Canadian-based video surveillance and business intelligence front-runner March Networks® announced the completion of its acquisition by Delta, a global pioneer in power and thermal management solutions. Through its subsidiary Delta International Holding Limited B.V., Delta acquired 100% of the shares in Infinova (Canada) Ltd., owner of March Networks, from Infinova International Ltd. About March Networks Headquartered in Ottawa, Ontario, Canada, March Networks is a global pioneer in enter...
Simon Shawley, Business Development Manager at Smart R Distribution, explains “How recent advances in video recording technology means that installers can help end-user clients to extend the life of their existing analog CCTV systems, while enabling them to migrate to a full IP network based video surveillance system, at their own pace.” IP network-based video surveillance solutions offer users significant advantages over traditional analog CCTV systems. These include the ability to...
The new IDIS Intelligent Video Wall Station, designed as a simple plug-in for the cost and license-free IDIS Center VMS, brings the benefits of video wall services to a wider market, including smaller and mid-sized customers. The new offering makes it easier for businesses to plan, design, configure, and use dynamic video walls. It lets them optimize safety and security, with centralized monitoring for single or multiple-sites, without the traditional price tag. IDIS Intelligent Video Wa...
Userful Corporation, the globally renowned provider of the software-defined solution for the enterprise AV-over-IP market, has announced its latest software release, which includes advancements to its IT-based Visual Networking Platform, expanding its support for large-scale corporate digital signage deployments. Emerald Signage Early in 2021, with its launch of Emerald Signage, Userful Corporation modernized digital signage for the enterprise, by converging the content creation and delivery f...
Moxa Inc., a globally renowned company in industrial communications and networking, with a focus on securing industrial networks, has introduced the new EDR-G9010 Series. These industry-certified, all-in-one firewall/NAT/VPN/switch/routers, act as a robust first line of defense for industrial networks, in diverse applications, such as smart manufacturing and critical infrastructure. EDR-G9010 Series industrial secure routers Moxa’s EDR-G9010 Series industrial secure routers offer 10-por...
Matrix, an acclaimed industry-leading manufacturer of Telecom and Security solutions is enthusiastically gearing up to showcase its plethora of pioneering solutions at the GITEX Technology Week 21. The event is being conducted at the Dubai World Trade Centre, Dubai from 17th-21st October’21. Since its inception, the exhibition has always been a witness of first-hand technologies that are tailored to redefine the way the high-end technological world functions. Launching telecom solut...
The 5 new Wisenet P series AI NVRs (Network Video Recorders) launched by Hanwha Techwin are able to apply AI metadata to images captured by most non-AI Wisenet cameras, allowing users to quickly and accurately search for people, and vehicles. Deep Learning AI video analytics The license-free Deep Learning AI video analytics onboard the NDAA-compliant NVRs offer a wide range of search criteria, including, for example, looking for people of a certain age group or gender, as well as whether they are wearing glasses or carrying a bag. Similarly, a search for vehicles can be narrowed down to those of a particular color and whether they are a bicycle, bus, car, motorbike or truck. The Network Video Recorders can also be set up to trigger real-time alarm notifications, if an object is detected. Support for wide range of cameras The new devices are able to support all the features built into the Wisenet P series AI cameras Selected bullet, fixed, PTZ, 360° fisheye, multi-directional and thermal cameras from the Wisenet X, P, Q and T series, are among the long list of cameras that are supported by the new Wisenet P series AI NVRs. In addition, as is the case with 32 and 64 channel Wisenet X NVRs, the new devices are able to support all the features built into the Wisenet P series AI cameras, including the classification and detection of faces and license plates. Operators can take full advantage of the Network Video Recorders’ functionality, with the help of UX 2.0, a brand-new user interface that offers zoom in/out and drag & drop support, and a timeline preview feature, as well as enabling all event settings to be edited in a single window. Wisenet P series AI NVRs Other key features shared by the Network Video Recorders (NVRs), include the following: Up to 400Mbps network camera recording, at up to 32MP recording resolution Up to 16 SATA HDD bays, each offer 10TB storage data capacity. RAID-5 and RAID-6 support Dual 4K and 1080p HDMI outputs Simultaneous playback across all channels Dynamic event support, including e-mail alerts, PTZ preset control of PTZ cameras, control room buzzer, and monitor Support for Wisenet AI and 8K cameras, and improved compatibility with all Wisenet PTZ, multi-directional and thermal cameras ONVIF Profile S conformant WiseStream II complementary compression technology The NVRs feature WiseStream II complementary compression technology, which improves bandwidth efficiency by up to 75%, in comparison to current H.264 technology, when combined with H.265 compression. The ability of the NVRs to support cameras, which are dual streaming video at different resolutions, can further reduce bandwidth requirements. The Network Video Recorders’ SATA HDDs are supported by Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T) The Network Video Recorders’ SATA HDDs are supported by Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T), which detects and alerts operators, to any possible imminent hardware failures. Offering N+1 failover support, the NVRs also feature Automatic Recovery Back-up (ARB), to provide continuity of recording and remove the risk of video evidence being lost. Automatic Recovery Back-up (ARB) facilitates the transfer and seamless storage of the images stored on a camera’s SD card, if communication between one of the Network Video Recorders and a Wisenet camera is disrupted. In addition, the new PRN-6405DB4 NVR is equipped with a dual switched-mode power supply (SMPS), to provide continuity of recording for mission-critical applications. GDPR compliance support and easy configuration Security personnel can apply bookmarks, in order to prevent the important video from being overwritten, with the NVRs programmed to automatically delete the bookmarked video, after a defined time period, so as to ensure compliance with GDPR. The installation time of the new Network Video Recorders is minimized, by the ability of engineers to remotely connect to the NVRs. This is achieved via a smartphone or tablet, without having to set up a complex network, by using P2P and unique QR product codes. Furthermore, the NVRs can be easily configured to match an end user’s requirements, with the help of an intuitive interface and installation Wizard. The new Wisenet P AI network NVRs are as follows: PRN-1605B2: 16 channel AI NVR. Up to 8 channels providing AI support. 2 HHD bays PRN-3205B2: 32 channel AI NVR. Up to 16 channels providing AI support. 2 HHD bays PRN-3205B4: 32 channel AI NVR. Up to 16 channels providing AI support. 4 HHD bays PRN-6405B4: 64 channel AI NVR. Up to 32 channels providing AI support. 4 HHD bays PRN-6405DB4: 64 channel AI NVR. Up to 32 channels providing AI support. Dual switch mode power supply (SMPS). 4 HHD bays Powerful detection tool “The accuracy of the Deep Learning AI video analytics incorporated into these new NVRs provides security personnel with a powerful tool to detect and track people, or vehicles that may be involved in criminal activity,” said Uri Guterman, the Head of Product & Marketing for Hanwha Techwin Europe. Uri Guterman adds, “By eliminating false alarms, which can occur when standard motion detection technology or sensors are being used to detect activity, the NVRs significantly reduce time wasting and allow security personnel to focus on responding to real incidents and emergencies.”
