IONODES, a market innovator in dedicated IP video appliances, announced that it has joined the Genetec Technology Partner Program as a Silver Partner. Genetec is a global provider of unified security, public safety, operations, and business intelligence solutions. IONODES’ Secure Display Stations, which offer a secure and reliable video wall and spot monitor solution, is now fully integrated with Genetec Security Center. The integration is available as of Security Center 5.7 Service Releas...
Dragos, Inc., provider of the industrial industry’s most trusted asset identification, threat detection and response platform and services, announces the acquisition of Atlanta-based NexDefense, a provider of industrial controls system (ICS) visibility technology. As part of this announcement, the company also introduces Dragos Community Tools, a set of free assessment tools to help organizations of all sizes around the globe forge the path forward towards comprehensive ICS security. NexD...
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valu...
Booth number: 26061 Genetec Inc. is a technology company with a broad solutions portfolio that encompasses security, intelligence, and operations. The company’s flagship product, Security Center, is an open-architecture platform that unifies IP-based video surveillance, access control, automatic license plate recognition, communications, and analytics. Genetec also develops cloud-based solutions and services designed to improve security and contribute new levels of operational intelligenc...
Dahua Technology, global video-centric smart IoT solution and service provider, has unveiled its H.265 Mobile Video Recorder series. Specific products that were launched include the Dahua MXVR1004, MXVR4104, MNVR4104, and MNVR4208. Upgraded in performance while retaining the same price, all the new Dahua Mobile Video Recorder products adopt H.265 technology, offering a cost-efficient choice for mobile solution. H.265 Mobile Video Recorder Series Featuring cutting-edge H.265 video compression,...
Wavestore, developer of highly secure and open platform Video Management Software (VMS) solutions, will be hosted by three of its technology partners at ISC West, which is taking place at the Sands Expo, Las Vegas on 10th -12th April 2019. Visitors to the Feenics, Mobotix and Raytec booths will have the opportunity to see how easy it is to benefit from a fully integrated security system with Wavestore at its heart. Wavestore VMS Solution As a truly independent company, Wavestore focuses solel...
Matrox Graphics Inc. has announced the immediate availability of a fanless cooling version of the industry’s highest-density 4K IP decode and display card. The new fanless, single-slot Matrox Mura IPX card for IP-based multi-viewers and personal video walls features best-in-class decoding of multiple 4K and Full HD streams for display across up to four 4K outputs, well-suited for environments requiring high-performance, high-reliability operation. A ‘video wall system on a card’, Mura IPX decode, and display boards provide OEMs with unprecedented system design flexibility to seamlessly and cost-effectively build low-footprint, maintenance-free multi-viewer platforms for control room, process monitoring, security, and other networked AV applications. Matrox Mura IPX Multi-Viewer Cards Matrox Mura IPX multi-viewer cards boast a dedicated onboard network interface controller (NIC) enabling unrivaled decoding density of up to two 4Kp60, four 4Kp30, eight 1080p60, sixteen 1080p30, or exponentially more SD streams. Built into the same board are four DisplayPort connectors to conveniently attach up to four 4Kp30 displays. Mura IPX decode, and display boards are also true standalone solutions that simply require an enclosure for power Mura IPX decode, and display boards are also true standalone solutions that simply require an enclosure for power, while eliminating the need for an operating system, CPU, driver, or any other system requirements. System integrators further have the choice of fan or fanless options to deliver optimized multi-viewers, video wall controllers, and personal video walls for any project requirement. Software And APIs Matrox Mura IPX multi-viewer and capture cards include a complete range of video wall software, APIs, and libraries. These software toolkits allow OEMs and developers to deploy intuitive, ready-to-use software and build custom interfaces and applications. "The Matrox Mura IPX multi-viewer cards unequivocally provide incomparable user experiences, from OEM integration all the way through to operator-level control," said Fadhl Al-Bayaty, business development manager, Matrox Graphics Inc. “Combining high-density decode and display support, on a system-independent card, significantly saves on development and deployment resources, while operators in 24/7-type environments can comfortably access, view, and monitor all IP streams to make timely, well-informed decisions.”
