router connection or for complete network independence. 3. Connectivity is changing the way installers work Installers are a vital part of the chain of when a new alarm system is fitted into a property Installers are a vital part of the chain of when a new alarm system is fitted into a property, providing both installation and maintenance services. Traditionally maintenance activities have always been delivered on-site. With the increased ease of connectivity for security systems and the advancements in how these systems are used, installers are provided further opportunity to enhance customer service around the delivery of maintenance. It is no longer a requirement to have a customer wait until an engineer can attend a property to remedy a fault, as many can now be addressed within minutes from any location in the world. This ability allows installation businesses to focus their engineers on more critical tasks while delivering an overall higher level of customer service. Indeed, some installation businesses are moving to a model of having dedicated remote support engineers in addition to the road-based team. 4. Manufacturers are ready for IP-only alarms, ahead of the 2025 analog switch off The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 as part of the move to Next Generation Networks, ending the use of analog phone lines and moves communications technology into an all IP-only space. Although some service providers have indicated that there may be some type of initial PSTN simulation, those providers that are doing this are also making it clear that this is only a temporary solution. The switch off will be a huge change for the security industry. Where heritage, analog alarm systems are in use, installers will need to plan to reconfigure existing systems to use the temporary PSTN simulation functions (where available) or upgrade systems to an all IP solution. Although 2025 feels a long way off, installers and end-users need to start planning now and taking the necessary action. In our sector, manufacturers are ready for IP-only alarms through the provision of cloud-based solutions and the use of techniques such as SIA IP for ARC monitoring.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cybersecurity, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analog cameras. A higher percentage of commercial customers use cellphone applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
Videonetics has supported Nagpur in achieving the Smart City status, under the Smart City Mission of Government of India, by securing its roads with an AI & DL powered Intelligent Traffic Management Solution. The solution has helped the city to solve its traffic enforcement problems such as red light jumping, crosswalk/ stop line violations, over speeding violations, tracking of suspect/ stolen vehicle, and generating e- challan/ e ticket for violators as per the Motor Vehicles Act. It includes applications like Automatic Number Plate Recognition (ANPR), Red Light Violation Detection (RLVD), Integrated eChallan Management Software. With the successful implementation of the solution, Nagpur has witnessed greater traffic discipline and substantial decrease in traffic violations. More efficient traffic management has helped the city achieve its Smart City objectives. Intelligent Traffic Management System Nagpur has witnessed a rapid rise in the number of vehicles, and also in traffic violations and road accidents Over the last few years, Nagpur has witnessed a rapid rise in the number of vehicles, and also in traffic violations and road accidents. The city administration recognized the need to enhance road safety, and the traffic police department sought a solution that would act as a true decision support system to regulate and analyze vehicle movement on roads. In addition, the police expected the solution to assist them in maintaining law and order, to identify frequent offenders as well as stolen/ suspect vehicles, as and when they enter the city. With the city needing to enhance its road safety even as it was expanding, Videonetics designed a solution based on its Intelligent Traffic Management System that provides continuous monitoring of the traffic situation, records traffic violations at intersections, and triggers necessary penal action against violators. Manage real-time alerts 24x7 real-time monitoring: Today, the city has ANPR and RLVD systems spread across 120 traffic junctions, to track and record license plate of any type of vehicle, as well as detect red light or stop line violation at intersections. Nearly 1,300 IP cameras have been deployed, to monitor vehicle movement and detect suspect vehicles simultaneously. Violation prosecution: Videonetics’s Integrated e-Challan/e-Ticket Management Software has been assimilated with Regional Transport Office database, to fetch the details of a vehicle and its owner. Once a violation is detected, an e-challan is issued to the offender. The e-challan also maintains a record of all payments, both received and pending. A centralized security view: The solution provides the police a bird’s eye view of the traffic junctions and city’s roads, from the Command & Contro Center. From the unified interface, security operators can view, manage real-time alerts and respond them swiftly. City surveillance system Prior to the installation of Videonetics’s Smart City solution, Nagpur city relied on on-site traffic monitors/ police to catch offending vehicles. However, the recent implementation of the solution has eliminated the need for physical deployment of traffic police at each junction. Videonetics’s solution helps maintain the security on city’s roads by detecting and recording traffic violations with accuracy, resulting in irrefutable evidence for local authorities. In addition, citizens have started obeying traffic rules, resulting in an over 50% reduction in traffic violations. The open architecture of the solution not only allows the city to continue adding more applications to make its traffic management more robust, but also integrate with the city surveillance system in a single unified interface, to address security concerns with a holistic approach.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the license plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