Yeastar, the provider of SME PBX systems released a major update of its P-Series PBX System, introducing video conferencing, remote access service, WebRTC audio & video calling, and more much-anticipated features, to elevate work-from-anywhere communications for SMEs. P-Series PBX System is a “PBX-Plus-More” solution that encapsulates a range of functionalities and services, and this update makes it even more versatile. New capabilities include: Video conferencing Built for SMEs’ essential meeting needs, Yeastar’s integrated video conferencing solution allows face-to-face meetings on the web browser for instant communication among team members and customers from anywhere, along with screen sharing and team chat to stay interactive. Linkus Web Client supports 1:1 audio & video calling to colleagues, contacts, and customers beyond the organizations Enhanced Linkus UC Clients Linkus UC Clients make a suite of call, conference, presence, enterprise contacts, and collaboration available from a single interface using mobile phones, desktops, and web browsers. Besides video conferencing, Linkus Web Client also supports 1:1 audio & video calling to colleagues, company/personal contacts, and customers beyond the organizations. Remote access service The Remote Access Service provides a Yeastar supplied domain name and gives full backing for always-on remote connectivity, instant secure access, and consistent in-office UC experience for P-Series PBX users. It greatly eliminates configuration headaches of setting up remote working environments. Hybrid workplace solution P-Series is a more sophisticated solution to support today’s agile workforce and tomorrow’s hybrid workplace" “With this upgrade, we are shaping the P-Series into a more sophisticated solution to support today’s agile workforce and tomorrow’s hybrid workplace,” said Prince Cai, Vice President of Yeastar. “In the future, we are looking to add cloud-based and software deployment options, more UC capabilities, and more 3rd-party integrations to bring “boundless” communications for SMEs.” Yeastar will be live broadcasting on January 27 at 5:00 p.m. GMT+8 to show these new features in detail. It will be streamed on the following platforms: Yeastar Website Yeastar YouTube Channel
Yeastar, the provider of SME PBX systems celebrates its 15th anniversary, continuing a legacy of elevating and transforming business communications. Grown into an industry pioneer, Yeastar is ready to set sail for the next ambitious adventure, aiming at enabling successful digital transformation for SMEs and helping them realize sustainable value from it. Communications solutions From 2006 to date, Yeastar has established a global partner network across 100+ countries, providing best-in-class communications solutions for 200,000+ businesses. Yeastar has been awarded and recognized by TMCnet, Eastern Management Group, Funkchau, etc. for product excellence and business performance. All these are reflections of Yeastar’s passion and commitment to addressing evolving customer needs and thriving with its partners. Yeastar released PBX-Plus-More solution to accelerate towards unified communications and exceed expectations P-Series PBX System Last year, Yeastar released a brand-new product, P-Series PBX System, a “PBX-Plus-More” solution, demonstrating its determination to accelerate towards unified communications and exceed customer expectations. Later this year, more features, integration, deployment options will be released for the P-Series to make it an ever-more impressive communications system. Digital workplace solution Going forward, Yeastar is getting bolder. It is looking to navigate a wider variety of modern workplace challenges by incorporating the latest technologies and expanding its offerings, starting with the rollout of a digital workplace solution. Besides, Yeastar’s new office building will also be an inspiring and experimental digital workplace, showcasing the integration of Unified Communications, Smart Office, and Intelligent Security technology. Digitalisation for SMEs “The past 15 years is an amazing journey. I want to thank all our employees, partners, and customers for supporting us along the way,” said Prince Cai, Vice President of Yeastar. “We will maintain our innovative spirit and keep working on connecting, streamlining, and digitalizing the workplace for SMEs. We are looking forward to an exciting and promising future.”