BlackBerry Cylance, a business unit of BlackBerry Limited, announces the introduction of CylancePERSONA, the first proactive, native AI behavioral and biometrics analysis solution for the security industry. CylancePERSONA adds user monitoring to the company’s expansive defense of the enterprise and augments the AI-driven prevention, detection, and response capabilities of the Cylance native AI platform. This lightweight solution combines continuous biometric behavior and user conduct monitoring designed to identify suspicious users in real-time to prevent compromises. Automated Active Responses “Every day, rogue insiders and external threat actors exploit valid user credentials to launch cyber attacks, so there is a clear need for organizations to ensure every user logged into their network can be trusted anytime and at all times,” said Eric Cornelius, chief product officer at BlackBerry Cylance. CylancePERSONA sensors are able to detect and score both malicious and anomalous conduct “CylancePERSONA addresses this challenge. With a combination of flexible initial authentication, user-centric biometrics, AI behavioral monitoring, and automated active responses, CylancePERSONA delivers a scalable, efficient, effective solution that can ensure trust of the user is continuous.” Unlike other user monitoring solutions that rely on network traffic analysis or focus on detection without the ability to respond automatically, CylancePERSONA sensors are able to detect and score both malicious and anomalous conduct. Stealing Valid Credentials CylancePERSONA monitors user activity and calculates a Cylance Trust Score; if the user trust score drops below a given threshold, step-up authentication action or suspension can be automatically initiated. “Stealing valid credentials and impersonating users are two of the most successful vectors used by attackers,” said Rob Davis, founder and chief executive officer of Critical Start. “CylancePERSONA is the first solution to provide organizations a technology that can detect and respond to the use of stolen credentials on the endpoint—both on and off the corporate network.” CylancePERSONA Key Features Key features of CylancePERSONA include: Behavioral biometric analysis: Continuous monitoring of user behavior with real-time detection of suspicious keyboard and mouse actions that could indicate an imposter. User conduct monitoring and analysis: Real-time monitoring of user actions with instant identification of anomalous user activity to indicate a possible remote account takeover. Contextual authentication analysis: Making use of previous user login activity such as location, time, or method to ensure current login attempts are valid. Automated user-centric response: Ability to interrupt user activity automatically upon detection of anomalous or suspicious actions with responses such as user logoff, suspended processes, and step-up authentication. Malicious and anomalous conduct detection – Ability to reduce false positives using baseline user activity. Cloud-based APIs: Enablement of zero-trust integration to third-party products using the Cylance Trust Score.
ReconaSense announces the latest release of its A.I. powered security platform for life safety and physical security, featuring risk adaptive access control and new IoT and building automation integrations that enable the secure flow of people, processes and information while keeping risks at bay. Digital transformation has increased the volume, variety and velocity of physical security event data being collected and stored, increasing the complexity of potential security risk factors as well as the time and talent required to identify and manage them. Physical Security Systems Data is aggregated and evaluated based on acquired and saved knowledge, then compared to user-defined policies ReconaSense features one-of a-kind, A.I. powered Neural Networking technology that helps campuses, commercial enterprises, government organizations and critical infrastructure identify anomalous events and automate risk adjustments and responses in real time. Unlike legacy physical security systems, ReconaSense can do this on a mass scale while filtering-out irrelevant ‘noise’ and avoiding false positives. A key component of the platform, ReconAccess is a risk-adaptive physical access control solution that adjusts permissions based on dynamic risk scores of personnel, assets, environments and facilities. Data is aggregated and evaluated based on acquired and saved knowledge, then compared to user-defined policies and procedures to determine what is permissible vs. what is not, and when and where to take action. Building Automation Systems The solution runs on Mercury hardware and integrates data from third-party systems, authentication solutions and building automation systems, enabling modern enterprises to proactively manage risk across countless dynamic and interacting components. ReconaSense facilitates intelligent access as much as it controls it. The solution can direct people to temporary safe shelter in the event of a natural disaster like a hurricane (correlating weather data with building occupancy information) or activate the lights and HVAC system when someone enters a building during off-hours. ReconaSense can also take preventive safety and security measures as in the case of a chemical spill ReconaSense can also take preventive safety and security measures as in the case of a chemical spill, identifying the presence of dangerous air-borne toxins, closing-off access to affected areas, and alerting operations teams to take emergency actions. Pre-configured risk thresholds and relationships between personnel attributes and facility resources help to facilitate a more automated, consistent and continuous approach to risk management, compliance, security enforcement and business continuity. Building Temperature Sensors A complete list of ReconaSense platform features includes: AI-Assisted Risk Scoring – monitors and compares data inputs over time to identify pattern abnormalities in physical, logical or human behavior and proactively alert to potential risks; examples include open/closed doors, building temperature sensors, NOAA National Weather Service updates, etc. Autonomous Guard Away – similar to an autopilot function, allows security teams to pass operations to one another as needed, or can automatically take over in emergency situations that require immediate response. Intelligent On-boarding & Access Provisioning – replace cumbersome paper-based processes with automated workflows, enabling security owners to easily authorize and regulate access to restricted areas based on roles, responsibilities and requests. ‘ORCA’ (Operational Response Command Application) – enables mobile access to critical operational information and the ability to act on real-time risks and threats while on-the-go. Web Services Integrations – provide the ability to integrate third-party APIs and pull information such as critical infrastructure data (nuclear facilities, airport operations, etc.) into Recon, the A.I. unification platform. Open Systems Compliance – provides out of the box integration with Z-Wave for IoT devices and BACnet for building automation systems for enhanced security and life safety monitoring. Avert Potential Threats ReconaSense with ReconAccess is the first intelligent access control solution that measures the real-time evolving risk of individuals" “In typical physical security systems, alerts are based on responses to breaches or events that have likely already taken place, putting lives and resources in harm’s way,” said John Carter, co-founder, president and CTO of ReconaSense. “ReconaSense with ReconAccess is the first intelligent access control solution that measures the real-time evolving risk of individuals, assets and environments while automatically adjusting access permissions and step-by-step processes to avert potential threats or disasters.” To learn more, register to attend the webinar Finding Your Physical Security Blind Spots with Artificial Intelligence (A.I.) on Thursday, March 7 at 2pm ET. Following the webinar, ReconaSense will host the grand opening of its new Technology Center on Fifth Avenue in New York City, from 3-7pm ET. New York-area architects, engineers, system integrators, security consultants and facilities managers are invited to attend.
