Luxul, globally renowned innovator of IP networking solutions for AV integrators, has announced releasing the next generation to its flagship XWC-1000 wireless controller, the high-tech XWC-2000 wireless controller device. XWC-2000 wireless controller The new controller utilizes Luxul's exclusive Roam Assist technology to ensure the active roaming of mobile client devices and simple deployment of up to 32 wireless access points (AP) for large installations. In wireless networks that utilize m...
By popular demand, NAPCO Security Technologies, known for innovative technology and reliable professional security solutions, is expanding its globally renowned and award-winning line of StarLink Universal Cellular Communicators with new models on the AT&T LTE network, so important in various areas of the United States of America. The much-anticipated StarLink LTE AT&T Cell and Cell/IP Communicator models include StarLink Fire Commercial Fire Communicators, plus StarLink Intrusion Cellu...
Through August 2019, IDIS, the South Korean video surveillance solutions manufacturer will highlight the applicability of its end-to-end Total Solution to the spectrum of challenges facing campus safety and security professionals in the Americas. Campus Safety Conference IDIS America, the regional headquarters for South Korea’s in-country manufacturer of surveillance technology, kicks off several weeks of focus on the unique challenges and concerns related to campus security in the...
LifeSafety Power Inc. continues to expand its popular rack mount solutions, now adding the integration of Honeywell ProWatch to the FlexPower Gemini line. The Gemini RGH rack mount power management system supports seamless hardware integration of Honeywell ProWatch door controllers and centralized power in a single, space-saving design. Rack mount power management Gemini RGH is a compact, 19-inch rack-mounted enclosure engineered for data centers, IT closets, server rooms or other areas where...
DoorBird's IP-based video door intercoms can now be integrated seamlessly with Snom phones. When the doorbell rings, the audio and video signal from the door intercom is transmitted to the Snom IP phone providing two-way audio communication as well as video via the phone video display. IP door intercom With the DoorBird and Snom integration, the video image is immediately visible when the doorbell rings, even before the call is answered. Bird Home Automation, the Berlin-based manufacturer of...
Checkpoint Systems has unveiled the world’s most compact full performance, customizable, RF EAS antenna – the S20. S20 RF EAS antenna Retailers are dramatically ramping up investment in store design to improve the overall consumer experience and with store designs leading to a potential sales increase of up to 40%*, there is a justifiable return. With 50 years’ experience, Checkpoint Systems are collaborating with retailers and brands to align EAS antennae with these new stor...
As manufacturers look to embrace the Industrial Internet of Things (IIoT), Moxa Inc., a leader in industrial communications and networking, is helping companies more easily connect their serial devices to cloud systems for IIoT applications by offering Moxa NPort IA(W)5000A-I/O Series wired or wireless serial device servers and MGate 5105-MB-EIP Series protocol gateways with ready-to-run cloud connectivity capabilities. Integrated Connectivity Solutions Moxa's integrated connectivity solutions can collect multiple different field data structures, including serial, I/O, Modbus, and EtherNet/IP Moxa's integrated connectivity solutions can collect multiple different field data structures, including serial, I/O, Modbus, and EtherNet/IP, transforming IIoT manufacturing operations by uncovering previously unobtainable insights. Powered by the MQTT messaging protocol, data is then transmitted securely to Microsoft Azure or other publicly and privately hosted cloud services, so that companies can analyze it to spur innovation and accelerate their IIoT strategies. To realize the full value of the new features across the enterprise, Moxa employed intuitive user interfaces and functions so that engineers can easily tap into the cloud for their IIoT deployments. Initial setup to full implementation can be completed within a few steps for immediate realization of efficiencies and cost savings. In addition, advanced diagnostics tools are supported to assist users in identifying connection issues so that a variety of field devices can easily share data in the cloud while protecting data integrity and network security. Moxa Cloud Solution By working with the Moxa cloud solution, companies will also avoid packet loss resulting from unstable connections. A loss buffer queues incoming data from field devices when connections are unstable and transmits it only when the connection is stabilized. Moxa NPort IA5000A-I/O and NPort IAW5000A-I/O serial device servers feature built-in digital I/Os Moxa NPort IA5000A-I/O and NPort IAW5000A-I/O serial device servers feature built-in digital I/Os and provide maximum flexibility when needed to integrate serial equipment in the field with an Ethernet network or cloud platform. A combination of digital I/Os make the device servers well-suited for a variety of industrial data acquisition applications. Both servers collect serial or I/O data for the cloud application. Moxa MGate 5105-MB-EIP The MGate 5105-MB-EIP is an industrial Ethernet gateway for Modbus RTU/ASCII/TCP and EtherNet/IP network communications with IIoT applications. To integrate existing Modbus devices onto an EtherNet/IP network, use the MGate 5105-MB-EIP as a Modbus master or slave to collect data and exchange data with EtherNet/IP devices. The MGate 5105-MB-EIP Series collects EtherNet/IP and Modbus RTU/TCP data for the cloud solution.