Wasabi Technologies (Wasabi), the globally renowned hot cloud storage company, has announced a new partnership with Rasilient Systems, the pioneer in forensic-grade video surveillance systems, to deliver industry-renowned hybrid cloud storage solutions for video surveillance deployments at the edge. Wasabi - Rasilient partnership This partnership combines the strength of Rasilient’s surveillance system optimization with Wasabi’s unlimited scalability and disruptively low cost, so users in industries with multiple distributed locations, such as healthcare networks, education systems, and retail branches, can effectively handle the rising amount of video being captured, at previously deemed ‘unserviceable’ or ‘difficult’ remote locations. With the ever-increasing amount of data produced by video surveillance applications, moving and archiving infrequently-accessed video to an offsite, secure, and reliable storage environment is the only way to keep up with the demand of footage being generated at the edge. Unfortunately, this is nearly impossible for remote locations, due to the limited bandwidth and connectivity needed to send video files, without the risk of frame drop, video degradation, and data corruption. Fast and reliable hot cloud storage Wasabi is 80% less expensive to store video recordings, in comparison to traditional cloud providers Now, with Wasabi’s affordable, fast, and reliable hot cloud storage on-demand, Rasilient customers can shorten upload windows and quickly access their video files for faster retrieval times, with a highly scalable repository for their video management software (VMS), which supports high camera counts, high definition resolutions, high frame rates, and long retention periods, all demands of modern video surveillance deployments. Wasabi is 80% less expensive to store video recordings, in comparison to traditional cloud providers and there are no fees for egress, or API requests. This lower cost allows customers to utilize video surveillance, not only for security and safety but for a variety of uses to cost-effectively monitor operations for business optimization and process improvement, while holding on to that footage forever, so they can refer back to it whenever necessary. Collaboration to offer cloud and edge hardware The two companies have partnered up to offer cloud, edge hardware, and secure transmission in a simple, predictable RMR pricing model, as well as omitting the expensive and fluctuating costs that are traditionally associated with cloud storage solutions. “With modern systems capturing more evidence and anomalies than ever before, there is a surging demand for increased storage capacity that is scalable, dependable, and secure,” said Sean Chang, the Co-founder and Chief Executive Officer (CEO) at Rasilient Systems. He adds, “By partnering with Wasabi, we’re able to provide our customers with a hybrid cloud solution that is affordable, fast, reliable, and secure, so they are properly equipped to manage the growing volume of video captured across locations.” VMS-agnostic NFDLink communication software Rasilient Systems’ patent-pending, VMS-agnostic NFDLink communication software enables the use of commonly available broadband wired or wireless internet services, to send and receive forensic-grade video recordings directly to and from the Wasabi cloud. Wasabi’s flexible storage capacity allows organizations to leverage NFDLink, to archive infrequently accessed video to Wasabi from any VMS, while keeping frequently accessed video on-site with Rasilient edge devices. PrivateLok for zero-knowledge encryption at the edge Rasilient Systems’ PrivateLok provides zero-knowledge encryption at the edge Rasilient Systems’ PrivateLok provides zero-knowledge encryption at the edge, to add cyber security on top of Wasabi’s safe and secure environment. Only the edge user holds the key, so even if the network was somehow compromised, no one could view sensitive video data. Wasabi is deployed in fully secure and redundant data centers that are certified for SOC-2 and ISO 27001 compliance. The service is architected, in accordance with industry-renowned security models and design practices. Organizations can configure their individual video files or storage buckets to be immutable for a user-defined retention period (in increments of days, weeks, months, or years). High levels of immutability Designated video files or files written to that bucket cannot be deleted or altered in any way, by anyone, throughout its storage lifetime. This level of immutability helps Rasilient customers comply with state and local government regulations. “Industries that operate in multiple locations, such as healthcare, government, education, and enterprise retail, may have a blend of software at different sites, often times not having one standard VMS across all locations.” said David Friend, the Founder and Chief Executive Officer (CEO) of Wasabi Technologies. He adds, “This scenario makes it difficult for organizations to keep up with increasing levels of video surveillance at the edge, in a secure and cost-effective manner. Rasilient has created a surveillance solution that is dependable, can be used in remote areas, and can cover multiple sites. We’re excited to partner with Rasilient, to provide their customers with a flexible, cost-effective, and secure cloud storage solution that caters to the modern demands of video surveillance.”
Videx has added a series of new features to its IPure IP range, expanding the versatility of the system in providing a high-quality entry solution for a wide range of buildings. The Videx IP system is an expandable system that can be customized to suit a range of entry needs, accommodating up to 42 apartments using conventional call button modules and vandal-resistant panels or a digital call panel option able to call up to 10,000 apartments. All entrance panels are available with voice annunciation to aid visitors during the call progress and proximity access control. New features of IPure IP range The new features include a 7” touch screen handsfree video monitor, a 3.5” touch screen handsfree video monitor, an audio IP telephone, and the Cloudbox which allows additional programmable input/output to be added to the system as well as being a gateway to using the app in apartments which don’t have a video monitor. The new hands-free video monitors complement the existing 3.5” touch screen video phone with the handset. Up to 16 devices can be included in each apartment with advanced cascading flexibility if required. IP controlled entry solution The benefit of IP tech is that it doesn’t require dedicated infrastructure and can be used on existing networks " James Gray, National Sales Manager at Videx, said, “IP controlled entry is one of the most convenient and flexible solutions available.” “The huge benefit of IP technology is that it doesn’t require dedicated wiring infrastructure and can be used on existing networks. These networks can be shared with other technologies such as CCTV, building management and many others including FTTH/PON infrastructures.” “By adding even more features to our IP offering, we’re offering great flexibility and greater convenience. A new user interface has been introduced which complements the look and feel of the system across all platforms and can also be rolled out to existing systems through a firmware upgrade.” Customizing systems using PC wizard “What’s more, our IP system is managed through a simple PC wizard program which allows the installer or engineer to completely customize the system to the building’s requirements. The wizard will detect all the devices on the system allowing each to be set up as required and will also advise of any new firmware available.” “Using the wizard, the system can be connected to the cloud allowing users of the iOS and Android apps to receive calls recall entrance panels with video and activate any of the outputs.” Streamlining video systems SIP is allowed to be integrated into third-party SIP telephone systems SIP is supported across the range allowing it to be integrated into third-party SIP telephone systems. For further integration, the door panels include an RTSP server allowing video to be streamed to third-party systems and HTTP API to be used by third-party systems. Added Features The 7” monitor with full touch screen also has several added features which build on the vast range of features already offered on other video monitors in the range. These include third-party camera integration using RTSP with support for H264 & H265, home automation integration, picture in picture viewing, a built-in webserver to access event logs, captured images, and videos to playback, and an optional Wifi connection. Further features can be added with a simple firmware upgrade.
Yeastar, the provider of SME PBX systems announced that it will unveil its new product, P-Series PBX System, during a virtual launch event on Tuesday, October 27 at 5:00 p.m. GMT+8, featuring product walkarounds and a live Q&A session. Already a major player in the SME communications market globally, Yeastar is looking to serve SMEs that have higher expectations with its new product. The live event will be streamed on the following platforms: Yeastar Website Yeastar YouTube Channel Features of P-Series PBX System The launch event will show SMEs how to elevate business communications with a “PBX-Plus-More” system Yeastar has released a teaser video of what is yet to come revealing some cool features of the P-Series PBX System. As a major step in bolstering Yeastar’s portfolio, P-Series PBX System converges voice, mobility, presence, call center, web application, collaboration, and more to perform beyond any average PBX system. The launch event will show small to medium-sized businesses how they can rely on Yeastar to elevate business communications with a “PBX-Plus-More” system that offers more functionality, convenience, and possibilities. Digital transformation and remote working “We are very excited about the launch of P-Series PBX System and our first live launch event,” said Alan Shen, CEO of Yeastar. “With the trend of digital transformation and the new normal of remote working, SMEs’ expectations on their PBX systems are on the rise.” “What they ask for are not merely telephony functionality, but also user experience, ease of management, business productivity, and customer satisfaction. That’s why we are bringing the P-Series to the market, to best cater to the dynamic needs of SMEs.” P-Series PBX System was launched in beta in September and received well by over 400 enthusiastic and experienced beta customers and it will be generally available after the launch event on October 27.
Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offices and other workspaces will be tasked with supporting a hybrid work solution, as well as increasing hygiene measures. Video intercom solution This is where an IP video intercom solution can assist. Below are four ways they can help usher in a smarter, safer work environment: Video intercoms assist in creating a more hygienic work environment - The outbreak of COVID-19 has raised awareness of germs and just how easily a virus can be transmitted by face-to-face contact. Germ barriers are popping up in many aspects of our daily lives, where we were not likely to see them before Unfortunately, the door is also the easiest of these germ barriers to breach As such, we’re becoming accustomed to seeing plexiglass barriers at restaurants, grocery stores, and even coffee shops. However, many don’t realize that one of the best germ barriers is a simple door. Unfortunately, the door is also the easiest of these germ barriers to breach. All it takes is a knock or a doorbell ring to make us open our germ barrier and be face-to-face with whomever is on the other side. Increasing hygiene safety A simple step to increase hygiene safety and visitor security in commercial buildings and workspaces is an IP video intercom. Installing a video intercom will allow staff to see and speak with visitors without breaching that all-important germ barrier. A video intercom system provides a first line of defense, enabling the user to visually confirm the identity of the person on the other side of the door first before granting access. It can also be used to make sure proper procedures are being followed before a person is allowed to enter, such as using hand sanitizer, wearing a mask, and following social distancing guidelines. Basic security needs A major topic of conversation the past year has been how to manage occupancy in all facilities Video intercoms for occupancy management and basic security - A major topic of conversation the past year has been how to manage occupancy in all facilities—ranging from grocery stores and retail shops to restaurants and commercial buildings. Workspaces and offices are no exception. A video intercom provides a quick and convenient method of seeing who, or what, is on the unsecure side of the door before opening. For basic security needs, if a business has a door opening into an alley, a video intercom would be used to ensure no one is waiting outside to force their way in when the door is opened. Personal protection equipment Such solutions can also be used to ensure a person is carrying proper credentials, or wearing proper personal protection equipment (PPE), before entering a sensitive area. For example, if a lab has a room which can only be accessed by two persons at a time wearing specific protective gear, a video intercom could ensure each person is properly equipped, before allowing access that particular room. Additionally, for office or workspaces that have shared common areas, such as a cafeteria, gym or even conference rooms, managing access to these spaces will remain a priority, especially with post-pandemic restrictions in place. Video intercoms are a comprehensive safety and security tool for any workspace Deliveries of packages, work-related materials, or even food are common in any office or workspace. Video intercoms can assist in facilitating safe deliveries by visually and audibly confirming the identity of the individual. The visitor could be your next big client, your lunch delivery, a fellow employee with a faulty access card, or your mail. Video intercoms are a comprehensive safety and security tool for any workspace. Visitor management systems Video intercoms provide a cost-effective solution in small to mid-sized office facilities - One significant advantage of video intercom systems is the variety of applications available. Systems range from simple one-to-one video intercoms, to buzz-in systems, to full-fledged visitor management systems in mixed-use buildings. While they might lack the resources and manpower many enterprises have, small-to medium-sized offices can also take steps to ensure the safety of their staff and customers. Like any business, controlling who comes into the building is a primary way of maintaining safety. Video intercoms work in conjunction with access control systems to provide an identifying view of visitors or employees with lost or missing credentials. They allow staff to both see and hear those on the unsecured side of the door to determine intent before granting access. Most quality video intercoms will provide a clear enough image to allow an identification card to be read by holding it close to the lens, adding another opportunity to verify identity. Touchless intercom activation One major trend is the option of providing a touchless door activation Video intercoms provide a touchless option - Even prior to COVID-19, one major trend is the option of providing a touchless door activation or touchless intercom activation of a video intercom for those without proper credentials. Though touchless isn’t a new solution to the access control market, the pandemic introduced a renewed focus on these types of solutions to provide hygienic access to visitors. For offices and other workspaces looking to make investments into post-pandemic solutions to assist in reopening, touchless can support these efforts. When it comes to smart, secure workspaces, many people think instantly of cameras or monitors, access control, and alarm systems. Proper access credentials However, video intercoms are often the missing piece of a building’s security puzzle. A video intercom provides an identifying view that is not always available from a camera covering a large area. They allow those without proper access credentials a method of requesting entry, and just like cameras, they can be activated by alarms to allow staff to clearly see and communicate. If a workspace or office is important enough to be secure, it’s important enough to be sure of who is there before the door is opened. In 2021, it’s not enough to ensure the physical security of your staff and visitors, but also to ensure they are accessing a hygienic environment. Video intercoms provide that security and peace of mind.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types Of Access Control Authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organizations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasize, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organizations want to use smart phones in their upcoming access control implementations. Smart Phone Access Control Is Secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices. Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone.All that should be needed to activate newer systems is simply the phone number of the smart phone Bluetooth And NFC The Safer Options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defense of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging Systems Could Cause Problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organizations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organizations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Transom, Hart has taken on an interim line role at Pelco as Vice President of Product and Strategy. After helping to oversee Pelco’s rebuilding phase, he expects to step away from daily involvement over time. “We have gained an appreciation for nuance [since the acquisition closed],” he said. “The channels, the relations, how people buy in this industry are very nuanced. Who’s gone where and who’s done what? The interplay of hardware and software. We have gained appreciation for the nuance. And we need to be surrounding ourselves with people who know the industry, who know the multi-dimensional areas.” Transition from analog to IP systems We have to focus on who our customers are specifically and understand their needs” It’s a “transformative moment in the industry,” says Hart, given industry changes such as price erosion and the transition from analog to IP systems. “We are about to go into the world of added intelligence. It’s an interesting time to buy a security company.” Hart says the Pelco brand still has value: “The market is rooting for us.” There is also a strong portfolio of people and products to build from. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. A new CEO is being recruited; otherwise, “we have a great executive team” in place, including Brian McClain, COO and President, says Hart. “In defining the new company, we have to decide first and foremost what we want to be,” says Hart. “What can we provide customers? We have to focus on who our customers are specifically and understand their needs and use cases.” Part of defining the new company is to become more aligned with a specific set of verticals that fit with Pelco’s capabilities (although they are not saying which verticals those are yet). However, “we can’t ignore what we are today as we make the transition,” says Hart. Innovation in products We want customers to see innovation in products to a point when people will say ‘this is Pelco’" “We have to let the products and experience speak for themselves. We’re focused on getting our ducks in a row and going in a new direction, but actions speak louder than words,” he says. The changes will be “more organic;” don’t expect to see a big announcement. “We want customers to see innovation in products and customer support and get those things to a point when people will say ‘this is Pelco,’” says Hart. Although not exhibiting at GSX, I found Pelco occupying a meeting room near the show floor. The room gave the company a chance to respond to integrators and consultants at GSX who had questions about what was going on with the acquisition. “Everybody is rooting for us, and we wanted the ability to get out and say ‘we’re here, we’re doing things, and we’re excited about the future,’” said Stuart Rawling, Pelco’s Vice President, Market Strategy. “This is a time for people to come and see us who maybe haven’t seen us in a while.” By ISC West in the spring, Pelco expects to have a clear message of who they are and where they’re going, he says. Aligning needs of end user “We are excited about the work we are seeing internally,” which includes “aligning resources in the right way,” says Rawling. “The fruits of the labor are being seen internally now. We will be launching new products in the next eight months, although there will not be a defined moment in time when we say ‘this is it.’ It will just be happening. Next year will be an exciting time industry-wide, and product-wise, and Pelco will have a strong voice. Brendan and team have kept us extremely busy,” says Rawling, who also was part of Pelco in the “glory days” before the acquisition by Schneider Electric. We’re so optimistic, when you combine the people and the brand and what’s happening the market” “The work product has been so transformative mindset-wise for the employees. Everybody has had the opportunity to talk to the [new] owners about what type of company we are. We can set our own vision and get reenergized and get back to the core belief of what Pelco was and what it should be. We are the master of our own destiny, aligning needs of end user with the products we can deliver. We are putting the right processes in place that work for this market. It is an exciting prospect.” In the new era, Rawling expects to target marketing more toward end-users, because they have more influence on product selection than ever before, he says. End users often learn about new products online, so Pelco will be looking to target its marketing toward educating various vertical markets about available technologies and their use cases. “We’re so optimistic, when you combine the people and the brand and what’s happening the market,” says Hart. “We have to do the work. We’re excited about what we are seeing internally.”
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission Critical Video Surveillance Solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralized storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralized data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate Access To Video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance Of Video In Risk Mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying The Right Video Server Equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyze the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analyzing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analyzing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analyzing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video Transmission And Privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organizations to optimize how video data is transmitted depending on their particular needs. For example, while some applications may favor a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximize accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR For Physical Security Professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organization, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organization.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specializes in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting Video Surveillance Systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
UNC Greensboro (UNCG) is one of 17 campuses within the University of North Carolina system. Founded in 1891, UNCG is the largest and most diverse university in the Piedmont Triad region, serving more than 20,000 students and employing approximately 2,800 faculty members. UNC Greensboro (UNCG) The university is in the heart of Greensboro, which boasts nearly 260,000 people, making it visible within the larger community as well. Landlocked by local streets, the 200-acre campus with 30 buildings poses unique security issues, as it is crisscrossed with major roads, making it a priority to ensure pedestrian and bicycle safety. UNCG has its own police department (UNCG PD), with more than 40 members, who ensure the safety of the campus As a public institution, UNCG is also largely open to the community and hosts numerous events, activities, and services, which are regularly accessed by residents of nearby neighborhoods and the city of Greensboro at large. UNCG has its own police department (UNCG PD), with more than 40 members, who ensure the safety of the campus. UNCG PD relies on its video surveillance system to alert them to incidents, record video for forensic purposes, and also provide video analytics for traffic and crowd control. Proactive video surveillance and camera system With a growing campus and rising security needs, UNCG PD, with the help of its systems integrator, NETCom Cabling and Security Systems, located in Greensboro, North Carolina, recognized it required a more efficient and proactive video surveillance and camera management system. The days when DVRs could provide the necessary recorded data quickly, gave way to the need for a more responsive approach, such as a shared enterprise system, to bring together cameras, recording, and the intelligent usage of both. The exacqVision platform and Z-Series video recorders UNCG PD’s foray beyond the NVR/DVR world began with the installation of the exacqVision platform, starting with its Z-Series recorders, to cover its parking decks. From there, it began to incorporate a hybrid platform, including exacqVision VMS, to support the analog cameras used for the parking decks, as well as the IP cameras being installed for security elsewhere. The migration began several years ago, but today the campus boasts nearly 900 cameras in use, with about 700 IP and the remainder analog. Each recorder can handle up to 128 IP cameras and 64 analog ones, and it works with thousands of IP camera models. Within that time, the UNCG PD has also grown to become a state-of-the-art department, with its own command and emergency operations center, where it can monitor