Aqua Security, global security platform provider for securing container-based and cloud native applications, has announced the availability of version 4.0 of the Aqua cloud native security platform, introducing new security and compliance controls for serverless functions and Linux hosts. As enterprise development and deployment of cloud native microservices-based applications continue to accelerate, Aqua enables security teams to manage and enforce security policies across a blend of VM-based containers, Containers-as-a-Service (CaaS) and Function-as-a-Service (FaaS) spanning both multi-cloud and on-premises environments. Gartner Distinguished VP Analyst, Neil MacDonald, notes that “securing serverless will force information security and risk professionals to focus on the areas we retain control over. Specifically, the integrity and assurance of the code, identities of the code and developers, permissioning, and serverless configuration, including network connectivity.” Serverless Security Solutions Aqua’s comprehensive serverless security solution now includes a full chain of controls to discover functions across multiple cloud accounts Aqua’s comprehensive serverless security solution now includes a full chain of controls to discover functions across multiple cloud accounts, scan them for vulnerabilities, detect excessive permissions and configuration issues, and provide function assurance – preventing the execution of untrusted or high-risk functions based on defined policies. The key controls for serverless environments include: Functions discovery: Creating an inventory of functions stored across cloud accounts. Vulnerability scanning: Deep scanning of a functions packages and dependencies for known vulnerabilities (CVEs), based on multiple sources and supporting multiple programming languages. CI/CD Integration: “Shifting left” beyond scanning existing functions, Aqua provides development teams with plug-ins for Continuous Integration environments to detect security issues as functions are being built. Permissions Assessment: Identifying use of excessive or over-provisioned permissions specific to the serverless cloud environment, and monitoring for unused permissions –reducing the potential attack surface of a function. Sensitive Data Assessment: Detecting secrets and hard-coded keys within the functions themselves, or within environment variables, specific to the cloud environment – for instance AWS credentials or Azure Authentication keys. Function assurance: Security teams can set policies to determine the risk threshold to allow or disallow function execution, based on a variety of factors including CVE severity, CVSS score, sensitive data, and permissions. Function anomaly detection: Monitoring of function usage patterns and alerting on sudden spikes in the frequency or duration of function execution. Enhanced Security Controls Another significant addition to the Aqua platform is tighter controls to secure the Linux hosts that run containers. This addresses potential risks from vulnerabilities such as the one discovered earlier this year when a severe new vulnerability (CVE-2019-5736) was disclosed in runc, a component used in most container runtimes which is part of Linux OS distributions, highlighting the need for securing the container stack at both the workload and host levels. The new technologies supporting cloud native applications require a holistic approach to security and compliance" “The new technologies supporting cloud native applications require a holistic approach to security and compliance, across the application lifecycle as well as up and down the stack, and this has become more evident in recent months with significant vulnerabilities discovered in Kubernetes and runc for example,” notes Amir Jerbi, CTO and co-founder at Aqua Security. “With this new release from Aqua, our customers can protect their applications against those, as well as yet undiscovered vulnerabilities by implementing tight compliance and whitelisting-based zero-trust security.” Aqua 4.0 Security Platform Aqua 4.0 builds on previous Aqua host protections that already included testing hosts according to CIS (Center for Internet Security) benchmarks, scanning hosts for known vulnerabilities, and monitoring user logins, to provide: Malware Scanning: Detecting malware in the host OS, or any of its components. Vulnerability scanning: Scanning for CVEs found in the host OS, or any of its components. Whitelisted and Blacklisted Users and OS Packages: Security teams can specify which types of users and OS packages are either allowed or forbidden from being used on a host. User Activity Monitoring: Aqua now logs all user commands on the host OS for security and compliance tracking (in addition to the previously available user logins and login attempts tracking) CIS Benchmarks Testing: Having achieved CIS certification for its Kubernetes benchmark, Aqua now provide detailed information on each benchmark test success/failure to provide teams with remediation information. Custom Benchmark Scripts: Enabling the upload of scripts that customize benchmarks to account for configurations that aren’t supported in the standard CIS benchmarks, including Kubernetes clusters on Red Hat OpenShift. Host Assurance: Allowing to set policies that will determine a threshold for host compliance and security risk based on the results of the above scans and checks and generate alerts and audit events upon policy violations. Aqua CSP v4.0 will be generally available in mid-March for existing customers and new deployments.