HID Global, globally renowned provider of trusted identity solutions, has announced that the government of Argentina has selected its HID goID citizen identity technology to power the country’s digital version of its mandatory National Identity Document for its Mi Argentina app. The collaborative effort between HID, Argentina’s Ministry of Interior, Public Works and Housing through the National Registry of Persons (Renaper), and the Ministry of Modernization makes Argentina the first country in the world to offer a true national identity credential within a mobile app to its citizens. Currently, there are 47 million DNI cards in circulation and recent legislation has accorded full legal equivalence to the smartphone version of the card. Mi Argentina app The Mi Argentina app, which houses the National Identity Document, was developed by the Ministry of Modernization and allows citizens who download the app on their mobile devices to request appointments, receive health information and access credentials, such as their drivers’ license. Powered by HID goID technology, citizens can also access their National Identity Document on a mobile device on the app while offline. The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens" “The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens,” said José D’Amico, director of Renaper, adding “This innovative application is not only easy to get, but we also believe this could be the first step in digitiszng identity across the government in Argentina and potentially other countries in years to come.” Enhanced security of citizens’ mobile identity Citizens with the ‘Mi Argentina’ app can initiate their request for a mobile ID by visiting a Renaper office, where their identity is verified and authenticated. Once approved, they receive an email with a code to activate their National Identity Document. In the event a smartphone is lost or stolen, credentials can be immediately revoked, safeguarding the citizen from potential identity theft. The mobile ID is securely stored on the citizen’s smartphone, meaning it can still be accessed if the cell phone has no data plan or when connection to a network or Wi-Fi is not available. Storage on the phone brings additional security for the mobile ID ecosystem, as a channel back to the central database is never required. Superior identity solutions Renaper issues all citizens a National Identity Document at birth and requires two mandatory renewals: between the ages of 5 and 8, and at the age of 14. Adults are required to renew it every 15 years. Argentina’s implementation of our technology provides its citizens with innovative ID access" “HID Global is committed to providing identity solutions that meet the evolving standards of the 21st century,” said Jessica Westerouen van Meeteren, VP & Managing Director, Citizen Identity with HID Global. “The government of Argentina’s implementation of our technology provides its citizens with innovative ID access and the ease of a completely mobile experience from registration to issuance.” Enhancing Border Security The government of Argentina previously partnered with HID to upgrade the country’s ICAO electronic passport to a newer generation that was more cost efficient, improved security and enhanced data reading at border control checkpoints. The successful partnership was a key factor in the government’s decision to collaborate with HID Global and deploy the HID goID mobile identity solution. The HID goID technology mobile ID ecosystem powers a more secure and connected world based on field-proven identity technology. It enables the issuance, lifecycle management and verification of mobile identities, and is a customizable solution that delivers many more functions than physical identity documents.
Established in 1976, Meghna Group of Industries (MGI) is a conglomerate in Bangladesh. MGI operates out of a large campus in Dhaka that houses its head office, 45 different manufacturing plants, and maintenance workshops, all under one roof. MGI has a turnover of over USD 3 billion, and an employee strength of over 30,000. Being an established and trusted group, it required operations to be suitably monitored, in order to ensure uninterrupted production, adherence to quality standards, and timely delivery of supplies to customers. So far, it had been monitored by manned security, with accompanying risks ranging from damage to assets, misuse of equipment, thefts, leakage of confidential information, employees’ safety, poor record keeping for vehicles entering or exiting the premises, and more. Providing investigation-Friendly monitoring software Enabling IVA at various locations has helped in the monitoring of infrastructure Designing of the solution started with a joint site survey by Videonetics, MGI IT heads, and the system integrator. After extensive research, Videonetics developed a unified solution encompassing Intelligent Video Management Software (IVMS), Intelligent Video Analytics (IVA), and a customized ANPR system to read and capture license plates in Bengali language. Key aspects of the solution included the following: Videonetics’s IVMS has been deployed to help in viewing and recording feeds from over 500 cameras installed in multiple factory locations. This is enabled over IP network in an efficient and elegant way. In addition, the solution provides investigation-friendly monitoring software at the front-end, while relegating all the complexity of the server software to the back-end. Enabling IVA at various locations has helped in the monitoring of infrastructure, vehicles, people, crowds and objects, for automatic detection and analysis of events of interest. Manned security to address safety The operators get a bird’s eye view of various sites from their centralized location, enabling them to respond quickly and effectively when an incident occurs. The solution has been installed on Red Hat® Enterprise Linux® which makes the overall system more secure and maintainable. Videonetics’s Automatic Number Plate Recognition (ANPR) system has been customized to read license plates in Bengali. Regardless of the lighting conditions, the Bengali ANPR accurately captures with timestamp the license plate of any vehicle as it appears in the camera’s field of view (FoV). The new implementation enables security operators to be deployed at the unified interface In addition, the system is integrated with the IVMS at the command and control center, for viewing and analyzing vehicular movements, and taking action, if required. THE IMPACT Prior to the installation of Videonetics’s solution, MGI used to rely on manned security to address safety, security and operational risks. However, the new implementation enables security operators to be deployed at the unified interface, for monitoring multiple sites such as assembly plant, warehouse, process, dispatch area, vehicle movement, and so on. Personal protection equipment detection So now, MGI operators can handle incidents of thefts, potential break-ins, unauthorized intrusions, and conduct investigations, without having to leave their desks. This has helped MGI in maximizing resources and significantly reducing costs. But the biggest benefit has been to be able to provide a safer environment to its employees, and to secure its workplaces with optimization in day-to-day operations. The open architecture of the solution allows MGI to continue adding, in a single interface, more AI & DL powered applications such as personal protection equipment detection, facial recognition, fire & smoke detection, workers slip/ fall detection, workers head count, vehicle movement management, to name a few. This makes it possible for the company to address all its security concerns with a holistic approach.