and manage its video surveillance system. Intuitive video surveillance system In selecting the exacqVision Z-Series, UNCG’s police department was seeking an intuitive system In selecting the exacqVision Z-Series, UNCG’s police department was seeking an intuitive system that would put the necessary information at the fingertips of whosoever was on duty. It was also critical to deploy a system with built-in redundancy, to protect against any data loss, in the event of a power issue or system fail. “It’s a pretty easy end-user experience for our officers, without a lot of technological background,” said Joshua Green, Technical Services Analyst for the UNCG PD. Scalable video security system The software within the system makes it simple to perform tasks, such as playing back recordings or searching for data, using a single screen. One of the biggest benefits of the Z-Series is its scalability, offering one of the largest processors and fastest speeds of the DVRs on the market. The system’s design also makes it easy to add new cameras and licensing. One of the common usages of the exacqVision platform is for traffic management. Using the video from the exacqVision system, they can perform tasks, such as counting parking spaces, to know when a parking lot is full, as well as to watch crosswalks, to see how pedestrian and vehicle traffic is moving, or where people are congregating. Key inputs for efficient resource allocation It can also be used to help the police department determine where to put resources. For example, how many people are in the workout room and does that area need extra patrols, or are there concerns about equipment in the computer lab and how should that be monitored? There is also time savings to be gained, by working with exacqVision VMS platform There is also time savings to be gained, by working with exacqVision VMS platform, a system that lets the user easily search recorded video, with a timeline search. Green recalled an instance when someone was concerned that an iPad had been stolen, but a quick check of the video showed within a matter of minutes that the item had been safety stored away, rather than taken. UNCG, NETCom and Intelligent Marketing Inc. partnership As a long-time user of the Z series and exacqVision VMS, UNCG, NETCom and Intelligent Marketing Inc. are quick to share their success stories and concerns to improve the product. “These guys, (Tim Reese, Sergeant for the technical services area, and Green), are working with Exacq engineers on changes that everyone will benefit from,” such as improvements to the mapping feature,” said Bob Moulton, North Carolina’s Territory Manager for Intelligent Marketing, a security manufacturer representative firm that works closely with end-user customers. Smart video surveillance solution The ability to make integrations down the road, because of the scalability of the system, whether it’s adding card access or expanding the number of cameras, makes the Z-Series a smart strategic investment for the university. We are looking to the future of our surveillance system to ensure the safety of the university’s students" “We are looking to the future of our surveillance system to ensure the safety of the university’s students, faculty and visitors,” said Tim Reese, Sergeant for the technical services area, adding “Migrating to and implementing a new NVR platform provides the university with an important foundation for future surveillance capabilities and usability.” Implementing new NVR platform Systems integrator, NETCom Cabling and Security Systems concurred with those sentiments. “We enjoyed the opportunity to collectively work together with the University of North Carolina’s police department and Intelligent Marketing Inc. to support the University’s goal of continuously making improvements to ensure the campus remains secure,” said Aaron Spivey, Director of Security at NETcom Cabling. Aaron Spivey adds, “Together, we’ve achieved that objective and we look forward to continuing to work together in the future.” Security system providers: Intelligent Marketing Inc., based in Haverhill, Massachusetts., works in concert with manufacturers, distributors, specifiers, and integrators to assist with system design and specifications. Intelligent Marketing Inc. delivers proactive customer service, training, and support from project inception to completion, and more. NETcom Cabling and Security Systems, Greensboro, North Carolina, has been in business since 1990, specializing in category 5e/6 and 6a copper, indoor/outdoor fiber installations, card access, cameras, perimeter detection, gate entry systems, paging and AV solutions. NETcom has the capabilities to create comprehensive commercial cabling and security plans, through its in-house CAD department.
An innovative business intelligence solution developed by Morphean, a pioneer in Security-as-a-Service and cloud analytics, has helped Footasylum to dramatically reduce the number of delivery items reported missing by customers by 50%, and improve its courier success rate by 25%. The video surveillance system, comprising network video cameras in parking areas, and utilizing cloud-based analytics, now allows delivery queries to be checked and verified at the click of a button, representing significant savings while greatly improving the customer experience. Replacing analog solution Footasylum, fashion streetwear and sportswear retailer with over 65 stores across the UK, has upgraded its legacy video surveillance solution to help transform distribution services, providing full visibility and accountability for packed and dispatched items and their related transactions. Footasylum has upgraded to a video surveillance solution to help transform distribution services Replacing a dated legacy analog solution with no tracking capabilities means that Footasylum’s customer experience staff no longer has to undertake the time-consuming task of manually searching for order details (that could take up to 30 minutes) in the event of a customer dispute. Lack of tracking missing parcels Chris Shelmerdine, Warehouse Profit Protection Manager at Footasylum, explains, “We ship a great number of parcels from our warehouse directly to customers daily. Our biggest challenge has been that many customers would send us queries about parcels, notably that items were missing from their deliveries. This was of great concern.” Lacking vital proof that an order had been picked, packed, and dispatched correctly with a courier left Footasylum with little choice but to refund orders time after time, resulting in a loss. Video surveillance solution The profit protection team needed a greater overview of the packing and delivery process so that they could understand where problems were occurring, ensuring full accountability. The new system provides evidence of all transactions backed by a high-quality video which can be retrieved immediately when required and securely shared instantly with all relevant parties. Better customer experience The new transaction-checker solution gives the ability to link packing processes to video data" Paul Green, Head of UK Sales at Morphean, comments, “Footasylum wanted to streamline its operations and ensure that it could deliver a better service for customers." "The new transaction-checker solution gives Footasylum the ability to link packing processes to video data. This provides accountability and security for every order. It’s a great result for Footasylum to reduce missing item queries by 50% and increase its delivery success rate by 25%.” Chris Shelmerdine concludes, “Every team has benefited from this solution, from the customer experience team to the profit-protection team. But the customer is at the heart of what we do, so most importantly for us, the customer experience has improved. We pride ourselves on delivering excellent products and giving the consumer the most convenient and hassle-free experience we possibly can. Morphean’s transaction-checker solution has helped us achieve this.”