iscHanwha Techwin America, global supplier of IP and analog video surveillance solutions, announced that the new Wisenet X series Plus camera line will be shipping at ISC West 2019. Focusing on ease of installation, the new, highly modular X series Plus is one of the easiest cameras to install, service and upgrade saving installers time and money. Wisenet X Series Plus Cameras Available in either 2MP or 5MP indoor or outdoor configurations, X series Plus cameras utilize magnets to lock sensor modules into the housing for instant snap-in installation. Electricians can run conduit with a single PoE connection to the mounting plate without the camera base, module, and top cover. This allows security professionals to snap the camera and covers into place after the job site is clean in just minutes. “Made with integrators in mind, our new easy access packaging lets installers configure cameras without taking them out of the box,” said Paul Kong, CTO, Hanwha Techwin America. “We have separated the housing and module containers, enabling installers to directly access the RJ-45 jack resulting in many hours of configuration time saved during larger installations.” PTRZ And IR Camera Modules Camera modules are available with options such as PTRZ, IR and a heater Camera modules are available with options such as PTRZ, IR and a heater. Designed to save time and money by not requiring a trip to the camera location when fine-tuning, the PTRZ option allows modifications to the camera’s position after installation is complete. Housing choices include indoor, outdoor and a new compact plenum-rated flush mount. Removable skin covers are available in white, black and ivory and allow easy changing of colors to blend into the décor of the room. Custom painting is also made easy since the skins easily separate from the camera. New features enable pre-recorded audio messages to be triggered by in-camera analytics. The audio files are played out from the camera’s audio output connection. Additional features on the X series include: Based on Wisenet 5 proprietary chipset for advanced performance, built-in analytics and enhanced cybersecurity. Increased operating temperatures from -58° to 140°F (-50° to 60° C) Tilt angles increased to 85v degrees for wider coverage with low ceilings Outdoor vandal dome configurations support up to IP6K9K and IK10+ ratings New gyro-sensors provide shock detection
MOBOTIX, global manufacturer of premium-quality secure IP video systems, is responding to the latest news about the use of non-secure hardware and software in IT or network infrastructures. Global players from the U.S. have already reacted and banned certain manufacturers from public contracts. Australia has also forbidden the use of products from certain manufacturers that are under suspicion of facilitating unauthorized access to data or not being able of warding off hacker attacks via cells on SoCs (System on a Chip). Systems-On-Chips Thomas Dieregsweiler, Head of Product Management at MOBOTIX, confirms that with certain Systems-on-Chips no reliable protection can be guaranteed when using them. Especially when the basic software is used by third-party SoC vendors, it is difficult to assess the risks for these vendors. SoCs are chips onto which functions of a programmable electronic system (such as an IP-based video surveillance system) are integrated. MOBOTIX only uses high-performance industrial FPGAs (Field Programmable Gate Arrays) from well-known American manufacturers for its hardware and image generation chains, providing reliable protection for the user. An FPGA is used for the continuous processing of digital signals such as audio and video signals, neural networks and Deep Learning Algorithms / Artificial Intelligence and makes the system far more invulnerable to hacker attacks and espionage software. Proprietary MOBOTIX Software We haven’t detected any hacker attacks on our security systems to date" “We use proprietary MOBOTIX software on these processors and retain full control over what the entire system does and is capable of, Thomas Dieregsweiler explains. This approach is a core component of the MOBOTIX “Cactus Concept,” a company-wide overall strategy for cyber-secure products and solutions. Alongside numerous technical measures, such as the use of FPGAs, control over the entire value-adding chain is a key factor in implementing the MOBOTIX “Cactus Concept.” “We haven’t detected any hacker attacks on our security systems to date,” Thomas Dieregsweiler emphasizes. End-To-End Security Solutions In order to prevent security gaps from arising in the first place, the MOBOTIX Security Team regularly checks hardware and software, also in cooperation with internationally recognized penetration test houses. In addition, MOBOTIX offers trainings and webinars to train partners and customers on the topic of security and to raise their awareness for IT security issues. Thus, MOBOTIX provides end-to-end solutions that offer significantly more protection than the industry standard: A consistent security concept including encryption "Made in Germany", which was successfully tested by SySS GmbH, the market leader in Germany in the field of penetration testing.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs And Autonomous Systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies being used for security and safety benefits is progressing at a rapid pace. Let’s look at some of the exhibitors in the 2019 Unmanned Security Expo: Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations. Indoor environments, which are confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response Compact Surveillance Radar (CSR) System SpotterRF provides the world’s most advanced compact surveillance radar (CSR) system for affordable wide-area, all-weather perimeter security and small force protection. Incorporated in 2009, the company attained profitability quickly and is ahead of forecasts. Dedrone has remained at the front of the issue of drone threats, integrating installations to military bases, stadiums, public events, and private individuals. The company has expanded its operations to include a new office in Washington, D.C, and has continued to upgrade its DroneTracker software. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. Airspace Security And Drone Tracker Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider. Founded in 2007 in Israel, Magos first specialized in advanced radar solutions for the military and defense markets. In 2015, Magos’ technology was declassified, allowing the company to focus on developing best-in-class systems for the commercial security market. Today, Magos radars are used in over 30 countries in critical infrastructure, data centers, electric utility sub stations, and oil refineries as well as in other commercial verticals like vineyards and car lots. Now, Magos is positioned to see increased adoption of its solutions in the U.S. Patriot One Technologies Inc. develops solutions to detect concealed weapons, utilizing novel radar technologies. Their innovative radar technology provides first responders and security personnel valuable time in active threat scenarios. The technology offers stand-off detection of concealed threats typically employed in public locations. These are just a few of the exhibitors in the Unmanned Security Expo. They represent technologies that will help to shape the future of the security marketplace.