Matrox Graphics Inc. has announced Aggregator Mode, a cutting-edge, multi-system control feature available with Matrox Extio 3 high-performance IP KVM extenders. Taking Extio 3 IP extension and switching capabilities to a new level, this new mode of operation permits an Extio 3 receiver unit to aggregate multiple video streams coming from different Extio 3 transmitter units. Multiple computer desktops can then be viewed and controlled simultaneously from an Extio 3 receiver unit—with a single keyboard and mouse. Moving the mouse across a multi-screen desktop of up to four displays shifts control instantly from one computer to the next, providing users with unprecedented operational efficiency. Aggregator Mode is ideal for a wide range of applications including process control, industrial and automation, military and defense, healthcare, broadcast and post-production, and more. Extio 3 IP KVM Extenders Aggregator Mode will be revealed for the first time at InfoComm 2019, in booth 3055. Aggregator Mode streamlines user operations by providing a unified view of information Aggregator Mode streamlines user operations by providing a unified view of information coming from different computer systems. Users have the flexibility to define which computer desktop gets mapped to which screen attached to the Extio 3 receiver unit—they can select the video sources from the Extio on-screen-display (OSD), and then create and save layouts through its easy-to-use, drag-and-drop interface. Aggregator Mode Extio 3’s Aggregator Mode supports computers with multiple video outputs, including independent or stretched desktop mode, while remote user-station setups can be arranged in various configurations such as 4x1, 3x1, 2x1 or 2x2. Guest connections are also available for collaborative environments, where different users can connect to the same source system simultaneously, with or without USB control. Aggregator Mode is easy to deploy as it is built into Matrox Extio 3 IP KVM extenders, minimizing equipment cost and maintenance. It also does not require any additional software to be installed on the source computer system, ensuring that all system certifications remain intact for a truly seamless and simplified KVM installation. IP KVM Extension And Switching Matrox Extio 3 continues to set the standard for IP KVM extension and switching" “Matrox Extio 3 continues to set the standard for IP KVM extension and switching,” says Caroline Injoyan, business development manager, Matrox Graphics Inc. “In addition to providing industry-leading 4Kp60 and quad 1080p60 4:4:4 performance at unprecedentedly low bitrates, Aggregator Mode provides users with the most efficient workspace. This is essential in 24/7 environments for example, where operators can now pull and view critical information from multiple system data points to make timely, well-informed decisions. We encourage you to stop by at InfoComm 2019 to witness this first-hand.” Aggregator Mode will be available as a free Extio 3 firmware and Matrox Extio Central Manager software upgrade in Q4 2019. Matrox Extio 3 Series Cards Redefining IP KVM extension technology, Matrox Extio 3 Series cards and appliances are capable of providing 4Kp60 4:4:4 or quad 1080p60 4:4:4, desktop-quality video at 5% of the bandwidth required by most other products available in the market today. With exceptional remote performance, smooth video playback, and pristine image quality, Extio 3 Series features the best-in-class resolution support required of professional applications—a DisplayPort 1.2 connector on Extio 3 N3408 IP KVM extenders ensure a maximum resolution of 3840x2160 at 60Hz in true color. Extio 3 Series also provides flexible configuration options, supporting copper or fiber-optic cabling in point-to-point or networked KVM operations. Extio 3 readily works with standard commercial off-the-shelf (COTS) network switches that significantly diminishes the total cost of ownership to deliver a scalable, secure, and cost-effective KVM matrix switching solution over IP.
VuWall, the provider of video wall management and AV distribution solutions, will display its new CoScape multidisplay collaboration and presentation system and the next generation of the industry-trusted TRx 2.0 AV network management solution, in addition to a live demonstration of the complete family of interoperable solutions available within the VuWall ecosystem, in booth 2281 at InfoComm 2019. “This year marks our 10-year anniversary of simplifying the lives of AV/IT integrators and video wall operators in the most demanding control rooms around the world,” said Paul Vander Plaetse, founder and CEO of VuWall. Turnkey Display Solution “As we move into the next decade, VuWall is focused on further streamlining the evolving and complex world of technology. We are committed to delivering solutions that enable easy configuration and deployment, interoperability between brands, and future-proof implementation through open architecture.” CoScape allows presenters to display all sources on one or multiple touch surfaces “At InfoComm, attendees will see our latest advancements within the VuWall ecosystem and how we integrate with other solutions to create a superior viewing experience that goes far beyond simple control of video walls, and where multiroom and multisite solutions can be integrated with simplicity.” At InfoComm 2019, VuWall will demonstrate the full capabilities of its CoScape multidisplay collaboration and presentation system. CoScape allows presenters to display all sources on one or multiple touch surfaces, creating a true high-resolution, interactive turnkey display solution for easy visual collaboration. Network Management Solution It's perfectly suited for collaboration rooms, allowing sources to be shared on a touch video wall or projection screen. It features an open platform to ensure full support of standard corporate applications and a high-end performance workstation driven by powerful NVIDIA graphics cards for 3D acceleration graphics. In addition, it works with third-party collaboration programs, allowing users to interface directly and seamlessly with the chosen program from the CoScape controller and eliminate complex steps from the presentation process. Also at the booth will be VuWall's TRx 2.0 AV network management solution that provides distribution of audio and video signals over standard IP networks. User Management Capabilities Designed for presentation rooms, control rooms, and content distribution across multiple locations throughout a campus Designed for presentation rooms, control rooms, and content distribution across multiple locations throughout a campus, TRx supports multiple formats of video streaming up to 4K resolution and offers simple management of an unlimited number of sources and display surfaces. The latest version offers a new, intuitive control panel designer allowing integrators to create custom control panels that can be run on any HTML-enabled device for easy control from anywhere on the network. TRx also supports a broadened range of devices and user management capabilities as well as the ability to stitch together multiple decoders, allowing for a virtually infinite number of displays to be brought together as a single video wall with limitless resolution. Live Presentations The system consists of a centralized TRx server for easy deployment of a large number of devices and a series of encoders, decoders, and IP video wall processors that support H.264 4K/UHD, SRT, and SDVoE. Attendees at the show will also benefit from live presentations of the entire VuWall ecosystem, which includes TRx and CoScape along with VuScape video wall controllers and VuStation visualization and control workstations. Furthering the value of the system, VuWall has partnered with the most innovative and trusted technology leaders in the industry, including IHSE, SVDoE, Matrox (SRT), AMX SVSI, Datapath, NVIDIA, AMD, Genetec, and Milestone. Now featuring integration with Genetec, Milestone, Verint, and ISS solutions, VuWall is helping customers meet increasing visualization requirements in security and surveillance markets.