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, has announced that Ocean Blue Car Wash, Prescott Valley, AZ, has deployed or is upgrading to 3xLOGIC 32 4MP-camera video surveillance systems at four of its locations to date. DC Pro Systems is the integrator of record as it continues to install and maintain a growing number of Ocean Blue locations. V7000 NVRs and V-Series 4MP dome cameras We are standardising on the same robust 3xLOGIC video surveillance system at each of our locations" As one of the state’s first Express Car Wash concepts, the owners of Ocean Blue Car Wash have put to use their 15 years of experience to create a new standard in car washing. The Ocean Blue experience is known for consistency and a reliable standard of service. Customers receive the same safe, quality car wash every visit. “We are standardizing on the same robust 3xLOGIC video surveillance system at each of our locations,” said Alexander J. Lazar, Owner and General Manager, Ocean Blue Car Wash. Thus far, four Ocean Blue locations have each deployed, or will soon finish deploying, 3xLOGIC V7000 NVRs and 32 V-Series 4MP dome cameras. “We really like Shane Hepola and DC Pro Systems. He brought us the 3xLOGIC technology, and I trust him and the quality job they do.” 3xLOGIC high-resolution cameras “These high-resolution camera views keep my employees on point and they keep my customers on point, too. The 3xLOGIC cameras pay for themselves. I’ve got cameras everywhere, recording everything. If we’ve caused damage to a vehicle, if we’re liable, we’ll certainly pay for it. However, the proof is in the video and if there is any question about a claim, the video doesn’t lie,” said Lazar. “Any story you can imagine from the customer, we’ve experienced it, including slip and fall claims,” Lazar continued. “We need that 4 MP resolution; it keeps our employees honest and it also deters potential robberies. Our multiple cameras provide so many interior and exterior views that we capture a lot of the surrounding properties and highway, so we can be an asset to law enforcement when needed.” On-site and remote video monitoring He further adds, “I’m not at all the different sites every day, but at any given time I can log in and watch what’s going on. I’ve got a bird’s eye view, so I can catch equipment malfunctions before my staff does. Sometimes, when I wake up at 2 am, I can quickly log on to view my locations. I’ll do a night audit to check lighting, building signs, and other things. We’re not there but the cameras are—24/7/365.” Ocean Blue does both on-site and remote monitoring of video, as well as after-incident investigations Ocean Blue does both on-site and remote monitoring of video, as well as after-incident investigations. At this time, the company is expanding to a fifth location, there are plans to build another, and by end of 2020 there will be six Ocean Blue locations. All six will have the same robust, high-functioning 3xLOGIC video surveillance, installed by DC Pro Systems. VIGIL Central Management (VCM) An interesting add-on feature for Ocean Blue is a 3rd-party software app that takes footage from the 3xLOGIC cameras to determine spacing between the cars during the wash process. If two cars come within a certain number of feet from each other, the line shuts down automatically. Another improvement Lazar and Hepola are discussing is to implement 3xLOGIC VIGIL Central Management (VCM). VCM is a health monitoring software component of the VIGIL video management system that alerts either DC Pro or Ocean Blue to any malfunctions on the network before such developments create a problem. “The system is very user friendly,” said Lazar. “Basically, we’re trying to kill all the blind spots on the property, and I use the video for training purposes, too. We’ve got monitors in our offices and in the customer areas. That’s telling my customers we’re watching everything, and their cars are safe; and it’s keeping my employees doing great work,” Lazar concluded.
Round table discussion
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasizing systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
IP security solutions: Manufacturers & Suppliers
- Dahua Technology IP security solutions
- Arecont Vision IP security solutions
- Hikvision IP security solutions
- Pelco IP security solutions
- LILIN IP security solutions
- IDIS IP security solutions
- VIVOTEK IP security solutions
- BCDVideo IP security solutions
- Vicon IP security solutions
- Avigilon IP security solutions
- Messoa IP security solutions
- Illustra IP security solutions
- TruVision IP security solutions
- Bosch IP security solutions
- MOBOTIX IP security solutions
- FLIR Systems IP security solutions
- Hanwha Techwin IP security solutions
- Teleste IP security solutions
- DRS IP security solutions
- Oncam IP security solutions