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physical hardware. The elements continue to function as before, and software keeps them separated virtually, while also enabling the system to run more economically on less hardware. Virtualization Within Hyperconverged Systems Hypervisor software separates a computer's operating system and applications from the underlying physical hardware Software companies such as VMWare, Microsoft Hyper-V and Nutanix provide virtualization software that enables hyperconverged systems in the IT world. However, bringing hyperconverged systems to the world of video surveillance requires special handling, and security integrators may not be aware that hyperconverged software from the IT market does not work seamlessly with video data. Specifically, these hypervisor software systems have latency problems that are not compatible with video. Therefore, hyperconverged software systems must be adapted to meet video’s needs. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations of security integrators and end users while also providing economic and operational advantages of hyperconverged systems. Why A Virtual Machine Can Aid Your Server Solution A hyperconverged system can transition a stack of 10 or more application servers down to three servers, with all the applications still virtually separated on fewer machines. Each server is used to 100 percent of its capacity, which is more efficient. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations Both operating and maintenance expenses are lower, and if more computing resources are needed for a virtual machine, the software interface enables an end user to allow more processing power, RAM or disk space to that application. Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses. When a video system is working on a hyperconverged cluster, what happens if there is a hardware failure? The virtual system gets moved to a cluster that is working, but there might be a 30-second gap in video, which would not be acceptable for a critical application. All video must therefore be saved in two places. Virtualized Server Stacks From BCDVideo BCDVideo has entered into an engineering partnership with Scale Computing to develop an optimized hypervisor based on Scale Computing’s HC3 software that is also efficient for writing video.Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses Virtualization in the physical security market can create traffic patterns that are unlike traditional IT, and changes need to be implemented to accommodate for that. To avoid a “bottleneck” that can occur during the virtualization process, the virtual machine and the underlying physical hardware must be optimized to account for the virtualization process. “Performance and high-availability are critical in the video surveillance market and not all HCI solutions will adapt to video data,” said Dan Pierce, VP of Strategic Sales at Scale Computing. “With Scale Computing’s HC3 platform and BCDVideo’s ‘purpose built’ approach, customers will benefit from a solution that’s adapted to meet industry wide requirements while simplifying the management and maintenance of their infrastructure.” Hyperconverged infrastructure will become more and more prevalent in the video market, especially for large systems that have high camera counts and longer video retention times. Hyperconverged systems offer a more efficient use of resources and save costs because hardware is more fully utilised. Previous problems of using hyperconverged systems for video have been solved, which paves the way for much more widespread deployment. Over time, we should expect hyperconverged system to become more common for larger video installations, such as gaming, sports arenas, large cities, universities, corporate campuses and airports. The key to success is applying knowledge both of the needs of video systems and of how hyperconverged systems can be adapted to meet those needs.
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission Critical Video Surveillance Solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralized storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralized data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate Access To Video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance Of Video In Risk Mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying The Right Video Server Equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyze the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Dundee’s rejuvenated waterfront has breathed new life into the city, and not far from the new V&A Museum building is Foxlake Dundee, an exciting new water sports facility. Taking advantage of the regenerated docks area, Foxlake Dundee offers cable wakeboarding – where boarders are propelled by an electric cable rather than a boat – paddle boarding and Scotland’s first urban Aqua Park. Hikvision Thermal Video Solution Foxlake Dundee was the second Foxlake water park to open, following the very successful adventure park in Dunbar, East Lothian, on the Scottish coast. The Dundee facility, which opened fully in summer 2018, includes a large floating assault course, which has proven hugely popular with visitors, featuring huge obstacles, slides and rafts, and a giant 3.5m inflatable tower known as ‘the Mountain’. Unfortunately, due to its city center location, the assault course and the wider facility was likely to be something of a magnet for unauthorized activity, primarily of the inebriated variety, explains Zak Hegarty, Foxlake Dundee’s manager. “Because of our location, right in the heart of Dundee city center, we’re quite near a lot of pubs,” Hegarty adds. “And sometimes a 3.5m floating inflatable tower looks pretty inviting to someone with a quantity of ale in their system – it looks like an irresistible challenge.” Remote HD CCTV MonitoringI introduced myself as I saw they were opening and was invited initially to look at a CCTV system" The concern was that accidental or deliberate damage or vandalism to the equipment was a real risk – and along with that came the danger of injury or worse to those attempting to exploit the park, at night, in the dark, unsupervised on the water. Hegarty’s first instinct was to investigate the option of manned guarding: having a security officer on-site during those out of hours periods overnight when the facility was at its most vulnerable. But an approach from Brian Davidson of Webster Security & Fire was to change his mind. Davidson had noticed the development in the docklands with interest. He approached Hegarty to see if Webster Security & Fire might be able to help with securing the site. “I introduced myself as I saw they were opening and was invited initially to look at a CCTV system,” Davidson says. “This then blossomed during further conversations into a proactive, remotely monitored CCTV solution. They were looking at