At InfoComm 2019 (booth 3055), Matrox will be showcasing its complete range of award-winning, IP-based products including quad 4K enterprise encoders, remote recorder appliances, 4K capture/encode/decode and multiviewer cards, 4K IP KVM extenders, lecture capture appliances, and 4K/multi-HD webcasting encoders. Be amongst the first to discover new products and features from Matrox. Matrox will be launching a major addition to its world-class portfolio, unveiling a revolutionary new line of video wall products. Not only will Matrox be revealing this new product alongside a show-stopping demonstration, Matrox will also be holding a raffle, where one lucky guest will take home this innovative new product. Increases Operational Efficiency Matrox Maevex 6100 Series enterprise encoders are also now supporting IPv6 Matrox Extio 3 high-performance IP KVM extenders will also be showcasing a brand new feature that brings IP extension and switching flexibility to the next level. A live demonstration will show how this feature drastically increases operational efficiency for users working on multiple source systems simultaneously. Matrox Maevex 6100 Series enterprise encoders are also now supporting IPv6, HLS streaming, and MOV recording. These rugged, quiet, and rack-friendly appliances are now equipped with every feature needed for the simplest and most complex encoding made easy—all without sacrificing on quality! Matrox Monarch EDGE will be making its InfoComm debut. Featuring next-generation 3G/12G-SDI and 25 GbE SMPTE ST 2110 connectivity, as well as versatile multi-protocol support—including RTMP, SRT, MPEG2. TS, and RTSP—this 4K/multi-HD webcasting and remote production (REMI) encoder delivers H.264 streams with resolutions up to 3840x2160p60 or quad 1920x1080p60 and profiles up to High 4:2:2. Real-World Benefits The AIMS Pro AV Group will be on hand at InfoComm in booth 375 The AIMS Pro AV Group will be on hand at InfoComm in booth 375, showcasing the real-world benefits of open standard approaches for the professional AV and installed systems market. Via a series of theater presentations, as well as a multi-vendor interoperability demonstration featuring the SMPTE ST 2110 standard, show attendees will discover the benefits of truly flexible, scalable, and interoperable AV-over-IP infrastructures. At the show, AIMS will also be hosting a panel session titled 'Audio and Video Streaming Using Established IP Standards' on Tuesday, June 11 at 1-3 p.m in Room W304E. Featured Products Matrox Maevex 6100 Series enterprise encoders - Matrox Maevex 6120 and Matrox Maevex 6150 dual and quad 4K enterprise encoders allow for the simultaneous capture, streaming, and recording of multiple 4K inputs. These powerful all-in-one appliances can feed cloud-based servers to reach internet viewers—including new simplified webcasting to multiple cloud-based and social media sites—push many streams over LAN for audiences on-premises, and record to local or network storage for later editing and viewing, all concurrently. Maevex PowerStream Plus software and APIs ensure easy operation, and are included with all Maevex 6100 Series appliances. Matrox Maevex 6020 Remote Recorder - The Panopto-certified Matrox Maevex 6020 Remote Recorder supports best-of-breed live streaming and recording to the Panopto video platform for education and business with easy 1-2-3 connection to your Panopto account. Users will benefit from simultaneous dual live streaming video and multiple on-device recordings of different qualities per input for the fastest VOD availability. It also boasts one-touch recording controls and whisper-quiet operation, on a rack-friendly, single-purpose appliance. Matrox Mura IPX video wall and multiviewer cards - Matrox Mura IPX video wall and multiviewer cards will exhibit the most advanced capture, encoding, decoding, and/or display capabilities from a single card by streaming and recording desktops, entire video walls, and selected regions of interest—with pixel-for-pixel or scaled-down representation of the display wall—over LAN and internet. Matrox Extio 3 IP KVM extenders will deliver exceptional 4Kp60 4:4:4, dual 4Kp30 4:4:4, and 2Kp60 4:4:4 performance Matrox Extio 3 IP KVM extenders - Matrox Extio 3 IP KVM extenders will deliver exceptional 4Kp60 4:4:4, dual 4Kp30 4:4:4, and 2Kp60 4:4:4 performance over a standard 1 GbE network—at unprecedentedly low bitrates. Extio 3 will also demonstrate a brand new feature designed to drastically increase operational efficiency for users working on multiple source systems simultaneously. Extio 3 cards and appliances work with COTS network switches, illustrating a scalable and cost-effective KVM matrix over IP to securely route any system to any remote location on the network. Matrox Monarch EDGE 4K/multi-HD webcasting and remote production encoder - The Matrox Monarch EDGE 4K/multi-HD encoder will demonstrate several webcasting workflows, including streaming 4Kp60 content that ensures high-quality viewing experiences on any size device. Attendees will also learn how to leverage Monarch EDGE with multi-channel online video platforms (OVPs) like YouTube, to capture and stream up to four cameras, allowing the viewer to select and/or switch to their preferred camera views. Matrox Monarch LCS lecture capture appliance - The Matrox Monarch LCS multi-source streaming and recording appliance will exhibit how IT administrators can readily integrate these encoders into today’s most popular open video and learning management systems, and how operators can in turn, easily define profiles for live streamed and recorded lectures by mixing camera and presentation material.