YMCA Heart of England has upgraded video systems across its busy community facilities in Birmingham, Solihull, Rugby, and Coventry with a roll-out of end-to-end DirectIP technology from IDIS. Part of the international YMCA movement, YMCA Heart of England supports local people, including vulnerable groups, with services from housing to youth services. Need for end-to-end system Systems integrator Unison Integrated Technology was asked to replace YMCA’s poorly performing mix-and-match systems, incorporating elements from different vendors, with more efficient end-to-end technology from IDIS, Korea’s largest in-country video manufacturer. YMCA selected IDIS because the single-source model offers advantages including assured compatibility and ease of installation, lower up-front costs, ongoing tech support, and long-term value, all ensuring the lower total cost of ownership (TCO). IDIS was easy to implement due to the true, plug-and-play design, allowing the project to be completed IDIS DirectIP® solution At the YMCA Birmingham center, for example, the inefficient video has been replaced by an IDIS DirectIP® solution comprising a 32-channel NVR; 19 Full-HD vandal-resistant IR domes; and 11 Full-HD IR bullet cameras. The IDIS technology was easy to implement due to the true, plug-and-play design, allowing the project to be completed without interruption to day-to-day activity at the center. 4k NVR box and bullet cameras The 2.8mm fixed lens 2MP dome and bullet cameras, equipped with true WDR and IR LED, were set up to capture crisp, clear images of the building exteriors, entrances and internal corridors, and communal areas day and night. And the powerful 4K NVR delivers throughput of up to 960ips real-time recording and live monitoring with no visible latency. IDIS deep learning analytics The new infrastructure will allow YMCA Heart of England to take advantage of increased video resolutions in the future Unison also opted to replace the entire legacy cabling, upgrading to a future-proofed Cat6. This new robust infrastructure will allow YMCA Heart of England to take advantage of increased video resolutions in the future, making it easy for them to adopt powerful yet affordable IDIS Deep Learning Analytics for a range of automated detection functions that trigger highly accurate alarms and notifications. The new solution is simple to use, with the license-free IDIS Centre VMS giving staff and authorized volunteers an intuitive interface to manage devices, benefitting from high-performance live monitoring and rapid retrieval of footage, while easily configuring user permissions to provide team members with appropriate role-based access rights. Cost-effective upgrade “YMCA Heart of England was so impressed with the results we delivered at their Birmingham center they then asked us to upgrade all their premises across the whole region,” says Matthew Rodden, Director, Unison Integrated Technology. The entire project was completed in just four weeks. And reducing waste and costs further, several third-party legacy cameras were retained to operate seamlessly under the IDIS Centre VMS. “We are delighted that IDIS technology has proved to be the best solution for YMCA, with competitive up-front pricing and the low ongoing lifecycle costs,” says Reiss Spear, Sales Manager, IDIS Europe.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, has deployed its Security Center unified platform to enable the City of Chattanooga’s ‘Dragonfly Community Connect,’ a public-private policing initiative to enhance public safety in the Tennessee community. Through the initiative, when calls come into the Chattanooga Police Department (CPD) to report a crime, the Real-Time Intelligence Center (RTIC) can check with participating businesses in the area to see if they can share video from their security cameras. Cloud-based VMS Using Stratocast™, a cloud-based video monitoring service from Genetec, business owners can give permission and provide access to their video streams to the CPD upon request so that investigating officers can monitor live video during an incident or review recorded video during an investigation directly from the Security Center platform located in the RTIC. Stratocast allows business owners to keep an eye on their business and view live and recorded video 24/7 With Stratocast, business owners can also keep an eye on their business and view live and recorded video from their laptop, tablet, or smartphone 24/7. High-quality, detailed video not only provides timely information to responding officers but also simplifies the ensuing investigation. Hosted on Microsoft Azure®, Stratocast requires less hardware to install and maintain, lowering overall costs. Because recorded video is stored in the cloud, it is safe from physical damage and secures unauthorized access. Reduces suspect determination time “Having the capability to view live video allows our investigators to quickly send images of suspects, their vehicles, and other crucial information to officers who are responding to calls for service,” said Chattanooga retired Police Chief David Roddy. "It dramatically reduces the time officers spend requesting, accessing, or obtaining video evidence relative to the event or crime to which they are responding." Real-time crime fighting The link between the public and private sectors is essential for real-time crime-fighting, for improving neighborhood safety" Genetec National Director of Public Sector Security, Rick Taylor, said, “The link between the public and private sectors is essential for real-time crime-fighting, for improving neighborhood safety, and promoting the growth of local businesses." "Many cities around the world have successfully rolled out similar Community Connect™ projects and we’re pleased to be a part of Chattanooga’s Dragonfly Community Connect program.” The city chose ‘Dragonfly’ for its project name as dragonflies have a nearly 360-degree field of vision, with a single-blind spot, behind them. “Video is an increasingly essential part of our investigations,” Roddy noted. “We’ve seen the value demonstrated by our cameras in the community, and with the addition of participating local businesses, we can greatly increase our field of view.” Unified platform Genetec™ Security Center is a unified platform that blends IP video surveillance, access control, automatic license plate recognition, intrusion detection, and communications within one intuitive, modular solution to enable organizations to be more efficient, make better decisions, and respond to situations and threats with greater confidence.
GreySoft Solutions Private Limited is an IT Company based in India. They have emerged as an Application software solution provider. The company is rapidly emerging as a quality player in delivering customized software solutions. GreySoft offers a wide range of expert services, with a focus on the design and development of internet and intranet portals, internal business systems, and customized software solutions, to fulfill the specific needs of clients. GreySoft's employees have vast experience and strong capabilities in business & IT strategy consulting, systems design & integration, programming, web design, and project management. Comprehensive timesheet recording Greysoft is a fast-growing setup and did not have any specific person responsible for payroll processing. Knowledge of payroll was limited in the organization. Greysoft's service model meant that they needed to deploy employees at client locations and billing was a function of the attendance and hours worked at client locations. A web-based timesheet solution was required that captured hours by the client and by projects. Greysoft also had other security concerns that included ensuring that employees were filling up timesheets from the office only. Greysoft also required checks that the employees were filling up the timesheet hours in real-time and not putting in incorrect hours endangering their client's trust. Greysoft approached TopSource Worldwide to provide a comprehensive timesheet recording and payroll solution that needed to be delivered as per their specifications, on time, and accurately. Submitting investment declaration TopSource Worldwide took over the payroll for Greysoft in a short period of time TopSource Worldwide took over the payroll for Greysoft in a short period of time. TopSource Worldwide set up a timesheet structure that captured hours by client and project along with suitable validations to ensure that the time was being recorded in real-time and from the correct IP locations. A data download was provided out of the timesheet system to be submitted to payroll. The timesheets submitted by employees went thru an approval process to ensure checks before they were used for billing by Greysoft. An online web portal provided access to employees to submit investment declarations and modify them as and when required. TopSource Worldwide has demonstrated flexibility in its relationship with Greysoft by customizing the timesheet to meet their needs. Adhoc reporting requirements Greysoft now has a reliable payroll function. The payroll is seamlessly integrated with the timesheet capture and their billing functions are also ably supported by outputs from the web-based timesheet system. Greysoft has reduced its risk due to payroll liabilities by handing over the payroll processing to experts. They have also eliminated the risk of issues caused due to employee dissatisfaction with payroll and are now getting their payroll reports on time and accurately. They also have the added benefit of a flexible service provider to meet their ad-hoc reporting requirements.