going down the route of employing manned guarding for when the site was closed, but we thought this would provide a cost-effective and workable solution that offered the same level of protection.” GJD Motion Detectors The challenges presented by the Foxlake Dundee site were not insignificant. The system needed to be remotely monitored and based on some form of movement detection – on a site which itself was constantly moving, due to the changing tidal water levels. Davidson and Webster Security & Fire got in touch with Hikvision in Scotland and together they designed a solution to meet all of Foxlake’s needs. The centerpiece of the system proposed by Davidson and Webster Security & Fire was the use of Hikvision thermal cameras to detect activity on the jetties. This is complemented by the use of GJD motion detectors and Hikvision cameras to pick up movement on approach areas, further Hikvision cameras which monitor the internal office reception areas, and additional Hikvision cameras providing a security, health and safety and management overview of the both the assault course and the paddle and wakeboarding facility areas. A public address tannoy system is also connected to the surveillance solution. Hikvision Thermal Bullet Cameras The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view – so a human body is always visible as hotter than its surroundings, particularly in a marine or waterfront environment. Hikvision’s thermal cameras also utilize behavior analysis technology, so figures moving into specific zones in the image can automatically generate alarms. The advantage of thermal cameras for a water-based site like Foxlake is that they can operate in all weather conditions – they’re not impeded by fog, mist, heavy rain, snow or other environmental factors, the sorts of conditions which could severely impede even the most advanced of conventional cameras. Hikvision 8-Channel DeepinMind NVRs The other cameras in the Foxlake Dundee system benefit from Hikvision’s Darkfighter technology, allowing for video monitoring and recording in even the lowest of light conditions. And the whole solution records to a Hikvision 8-channel DeepinMind network video recorder, which utilizes powerful AI technology to learn to filter out false alarms and accurately raise alerts. In the evening, after normal operating hours, the site is locked up and alarms are set. It’s then remotely monitored by the Corps of Commissioners, who are alerted when the thermal cameras or motion detectors pick up any movement on the site. Operators check the live cameras to confirm that intrusion has occurred. If an intruder is detected, they immediately contact Foxlake management via phone, and are also able to contact police if required. At the same time, the Corps operatives can use the PA system to issue warning announcements to allow the intruders to know they are being monitored. The effect is almost instantaneous, Hegarty says. Enhanced Intrusion Detection The overall reception for the video surveillance solution has been extremely positive “We’ve had three incidents since the system was installed,” he says, “and the response by the intruders is pretty remarkable. I’ve reviewed the footage and compared it to the time notification I’ve received a missed call on my phone: you can see the intruder on the video footage hear the warning, and then they’re off. They just leave straight away. It’s amazingly effective.” The overall reception for the video surveillance solution has been extremely positive. “We’re really happy with the system,” Hegarty says. “The video footage quality is very high and we’re glad we haven’t had to go down the manned guarding route, as similar facilities have done. We appreciate that Webster and Hikvision took the time and thought to design something that would work for us in our specific circumstances. Of course, the proof is in the performance, and the fact that a number of intruders have been quickly and effectively warned away is evidence that it is doing the job it was designed for.”
Sony 4K security cameras act as ‘intelligent eyes’ at EDGE Olympic, one of Amsterdam’s most technologically advanced sustainable buildings. The rugged minidome cameras give a clear picture of the flow of workers and visitors into and around the premises. In addition, their excellent low-light sensitivity is an asset for the reinforcement of security at entrances and car parking areas. Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras EDGE Olympic is an exciting landmark in sustainability. Opened in May 2018, the building constructed by EDGE offers over 11,000m2 of innovative co-working space close to Amsterdam’s Olympic Stadium. Providing a creative and energy-efficient workspace for commercial tenants, the building’s design is focused on a sophisticated digital infrastructure that connects people, devices, sensors and information via a secure cloud platform. Sony SNC VM772R 4K Minidome Cameras Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras installed by Netherlands security specialist, Lancker Wolters. The cameras are integrated with Genetec’s video management system to create a comprehensive video security and monitoring solution. Ruggedly built for all-weather outdoor operation around the clock, the SNC VM772R camera features a large, highly sensitive 1.0-type back-illuminated Exmor R CMOS image sensor. Offering four times higher resolution than Full HD, the camera is capable of capturing smooth, crisply detailed 4K video in conditions of near darkness. This allows people and objects to be seen clearly in a wide range of lighting conditions – and thus helps to ensure round-the-clock safety and security of employees, co-workers and visitors to the building. Video Data In Building Operations Optimization In the future, it is expected that video data will also be used to optimise building operations In the future, it is expected that video data will also be used to optimize building operations. For example, intelligent analysis of traffic patterns could enable more efficient room bookings and use of resources such as heating, lighting and cleaning services. Further, SNC-VM772R cameras monitor the EDGE Olympic car park, scanning the registration license plates of vehicles and checking the number against a database to admit authorized staff and visitors only, while automatically raising the barrier to let vehicles exit. This also allows instant confirmation whether a particular employee is present in the building: this overview can be beneficial, for example, in the event of an emergency evacuation. Sony 4K Surveillance Cameras "The initial price of a particular camera doesn’t matter" comments Erik Ubels, CTO, EDGE Technologies. "It’s the usability over its lifetime that makes it a better investment. That's why we chose Sony 4K cameras for this landmark building and other properties that we’re planning in the near future."