AV collaboration and control pioneer Atlona, in partnership with new owners Panduit, will accentuate the importance of quality network infrastructure and connectivity in the AV over IP ecosystem at InfoComm 2019. Panduit, which acquired Atlona in January, will demonstrate its latest enterprise-level equipment racks, cabinets and connectivity solutions for AV environments in Atlona’s booth (3012), with a focus on helping integrators and end users streamline the installation and management of their core system architectures. Panduit Two-Post Rack System offers a reliable foundation for mounting AV and data center equipment“InfoComm provides us with an opportunity to close the knowledge gap around how to identify and choose the most appropriate Layer 1 infrastructure for each AV project,” said Amy Hacker, AV Commercial Strategy and Enablement Manager for Panduit. “We’re excited to speak with Atlona partners and customers about how Panduit can help them deploy Atlona products easier and faster with quality cable management, reliable infrastructure, and secure connectivity.” Solutions On Display At Infocomm Panduit will emphasize three solutions at its dedicated station in the Atlona booth: Panduit Two-Post Rack System: This dual-column data rack offers a reliable foundation for mounting AV and data center equipment, and is ideal for installation in enterprise-wide IT distribution closets. Its modular design offers side access with plenty of space to efficiently install, manage and organize cables, patch panels and other accessories, reducing installation times by up to 15 percent compared to competitive solutions. Panduit Wall-Mount Cabinets: Offering the same foundational strength and systems integration efficiency as Panduit’s two-post racks, these compact cabinets provide a secure and reliable solution for facilities requiring infrastructure and patching solutions in open spaces, or in equipment rooms with limited real estate. Panduit Field-Terminable Plugs: These modular plugs allow contractors to run horizontal cable direct to equipment, eliminating the need for jacks, surface-mounted boxes and/or patch cords – reducing installation times and upfront costs by up to 40 percent, while eliminating multiple points of failure. OmniStream AV Over IP Devices Panduit will populate the two-post racks and wall-mounted cabinets with Atlona equipment, including OmniStream AV over IP devicesPanduit will populate the two-post racks and wall-mounted cabinets with Atlona equipment, including OmniStream AV over IP devices – a springboard for a broader conversation about how quality infrastructure and connectivity will ensure that video, audio and data signal integrity is maintained across the ecosystem. Panduit representatives will also be on hand to discuss other infrastructure concerns, including the benefits and ideal scenarios of applying unshielded cable versus shielded cable, for example. “Beyond offering a robust and reliable infrastructure, we look forward to demonstrating how our systems provide the generous headroom and bandwidth required to support the higher resolution of 4K/UHD and HDR signals moving across the enterprise,” said Hacker. “Quality infrastructure directly relates to the quality of the AV signals being deployed. The better the quality of the cable and connectivity you have, the less you need to worry about pixel drops, fuzzy images and other undesirable visual artifacts.” InfoComm takes place from June 12-14 at the Orange County Convention Center in Orlando, Florida.
Matrox Graphics Inc. has announced that the Matrox Mura IPX 12G-SDI capture and IP encode/decode cards are now shipping. These new video wall cards feature four SDI captures alongside a dedicated onboard network interface controller (NIC), offering unprecedented multi-channel SDI capture, encode, stream, record, and decode capabilities from a single-slot card. OEMs and system integrators can now select from a world-class portfolio of 12G-SDI, 4K DisplayPort 1.2, and 4K HDMI capture card options to build premium, best-of-breed video wall controller solutions. Matrox Mura IPX SDI cards The Mura IPX 12G-SDI cards are available in passive and active cooling options Featuring unrivaled SDI support from a single card, the Matrox Mura IPX SDI cards feature two 12G-SDI and two 3G-SDI connectors to capture a wide range of SDI sources. These cards also include a dedicated NIC for high-density encoding and decoding of up to two 4Kp60, four 4Kp30, eight 1080p60, sixteen 1080p30, or exponentially more SD streams. The Mura IPX 12G-SDI cards are available in passive and active cooling options. The new Matrox Mura IPX capture cards include a complete range of video wall software, APIs, and libraries. These software toolkits allow OEMs and developers to deploy intuitive, ready-to-use software and build custom interfaces and applications. Mura IPX DisplayPort “The latest additions to Matrox’s award-winning video wall portfolio allows customers to seamlessly incorporate SDI sources, while simultaneously providing the industry’s best multi-channel input, encode, and decode support,” says Fadhl Al-Bayaty, business development manager, Matrox Graphics Inc. “Combined with the similarly architected Mura IPX DisplayPort and HDMI capture boards, this ever-expanding portfolio now boasts the most powerful, flexible, and scalable building blocks essential for today’s video walls.” Visit Matrox at InfoComm 2019 (Orlando, Florida, booth 3055) to see the complete range of Matrox Mura IPX capture, video wall, and multi-viewer cards in action.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types Of Access Control Authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organizations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasize, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organizations want to use smart phones in their upcoming access control implementations. Smart Phone Access Control Is Secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices. Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone.All that should be needed to activate newer systems is simply the phone number of the smart phone Bluetooth And NFC The Safer Options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defense of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging Systems Could Cause Problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organizations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organizations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the home, such as pet-cams or smart speakers that add to the burden of installation and maintenance. In addition, we are witnessing the rise in popularity of DIY security devices, indicating that users are looking for models and technologies that provide both contract flexibility and simplicity of use. The past years have seen major advancements in radar technology, which have brought the formerly military technology into the consumer space. Radars provide interesting prospects for home security and smart homes due to several inherent characteristics which give it an advantage over existing technologies. The resolution of an advanced radar sensor enables not only presence detection, but also provides advanced features for security, automation and well-being Advanced Security And Automation Features Of primary importance, a consumer designed radar sensor provides the user with full privacy, but the use of radar is also beneficial because it is indifferent to environmental, temperature and lighting conditions. In addition, radar signals (at certain frequencies) are capable of penetrating through almost any type of material, enabling concealed installation, robust monitoring in cluttered spaces and even the coverage of several separate rooms with only one device. In terms of capabilities, simple time of flight 2-antenna radar sensors, which have been around for a while, do not provide much additional value in comparison to existing solutions and are not necessarily competitive in terms of pricing. However, the new generation of radar sensors are also opening up new capabilities previously achieved with optics only. Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in your elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in your wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimization of home devices. The security sensor installed in your elderly parent’s home could also detect a fall having occurred Secret Of The Consumer Radar A radar sensor’s accuracy and its ability to support wide functionality and applications is determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model - As the resolution is ever improving, the sharper and more detailed is the image. When looking at the short-range radar sensor market, prominent companies such as Texas Instruments and NXP are offering radar-on-chip solutions supporting 2\3 transmitters (Tx) and 3\4 receivers (Rx), mainly utilizing frequency bands of 77-81GHz, as they target mostly automotive and autonomous driving applications. Another company that develops such radar-on-chip solution is Vayyar Imaging, an Israeli start-up, founded in 2011, that developed a radar sensor for 3D imaging. Vayyar Imaging directly targets the smart home and security markets with its radar-on-chip, developing modules and products for intruder detection, automation and elderly care (fall detection). Providing not only chips, but complete systems, the new model makes radar technology highly available and accessible. The radar-on-chip technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue Radar-On-Chip Solution The radar-on-chip solution supports 72 full transceivers, an integrated DSP and radar bands between 3-81GHz. The resolution provided by this type of specification is high enough to provide subtle information about people’s real time location posture (lying down\falling\sitting\walking), and breathing, and enables to classify pets from humans, but it is low enough as to not compromise privacy. This type of technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue, such as in bathrooms or heavily lit environments. Moreover, utilization of this technology allows to dramatically minimise the numbers of sensors installed in the home, as it provides full home coverage with just one or two sensors and enables using the same HW to support additional capabilities such as breath monitoring, fall detection and highly accurate automation. Using AI and machine learning, the data derived by these sensors can be leveraged to provide smarter, verified alerts on the one hand and whole new insights on the on the other. The sensor can be tuned to learn the location of the house entrances or boundaries, where the inhabitants are expected to be at night, or where they should be expected to enter from into the home, adding new logics to the traditional yes\no decision making. Home security is widely regarded as a necessity, provides peace of mind to people and is integral to people's day to day lives Additional Smart Home Services Among the evolving home technology verticals, security is by far the most relevant and integral to people’s day to day lives. Home security is widely regarded as a necessity and provides peace of mind to people. Being a legacy industry with many well-known and well-trusted brands, security players are well positioned to introduce new technology into the home and have the ability and credibility to expand their offerings to additional smart home services by utilizing existing infrastructure and channels. With technology giants entering the security arena through the smart home door the DIY security solution market expected to explode with a CAGR of 22.4% (according to a report by Persistence Market Research). Now that new pricing and service models offer minimal commitment, traditional security players will need to step up. Security companies will need to explore new technologies and expand their offering if they intend to stay relevant and competitive in a market trending on functionality converge and minimization of maintenance and installation costs.