The Palmetto Plaza Shopping Mall, an iconic shopping center located in Cali, Colombia, opened its doors in 2004 thanks to the support of a group of entrepreneurs from the region who dreamed of a place where local residents and tourists can find a wide range of commercial services and entertainment offerings. Need for a video surveillance solution To ensure a safe environment in the shopping center, mall officials sought a comprehensive video surveillance solution that can monitor the areas in and around the mall, including its square, corridors, parking lots, and the surrounding roads. Dahua Technology, in cooperation with its partner in Colombia - Fortox Security Group - a security consultant with a nationwide presence, jointly designed an AI-enabled Smart Retail Solution that replaced the shopping mall’s old CCTV analog system. Addressing the challenges The migration project from the analog CCTV to a networked system began with the design and implementation of structured cabling – using both fiber optics and copper – until the right and suitable CCTV solution is determined. The Palmetto Plaza Shopping Mall entrusted Fortox as its security consultant tasked to search for a technology that can facilitate the important steps toward the optimization and operation of the mall in the service of the city. Dahua’s AI-based portfolio Dahua offers AI applications within its portfolio, which allowed to transcend to a system dedicated to security & control " "When conducting the evaluation of the solutions offered in the market, we decided to work with Dahua because the company offers artificial intelligence applications within its portfolio, which allowed us to transcend from a system dedicated solely to security and control, to a system which will also contribute to other areas of the shopping center, integrating the Smart Retail solution into the circuit, and offering BI statistics to the mall for further analysis.” “In addition, we integrated the temperature monitoring solution and visualization control into the system using a Dahua video wall,” explains Mr. Efren Mauricio Matabanchoy Romo, Project Engineer at Fortox Security Group. IP, dome, and PTZ cameras Dahua Technology provided 111 pcs of high-resolution IP cameras, panoramic cameras, dome cameras, and pan-tilt-zoom (PTZ) cameras with 30x optical zoom capability for the project. The Dahua cameras were installed in strategic locations to provide comprehensive security for employees and customers. The video feed, which is transmitted to the central monitoring stations inside the mall through a private network, can assist the security personnel in identifying emergencies, vandalism, and other situations where a quick response from the security team is necessary. Real-time monitoring solution The video surveillance system was designed to capture high-quality HD images, combined with advanced technologies to support embedded intelligence functions, such as sending an alert to the monitoring center when it detects abandoned or missing objects, unauthorized entry into a prohibited area, as well as facial recognition and other defined activities. The cameras support multi-streaming that allows images to be recorded and monitored with real-time high resolution The cameras also support multi-streaming that allows images to be recorded and monitored with real-time high resolution so that operators can have a clear and well-defined view of both live and recorded footage. IP video surveillance system Dahua Technology and its dedicated engineering team carried out the construction of this design by utilizing its high-quality hardware and software products, with a great focus on solving the pain points of the shopping center and generating an added value to its visitors and internal customers. Mr. Chao Wu, General Manager of Dahua Technology Colombia, said, "As a result of excellent teamwork, we were able to implement more than an IP video surveillance system. We designed a solution with the latest technology and artificial intelligence unique in the city of Cali, which allows the Palmetto Plaza to provide greater security to its visitors and trade merchants.” 24/7 monitoring features In terms of security, through the Dahua equipment installed by Fortox, the Palmetto Plaza is now able to perform 24/7 monitoring and intelligent data analysis. "Likewise, through the Dahua Smart Retail Solution unique in the city of Cali, we generate added value to the merchants who have placed their trust in Palmetto Plaza. Smart Retail is not only a solution that guarantees maximum security for customers in the shopping center.” “It is also a revolutionary new tool for Big Data statistics that is suitable for the mall´s management, allowing them to make efficient and correct decisions depending on the situation”, Mr. Wu added. Security management The Dahua Smart Retail Solution has significantly improved the security management of the Palmetto Plaza Shopping Mall. By increasing the resolution of the cameras, the visual records of the CCTV system are now optimized and strengthened. By increasing the resolution of the cameras, the visual records of the CCTV system are optimized & strengthened The updated network system provides video recordings with HD resolution, allowing operators to better control and manage the entire system. It also offers artificial intelligence analytics such as face recognition focused on security, business intelligence focused on real-time statistics of the number of shoppers in the mall, and monitoring of behavior within its facilities. CCTV network system In addition to its video surveillance products, Dahua Technology also contributed to the system migration project of the Palmetto Plaza, transforming its analog CCTV system to a CCTV network system with higher resolution cameras, 360-degree views, and artificial intelligence analytics. Dahua Technology also provided complete technical support and commercial services that include training operators and managing configuration settings. “We had devices that already completed their useful life. These devices did not meet our security needs due to their low resolution and constant failures,” says Mr. Juan Diego Guzman, Security Director of Palmetto Plaza Shopping Mall. Surveillance capability For Sandra M. Navas P, General Manager of the Palmetto Plaza Shopping Mall, this technology has generated more confidence among visitors and merchants. "The beginning of this system implementation has put us at the forefront of Colombian retail in terms of video surveillance capability, and has also allowed us to achieve a level of satisfaction in terms of security higher than 92%." Furthermore, this system has allowed Fortox as a security company to integrate into a single technology the requirements requested by the client, successfully delivering the required services needed in the shopping center.
IP transmission: Manufacturers & Suppliers
- exacqVision IP transmission
- Axis Communications IP transmission
- BCDVideo IP transmission
- AMAG IP transmission
- Software House IP transmission
- Video Storage Solutions IP transmission
- OT Systems IP transmission
- Dahua Technology IP transmission
- Avigilon IP transmission
- Hikvision IP transmission
- Messoa IP transmission
- Dallmeier IP transmission
14 Success Stories About How Video Technology Is Improving City LifeDownload
Empowering Cameras With AIDownload
The Rise of Ethical Facial RecognitionDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download