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner has announced that the Kentucky School Boards Association (KSBA) is delighted with their recently-upgraded 3xLOGIC video surveillance system, installed and monitored by Sonitrol of Lexington. 3xLOGIC - Sonitrol Collaboration The Kentucky School Boards Association was established in 1936 and represents 863 school board members from across the state to provide training, services, and collegiality to aid in the effort of providing the best education possible for public school students across Kentucky. KSBA is a long-time Sonitrol of Lexington customer, going on 25 years. Hence, Sonitrol and Danny Goodpaster, Security Consultant, were well positioned to understand KSBA’s situation and recommend the solution best suited for their needs. “About three years ago, during the budgeting process, we had an incident in our parking lot in which there was a minor fender bender,” related Jeff Million, Print Shop and Operations Manager for KSBA. “The camera watching the parking lot was only 30 feet away, but I could not even make out identifying writing on the car that struck the other car. On another occasion, we had a break-in and from three feet away I could not make a positive ID on the perpetrator. After these incidents, things got rolling and we soon embarked on upgrading our video surveillance capabilities.” Full HD IP Video Surveillance Solution The multi-sensor device is a camera with a unique set of capabilities, it is also equipped with impact-activated audio, glass break, and motion detectionGoodpaster wrote the first upgrade proposal in 2016. After some discussion about installing a hybrid DVR, KSBA at Goodpaster’s urging decided to remove the analog cameras and go full IP. Now, the organization has four static cameras and two 3xLOGIC multi-sensor devices, trained on the front door and the back door, loading dock, and parking lot. The multi-sensor device is a camera with a unique set of capabilities, it is also equipped with impact-activated audio, glass break, and motion detection along with video and audio verification of alarm activations. The multi-sensors are connected to an updated Sonitrol panel and they provide video feeds, as well as glass break and audio verification for both entrances. “With our former system, I’d get the first call on alarm, but often I did not have enough video information to make an informed decision. Now, I have the data and the images I need to deal quickly with any situation,” said Million. Goodpaster recalled that there was a lot of competition for this business—'KSBA really did their homework.’ At the end of the day, it was the multi-sensor’s video and audio verification that provided KSBA with real, tangible benefits they could feel. Further, between the Sonitrol app and VIGIL Client software installed on Million’s laptop, KSBA now has a fully-integrated solution, as opposed to the two separate systems they had before. The four non-monitored cameras are overseen by 3xLOGIC VIGIL Central Management software (VCM), so if any equipment issues arise, Sonitrol knows immediately and can act to proactively solve them. Multi-Sensor Devices The new cameras also provide a better field of view, I’m picking up my entire parking lot, before I could only see half of it"As noted earlier, the Multi-sensor devices monitor the front and back entrances, as well as the parking lot. The other four 3xLOGIC cameras are trained on the front door reception area and down the hallways away from the front and back entrances, to provide visibility on where any visitor or employee is going. These cameras are viewed live and used for incident review. The receptionist at the front desk has a dual screen that shows her the approach to the building and who is coming through the door before that person reaches her desk—this creates full situational awareness and keeps the receptionist safe. “We really do like our new cameras, and we are light years ahead of where we were as far as quality and ease of use with the 3xLOGIC system,” said Million. “We now have video verification capabilities. Before I’d get a phone call, while away from the office, providing video images but I couldn’t make anything out. I’d have to head home to view the video and I still didn’t have sufficient resolution to make out what was happening. The new cameras also provide a better field of view, I’m picking up my entire parking lot, before I could only see half of it.” IP HD Cameras Million continued, “Recently, we had a forced entry attempt on the front door, and we went to the video. We could immediately resolve what had happened—that’s real peace of mind. We have to make quick decisions, and in the event of a real incident, we’re shaving at least 10 minutes off of police response times. Million can view all six cameras on his mobile app. We don’t want to call on false alarms, we want to make certain. Now we can and the video quality is about 10 times better.”
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilizing thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-story blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 Thermal Cameras The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms. The cameras detect minute increases in temperature, triggering an alarm in YHN’s central enquiry center before any fire has had a chance to take hold, meaning within seconds of a possible fire starting the alarm is raised with the fire service. The camera continually monitors the temperature in the room, with information relayed back to the fire service, enabling them to better prepare for responding to the fire. David Langhorne, YHN’s Assets and Development Director, said: “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-story blocks under a microscope, but we have been trialing new measures in our multi-story properties for some time. Faster Fire Detection “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere. The early detection system provided by the camera has many benefits, but, most importantly, the faster response time from the fire service means the potential impact on residents and their properties is minimized and they and their homes are far safer as a result.” “This trial system is one of many fire safety measures currently in place in the blocks we manage across the city, where we also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers, and bin room sprinklers.” Reducing False Fire Alarms Alan Robson, Assistant Chief Officer at Tyne and Wear Fire and Rescue Service said “It’s great that YHN is innovating in this way. Using technology to support the monitoring of storage areas such as this helps improve the information we receive about incidents. This technology can reduce false alarm calls and improve our response to confirmed fires.” The standard CCTV lens provides a live feed for further verification of events OpenView Security Solutions is the UK’S largest privately-owned independent security company and a leading national supplier of fire, electrical and mechanical services to the public and private housing sectors. Thermal Imaging The Mobotix M16 Thermal camera’s lens is triggered when an unexpected heat pattern occurs and automatically sends an alert to the central control room. Images from the thermal lens are automatically presented to operators enabling the exact location of hotspots, such as smouldering fires, to be pinpointed. The standard CCTV lens provides a live feed for further verification of events. YHN’s existing infrastructure, which uses Openview installed equipment in the blocks to link alarms through to its enquiry center via Jontek, meant the new approach could be easily implemented without any disruption to residents. Innovative Fire Protection Solutions Andy Ward, Sales Director of OpenView Security Solutions, added “This innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimize the incidence of false alarms. It now forms part of our expanding portfolio of fire and life safety solutions, one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sector.” Commenting on the partnership with YHN and OpenView, Frank Graham, Mobotix Regional Sales Manager, said: “We are very happy to be working so closely with both YHN and Openview in the development and provision of an innovative solution for such a serious issue. Mobotix cameras have inbuilt intelligence to meet all the requirements of integrator and end users alike and we look forward to a longstanding and fruitful partnership with both organizations moving forward.”