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission Critical Video Surveillance Solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralized storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralized data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate Access To Video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance Of Video In Risk Mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying The Right Video Server Equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyze the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analyzing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analyzing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analyzing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video Transmission And Privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organizations to optimize how video data is transmitted depending on their particular needs. For example, while some applications may favor a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximize accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR For Physical Security Professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organization, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organization.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specializes in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting Video Surveillance Systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
Open architecture in physical access control is built around Mercury Security’s access control panels, the de facto standard embraced by more than two dozen access control original equipment manufacturers (OEMs). Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments related to the Mercury platform. MercTech4 highlighted a new generation of access control products, which are increasing the capabilities for Mercury OEMs in areas such as two-way communication and encryption. Enhancements include use of the OSDP (Open Supervised Device Protocol) v2 communication standard instead of the older (and less flexible, less secure) Wiegand standard. Other advantages are relay count activations, a crypto memory chip and default encryption, a critical feature ensuring greater cybersecurity. Integration Of Hardware With Physical Security Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system. Mercury also provides hardware integration at the controller level with elevator manufacturers such as Otis, Kone and Thyssenkrupp, including “destination dispatch,” which groups passengers going to the same floors into the same elevators, thus reducing waiting and travel times. Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system Integration of Mercury controllers with LifeSafety Power’s IP-based intelligent power supplies enables system health and diagnostic data to be shared for preventive maintenance. Mercury also offers several “bridge” products to enable its OEMs to transition installed proprietary systems from outdated Casi-Rusco (GE), Software House I (Tyco) and Infographics (GE) technologies to an open platform using Mercury hardware. Business As Usual Other recent news for Mercury is the company’s acquisition by HID Global last fall. Mercury Security President Matt Barnette says the acquisition will not impact how Mercury goes to market. “It’s business as usual,” he says. “It’s 130 days into the acquisition, so it’s still early on, but we are continuing to do what we do.” HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud Steve Carney, HID Global’s vice president of product marketing for physical access control, provided an update from the HID Global perspective to MercTech4 attendees. He reiterated that there would be no change in Mercury’s OEM go-to-market strategy. He emphasized that Mercury’s team and talent remain core to the brand, and HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud. Open architecture companies throughout the access control industry – Mercury’s OEM partners – are incorporating the new boards into their products, each putting their “spin” on those capabilities and expanding the functionality of their systems. At MercTech4, seven of those OEMs hosted small groups of consultants in focused meetings to highlight what’s new with their products. Lenel Honored As 'Platinum Premier' Partner Lenel, Rochester, N.Y., has been a Mercury's OEM partner since 1995. Lenel is Mercury’s first-ever "Platinum Premier" partner. In recent years, Lenel’s OnGuard system has evolved into a fully browser-based system providing both alarm and cardholder management through web browsers, and access to the platform on a computer, laptop or tablet. OnGuard WATCH (Web Access Trending and Comprehensive Health) provides system monitoring tools and health checks, such as tracking CPU usage and logging error files. Lenel has introduced its own BlueDiamond mobile credentialing system based on Bluetooth Low Energy and deploying mature technology previously used by sister UTC companies for real estate locks and in the hospitality market. Feenics, an Ottawa, Ontario, cloud-based access control company, was also among the Mercury OEMs participating in MercTech4. The Keep by Feenics platform is scalable from a single door to a global enterprise environment. A RESTful API provides easy connection of third-party applications. Feenics emphasizes cybersecurity in the cloud, using Amazon Web Services, Transport Layer Security (TLS) encryption, and Veracode penetration testing. They use MongoDB open source database replica sets instead of Microsoft SQL. Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments Integration And Encryption RS2 Technologies, Munster, Indiana, is another Mercury OEM highlighted at MercTech4. Their top vertical markets are K-12 schools, utilities, healthcare and government. RS2’s features include a PSIA-compliant interface, compatibility with BACnet and the Pinwheel DME (Data Management Engine) for bi-directional database integration. RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer. Product enhancement is a focus of RS2’s engineering. Open Options, Addison, Texas, is a Mercury Platinum Elite partner whose customer base spans every vertical, and whose feature set reflects customer feedback. Open Options offers Mercury hardware mounted inside a sleek plastic enclosure, among other form factors. The company emphasizes an open business culture and dedication to customer service. Customer support is a direct phone line to speak with a live person every time to get any issue resolved. Open Options’ DNA Fusion Version 7 platform includes new features such as an updated user experience. DNA Fusion interfaces seamlessly with security technologies — including video, biometrics, wireless locks, and more. Last year, Open Options marked 20 years of partnership with Mercury Security. Engineering For The Masses Avigilon, Vancouver, B.C., is embracing new Mercury products in its completely browser-based Linux platform that can scale from entry-level to enterprise systems. The ACM (Access Control Manager) software is engineered for IT professionals and is updated every 60 days.The Linux-based system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance For Avigilon, access control is a component of a broader approach that uses analytics and self-learning to manage massive amounts of data and provide the information an operator needs. The system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance. Genetec, Montreal, Canada, emphasizes the value of its “unified” approach that combines video, access control and automatic license plate recognitions into a single platform – designed from the ground up – that incorporates communications, intrusion detection and analytics. Cybersecurity failures prominent in the news often occur because of negligence – the customer had not implemented a software patch, for example. Genetec helps to manage such concerns. When cameras are deployed in the Genetec platform, the system provides an alert if a new camera firmware version is needed. The Genetec Update Service (GUS) notifies customers of any needed software updates. Prominence Of Cybersecurity Honeywell’s Win-Pak access control software is integrated with the Pro-Watch security management suite. Cybersecurity is a corporate priority for Honeywell, whose products follow the SDLC (systems development life cycle) process with security requirements based on the ANSI/ISA 62443-3-3 standard. Microsoft's Threat Modelling tool identifies entry and exit points of systems that an attacker could exploit, providing the development team an attacker's viewpoint. The secure product development process includes static code analysis, secure code review, code signing, binary scanning and component inventory. Products are thoroughly tested by the Product Security Assurance Team and at times by an Advance Independent Testing Team. If vulnerabilities are identified after release, they are handled by the Product Security Incident Response Team. Cybersecurity issues dominated a consultant roundtable event on the second day of MercTech4. There was plenty of spirited discussion and some valuable insights among the 40 or so participating consultants. More to come on that in another article in the next couple of weeks.
The new vibration-proof Wisenet TRM-410S and TRM-810S NVRs manufactured by Hanwha Techwin are designed to be at the heart of video solutions for transport applications. Wisenet NVRs With a footprint of just 250mm x 210mm and offering two-way audio communication, the two new robust NVRs are EN50155, EN-50121 and EN-61373 certified. This makes them particularly suitable for deployment on buses and trains where they can be used to record video of passenger activity, as well as video of the road or track ahead, in order to provide evidence of any incidents. The new NVRs, which support H.265, H.264 and MJPEG compression, offer 4TB onboard video data storage, with the TRM-810S also offering the option of RAID. PoE/PoE+ support Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch, making them ideal for mobile applications as there is no need to install separate power supplies for cameras and monitors. Designed to offer the stable recording of event and location data as well as video, the two new devices complement the sixteen channel TRM-1610S and TRM-1610M NVRs and the three compact Wisenet X mobile H.265 dome cameras which were launched in 2018. Cost-effective video solution “Our two existing sixteen channel NVRs are proving to be popular among train operators who wish to record images captured by a large number of cameras installed in train carriages,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The introduction of the four and eight channel NVRs means that we now have cost-effective solutions for bus, coach and truck type applications.”
Pengsheng Industrial Park is the first investment project by a Chinese private enterprise in Uzbekistan that has been acknowledged and ratified by the governments of the two countries. Located in Uzbekistan's Sirdaryo state, the Pengsheng Industrial Park is the biggest non-energy cooperation project between China and the Central Asian country. At present, there are over 10 workshops covering various fields with a total number of more than 1,500 employees. As a model project of China-Uzbekistan cooperation, it has contributed to a large number of job opportunities and high output value for local economic development. High-End monitoring system The expansion of the production scale of the park brought inconvenience to management and the current simple front-end camera plus back-end storage video surveillance system cannot meet the growing production management and modern monitoring needs any more. Dahua provided the park with a complete, high-end monitoring system that contain over 500 HD cameras, 100 IP camerasDahua provided the park with a customized complete, high-end monitoring system that contain over 500 HD cameras, 100 IP cameras, central management, central storage, third-party contact as well as display and control system all around factory, fence, outdoor and indoor areas to protect the whole park. To better secure the access between the network of video surveillance system, the data is gathered from front-end devices by PON transmission to establish looped network for video surveillance and to ensure reliability. Advanced technology solutions This project is the first general contracted project with great significance in Uzbekistan. Dahua is not only the supplier of the equipment, but also responsible for the whole project life cycle including construction, delivery, system documentation, technical support, operation training and long-term maintenance. The solutions have effectively reduced the difficulty during production process, which greatly improved the management efficiency for customers. In the future, Dahua will continue to provide more advanced technology solutions such as face recognition, personnel and vehicle management IT systems, industrial machine vision, etc. for the Peng Sheng industrial Park.