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent Video Solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabis dispensary in Lafayette, Colorado. Unlike many other types of retail environments, cannabis dispensaries must comply with strict rules governing the type of video surveillance equipment used, where cameras and equipment are placed, and how long video evidence must be retained. Already familiar with the regulations based on his experience operating a second dispensary and a cultivation center in Lafayette, Colorado, Ryant sourced multiple bids for his new video solution. In the end, I selected the March Networks proposal. It had everything I was looking for, including POS integration, and additional capabilities" POS Integration “Once all the bids were in, I went through the process of analyzing each one and ended up narrowing the contenders down to two,” said Ryant. “In the end, I selected the March Networks proposal from our systems integrator, Falcon Networks. The solution had everything I was looking for, including POS integration, and additional capabilities I thought might be useful down the road. It met all of the compliance criteria, and the price was comparable.” Prior to opening the boutique dispensary in January 2018, Ryant worked with its system integrator to design and install a fully-compliant video solution. IR Dome Cameras Today, IR dome cameras mounted inside the dispensary capture clear 4MP video of all activity at entrances and exits, in storage and equipment rooms, and at each point-of-sale (POS) system. In addition, 360° cameras are installed above the sales floor and in every corner to provide further panoramic coverage. The 360° cameras are also installed on the dispensary’s exterior to capture people entering and exiting, as well as any activity in the surrounding parking lot and back loading area. The cameras were selected and placed strategically to ensure that the system meets multiple legislated requirements, such as recording all activity occurring within 20 feet of any ingress/egress point, capturing clear video in all lighting conditions, and making sure that the recorded video is sharp enough to identify customer and employee facial features at each POS. Hybrid Network Video Recorder At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR) At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR). The recorder provides IP and analog video capture and unparalleled reliability through features such as diagnostic LEDs, an internal battery backup, and a customized embedded Linux operating system. All IP channel licenses are included with the recorder, making it a convenient and cost-effective option for the dispensary. Equally important, the recorder provides Complete Releaf with 32TB of internal storage, so it is compliant with the state’s 40-day video retention requirement. “Essentially, we need 100 percent coverage with no ‘blind spots’ on our retail floor, and a clear picture of people’s faces. It’s a truly reliable product, and we’ve had no difficulties achieving our 40 days of archived video,” said Ryant. Searchlight Intelligent Software While security and compliance were both top priorities for Ryant, finding a video solution that would also help him run Complete Releaf more efficiently – and profitably – was also important. That’s why he’s so pleased with the March Networks Searchlight for Retail application software he is also using. The intelligent software enables Ryant and his team to proactively identify and review suspect transactions using integrated video and transaction data pulled from the dispensary’s Green Bits POS system. It provides them with an easy-to-use loss prevention tool that reduces the time it takes to investigate incidents from hours to minutes. It also arms them with strong video and data evidence to support successful prosecutions or recoveries. Ryant is also testing the Searchlight application in his cultivation facility “Having video surveillance in our dispensary definitely deters theft,” said Ryant. “Combining the video with transaction data goes a step further and really causes people to think twice before they do something they’ll probably regret.” Radio Frequency Identification Tags Ryant is also testing the Searchlight application in his cultivation facility, taking advantage of the software’s ability to integrate with data from the Radio Frequency Identification (RFID) tags he is required to add to each plant through the cultivation process as part of Colorado’s Inventory Tracking System (Metrc). The software would enable Ryant to leverage his RFID investment by making the data searchable in the dashboard and tying it to recorded video. If there’s ever an incident during the cultivation process, Ryant could use the software to easily locate the video footage to see what actually happened and who was involved.
Allot Communications Ltd., a global provider of innovative network intelligence and security solutions for service providers and enterprises worldwide, announces that Safaricom will be implementing a convergent network solution for its fixed and mobile customers. The tailored Allot solution features network analytics, advanced charging capabilities as well as Network Security and protection against DDoS. “We have a long and valued relationship with Allot,” said Thibaud Rerolle, Safaricom’s Chief Technology Officer. “With the visibility, control and security solutions provided by Allot, we will deliver added value with heightened quality of experience and protection to our customers from the rising cybersecurity threats, including DDoS attacks, phishing and Cryptojacking.” Protect Service Availability Proactively optimize network resources and customer service plans to maximize revenues By activating Allot’s network intelligence and security technologies, Safaricom is now better able to: Protect service availability and quality by blocking inbound and outbound DDoS attacks, Enhance quality of experience (QoE) through improved streaming quality, Proactively optimize network resources and customer service plans to maximize revenues, Turn detailed network, application and user data into actionable insights to drive customer satisfaction, and Save on CAPEX costs. “Safaricom joins several of the world’s largest global Tier 1 operators with its deployment of Allot,” comments Ran Fridman, EVP Global Sales at Allot. “I am confident the combined DDoS Secure and NetworkSecure convergent solution will bring value to Safaricom and its customers through a better, safer user experience as well as protection against a variety of online threats.”
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?