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission Critical Communication Over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritized over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced Communication Solutions In Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritized delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones In MCC Over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value And Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC Over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organizations. From corporate buildings, to branch offices, data centers, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used from any site or from an external service provider's service center. Hence, VMS services are produced in the most cost-effective way whether it be locally, centrally or outsourced.The unique, non-fragmenting storage file system provided by Mirasys protects against hard disk failure The Mirasys VMS checks the system performance in real time and helps to prevent system failure. Enhanced multi-disk recording minimizes data loss and maximises recording continuity. The unique, non-fragmenting storage file system protects against hard disk failure. Benefits To Financial Sector Perimeter and motion detection monitors sensitive and restricted areas, such us bank vaults or safety deposit boxes, and alerts personnel only if an important event occurs, saving time and operational costs. People counting and other data reporting enables reduction of business inefficiencies and enhances customer service. Advanced alarm management tools enable the creation of specific alarm lists based on the motion, sound or text data triggers; reducing the number of false alarms. Dwell time and stopping detects people loitering at the ATM. Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilization.Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilization Recorded video watermarking guarantees the integrity and authenticity of recorded and exported video data for court evidence. User authentication and setting specific user rights ensures control of system access and protects sensitive data. Also, product features such as audit trail and versatile material management and search functionality support, e.g., the new EU General Data Protection Regulation (GDPR) requirements. The purpose of the audit trail events is both to show what the user has done, and also to track other (programmatic) changes that change the user interface. Key To Data Security Is Operational Policies For: account security (e.g., personal user accounts, instead of shared accounts, rename default administration accounts, etc.); password security (don't leave systems with default passwords, don't permit too short passwords, use passphrases instead, etc.), and; software and device firmware updating. Mirasys recommends that systems are kept up to date with the latest software versions. In a networked, multi-server or multi-site environment, all Mirasys VMS servers and client applications can be centrally upgraded from the Mirasys management server. Manage easily various event sources in multiple locations with the flexible Mirasys Smart Event Management platform How To Protect Your Surveillance Online For deployments, Mirasys recommends that surveillance cameras are installed, when possible, in a private camera network, where the direct camera communications take place only inside the camera network to VMS servers, and is separate from the client access (“viewing”) network (and from the public Internet, in particular). This also prevents the camera streaming and signaling from being forwarded inadvertently to any external systems not part of the VMS solution. In addition, camera access from outside the private network is thus not possible. It is also recommended to protect wide area network links with VPN (Virtual Private Networking), or other secured, connections.Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system For server-to-server and client-to-server signaling, the data communication is in Mirasys VMS both compressed and encrypted by default for sensitive data (such as usernames and passwords and other details). Integration And Internet Of Things In VMS With larger video management solutions, the integration of different systems is valuable because it allows automated functionalities that eliminate human errors and delays. Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system. IoT (Internet of Things) is increasingly applied in the video management. The sensors continuously provide information and, if necessary, based on this information, the predefined decision chains automatically open a video connection to the event place without any delay or error. The resulting snapshot may be one image or a set of several images that supports decision making in a problem situation. All the information is also stored for later processing. The event picture is routed either automatically or manually for people and organizations needing the information. Also, related Standard Operating Procedures can be automatically opened.Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer Mirasys VMS is quick and easy to install, and especially effective in networked, IP-based CCTV systems and their operational and management needs, such as centralized management and upgrading/updating of servers, drivers and client applications without requiring on-site travel to remote locations. User profiles are easy to create and change. Servers can be pre-installed and pre-configured before delivering to the deployment location. Easy-To-Use User Interface The Mirasys VMS user interface can be adapted to individual and specific needs and preferences and provides more visual space for videos without sacrificing any functionality. A HTML5 (Hypertext Markup Language, Version 5) based user interface in Version 8.4 offers easy access to the Mirasys system from anywhere; PCs, tablets or smartphones. Video surveillance camera features are consistently improving. Image quality can be exceptionally good compared to what it used to be only a few years ago. The newest cameras also require much less network bandwidth due to more effective encoding formats, such as H.265/HEVC (from 40% up to 60% of bandwidth and storage space savings, depending on the footage and device without any loss of quality, or increased quality at the same level with the H.264/AVC encoding) that many IP camera manufacturers have started to support. Individual servers can handle more simultaneously connected cameras than before, and the entire system has no actual upper limit. Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer, and the Mirasys based video management system can be designed freely using the best equipment for the customer-specific requirements and can support also all future needs.
Specified to provide a comprehensive security, health & safety and production management tool, SAIC General Motors Wuling (SGMW), is now operating a Hikvision-based HD surveillance system at one of the world’s newest vehicle manufacturing plants. Established in 2002 by a joint venture and investment between SAIC Motor Corporation Ltd, General Motors and Guangxi Motor Corporation, today, SGMW is an annual producer of 1 million commercial vehicles and passenger cars, including MPVs. To meet its ambitious automotive production plans, SGMW recently opened a third manufacturing plant located in Bekasi, Indonesia. Costing 700 million USD, the new factory is built on a massive 60-hectare site and is expected to contribute to the creation of some 10,000 local jobs, producing its first vehicles under the Wuling brand. Along with the adoption of General Motors’ Global Manufacturing System incorporating an advanced production layout, SGMW’s manufacturing philosophy leverages cutting-edge best practice ideas and management systems that capitalise on its available resources - building competitive value within its business operation. To provide the level of intelligent camera functionality and surveillance management required to meet the demands of the state-of-the-art SGMW factory project, the automotive manufacturer enlisted the help of Hikvision distributor, Prima Inovasi Teknologi. Across the entire site, the Full HD Smart camera network provides effective scene coverage and VCA alarm activation Smart Full HD Video Surveillance Installed by Autojaya, the 172 Hikvision Full HD smart video surveillance camera-based system was designed from the outset to deliver the best quality of imaging and intelligent functionality required by SGMW. Integrating Full HD capture, recording, decoding and display, the system utilises IP transmission over a local fibre Video Private Network (VPN). Using a mix of Hikvision DS-2DF8223I-AEL 2MP WDR Darkfighter IR PTZ cameras with Smart Tracking & Detection, DS-2CD6026FWD/E-L ultra-low light Smart Darkfighters, DS-2CD4A26FWD-IZ 2MP Smart Low Light cameras and DS-2CD6986F-H 8MP Multi-Imager Panoramic Dome cameras with 180° Horizontal View, the HD camera system supplies ultra-detailed imaging of every key internal and external factory location. Across the entire site, the Full HD Smart camera network provides effective scene coverage and VCA alarm activation, providing HD imaging and automated situation alarm handling for the factory’s vehicle production areas, components warehouse, restaurants, data centre, offices, perimeter fence line, and exit & entry points, via a bespoke ANPR subsystem. PoE Devices Along with the HD surveillance cameras, the system uses Hikvision DS-3E1318P-E Web-managed PoE Switches, DS-6916UDI HD Decoders and DS-96128NI-I24 128-channel Super 4K NVRs with up to 12-megapixel resolution recording, multi-format video encoding and HDD hot swappable storage to deliver ‘live’ and ‘recorded’ camera images to the factory’s Control Centre. To maximise the high-level of image detail that the HD cameras deliver, the system’s camera images are displayed on two massive video walls, consisting of multiple Hikvision DS-D2055NL-B LCD HD ultra-slim 55” display monitors. In the event of an incident or anything unusual taking place, the operators can react quickly, and select and review video information for analysis iVMS-5200 Enterprise Software At the Control Centre, SGMW operatives view the entire factory site on a 3D electronic E-Map render, with intuitive Smart control provided by Hikvision’s iVMS-5200 Enterprise Software. Using the 3D site map, operators can easily locate and select any system camera, and control specific camera live or recorded video, along with video preview of triggered alarms, with their precise locations displayed via graphical icons on the factory E-Map. Using the Enterprise Class Hikvision HD camera-based system, operators can monitor in real-time, every stage of the vehicle production line process in finite detail. In the event of an incident or anything unusual taking place, the operators can react quickly, and select and review video information for analysis and reaction to the case, to keep vehicle production safe, whilst maintaining production and management efficiency. Archived Video Data Monitoring The system’s archived video data can be accessed for use by many factory departments, to provide visual information to remedy specific problems and support improved manufacturing and management efficiency, as well as the factory’s health & safety environment. Vehicular traffic is managed by a separate Hikvision ANPR subsystem with automated Whitelist and Blacklist alarm management, to ensure fast and smooth traffic flow in and out of the factory. Using Hikvision Smart camera VCA alarm functionality, the system has been configured to provide the highest level of protection and safety" ANPR Subsystem “The Hikvision surveillance system supports SGMW’s site-wide management needs across many disciplines,” comments Bella, lead engineer of SGMW. “Using the cameras for multi-functional applications enriches the efficiency, security and implementation of best practice management across the whole factory, paying back its initial return on investment and operational value many times.” “The system’s end-to-end unified hardware and software delivers advanced situation awareness of the factory’s personnel, vehicle production line, paint shop, data centre, offices and finished vehicles storage,” explains Mr. Arijanto, Director of Autojaya. “Using Hikvision Smart camera VCA alarm functionality, the system has been configured to provide the highest level of protection and safety for factory personnel, assets and site facilities. Any unauthorised access attempt to the site’s perimeter or internal restricted areas are all covered by the system, offering advanced protection whilst reducing the number of security guards needed.”
Wavestore, the British manufacturer of open platform video management solutions is helping to detect the presence of hooligans at three of the largest football stadiums in Montevideo, Uruguay. Working in conjunction with Systems Integrator partner DDBA, Wavestore’s VMS has been deployed at the Centenario, Penarol and Nacional stadiums to enable the police and security personnel to identify known troublemakers and prevent them from gaining entry to any of the grounds. Facial Recognition Technology The project, which has seen Wavestore installed within the stadiums’ control rooms as well as in mobile police units, was won following an extensive evaluation process in which Wavestore and technology partner, Herta, a provider of state-of-the-art facial recognition software, proved to be highly effective compared to those offered by other manufacturers. Manufacturers competing for the project were allocated a specific period of time to set up their integrated solutions to demonstrate the ability to detect and identify 40 people who had been entered onto a database and who were randomly integrated with an estimated 50,000 football fans approaching the stadium entrances to attend a match. When the results of the tests were analyzed, it was found that Wavestore and Herta had been able to detect 39 of the 40 targets, even though many were wearing hats, scarves and dark glasses. The one person who was not detected had completely covered their face. The contract to install the video surveillance systems comprising of a fully integrated Wavestore/Herta solution and multiple HD cameras, was awarded to DDBA Wavestore-Herta Video Surveillance System The contract to install the video surveillance systems comprising of a fully integrated Wavestore/Herta solution and multiple HD cameras, was awarded to DDBA, a leading security and IT infrastructure systems integrator. “As is the case in many countries in the world, football stadiums in Uruguay have regretfully experienced anti-social behavior on match days,” said German Ruiz, a Director of Montevideo-based DDBA. “With a zero-tolerance policy towards hooliganism, the Football Association of Uruguay made the decision to invest in technology that would recognize the relatively small number of individuals who could endanger and spoil the enjoyment of the many thousands of people attending the games.” When disruption occurs during a football match, images captured by the cameras are used by police and security personnel to identify and apprehend those involved. The images are then added to a database of undesirable attendees. The entire video data from every match is transferred into a large data system, maintained at the Ministry of Interior, to enable the police to retrospectively analyze key data The entire video data from every match is transferred into a large data system, maintained at the Ministry of Interior, to enable the police to retrospectively analyze key data and search for individual images over a period of years. IP Cameras and Video Recorders Multiple Axis 20 Megapixel IP cameras from have been installed within the three stadiums in order to monitor seating and terrace areas, while high definition Axis Q6055 32x PTZ cameras are being used by operators to zoom into see close up detail of any incidents. In addition, Axis P1365 IP cameras chosen specifically to support facial recognition, have been installed at all entrances to each stadium, as well as in police mobile units located to monitor the streams of fans as they progress towards the stadium along the footpaths. The stadiums and the Ministry of Interior have been equipped with Wavestore X-Series recorders plus additional servers maintained on standby for failover purposes. All are 4U rack-mounted with 24 hot-swap hard drives. Data Storage and Analysis The client was also impressed by Wavestore’s robust data recording technology, which is extremely fast and enables specific video data to be located and displayed instantaneously A careful and detailed analysis of the network needed to support the aggregated bandwidth of all the cameras operating concurrently, as well as user demands at the various monitoring stations and display walls was carried out. According to German Ruiz, it is one of the many reasons why Wavestore’s high-throughput servers were chosen for the project. “The client was also impressed by Wavestore’s robust data recording technology, which is extremely fast and enables specific video data to be located and displayed instantaneously,” said German. “Exporting video clips from the Wavestore system is also very quick and easy, requiring just a 3-click process.” Commenting on the success of the project, Chris Williams, Project Director of Wavestore Global Ltd said: “As a British manufacturer we are proud that the quality and the price/performance ratio of our solutions is enabling us to win projects as far afield as Uruguay. Equally important, we are delighted to have proven our ability, and value the opportunity we have had to work with DDBA and Herta who have used their respective expertise to contribute towards the success of this prestigious project.”