Eagle Eye Networks, globally renowned cloud video surveillance solutions company, has announced the introduction of an open, public domain, secure, plug and play communications framework that enables video manufacturers to connect cameras, DVRs and encoders to the cloud. Eagle Eye Networks’ Cloud Camera Specification has been developed with 10 years’ experience gained from practical integrations with camera manufacturers and cloud technology partnerships. Eagle Eye is providing an op...
Moxa Inc., a pioneer in industrial communications and networking, releases a major upgrade for its MXview industrial network management software. Enhanced compatibility now lets customers seamlessly integrate MXview into both IT and OT systems. In addition, it is possible to centrally manage large-scale networks featuring up to 10 sites using real-time, operational data to configure, monitor and diagnose a maximum of 20,000 devices. Key to the success of the new upgrade is a faster, more user-f...
The Identification Technology Association (IdTA) encourages the San Francisco Board of Supervisors to extend the period for comment and dialog on the proposed “Stop Secret Surveillance” legislation when it meets, so that the city, local residents and biometrics experts from the public and private sectors can have a more thorough and thoughtful discussion about the benefits of facial recognition technology. ‘Stop Secret Surveillance’ Legislation IdTA and its member compa...
Pulse Secure, the provider of software-defined Secure Access solutions, announces that it has published its ‘2019 State of Enterprise Secure Access’ report. The findings quantify threats, gaps and investment as organizations face increasing hybrid IT access challenges. The survey of large enterprises in the US, UK and DACH uncovers business risk and impact resulting in a pivot towards extending Zero Trust capabilities to enable productivity and stem exposures to multi-cloud resource...
‘Conquering new markets together’ was the motto of the MOBOTIX Innovation Summit DACH 2019 held in Langmeil (located in the German state of Rhineland-Palatinate). The main topic was the opening of new market opportunities through a global network of partnerships and technology alliances. More than 150 participants from Germany, Austria and Switzerland learned about trends in the global markets for cyber security as well as the latest, market-ready MOBOTIX innovations. In addition, p...
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the exces...
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, globally renowned residential security solutions firm, has introduced the next generation of its popular Signature Series Deadbolt with Home Connect. Signature Series Deadbolt With Home Connect Available in both traditional (round) and contemporary (square) models like the original version, the new Signature Series Deadbolt (2nd Generation) with Home Connect will feature two significant upgrades: The lock will utilize the newer Z-Wave Plus 500 Series chips. Supporting over-the air firmware updates, the new chip extends the lock’s wireless range while providing robust network security and encryption. The lock will also feature a smaller interior footprint, creating a more pleasing aesthetic and blending in more easily with any décor. Kwikset Single-Cylinder Deadbolt With these two substantial enhancements, the Signature Series (2nd Generation) is expected to extend the popularity of this well-received lock line. Utilizing the popular Kwikset single-cylinder deadbolt as its foundation, this is the ideal lock for the first-time homebuyer or homeowners who want to experience the safety and peace of mind of a Home Connect solution an entry-level price point. SmartKey Security Kwikset’s Signature Series Deadbolt offers advanced features for maximum security When connected to any standard smart home hub, these motorized deadbolts enable true remote locking and unlocking. This allows homeowners to remotely access and control the lock from anywhere in the world, using the app from the homeowner’s home automation controller. As a result, they can lock a door while traveling for work or vacation and can also remotely provide access to their home to service providers, guests or other family members. Users can also attain valuable information through their smart phone and have the peace of mind of knowing a door’s lock/unlock status. Like its predecessor, Kwikset’s Signature Series Deadbolt (2nd Generation) with Home Connect offers advanced features for maximum security and convenience, including Kwikset’s patented SmartKey Security, which not only protects against advanced break-in techniques but also allows homeowners to re-key the lock in seconds without a locksmith.
Matrox Graphics Inc. has announced Aggregator Mode, a cutting-edge, multi-system control feature available with Matrox Extio 3 high-performance IP KVM extenders. Taking Extio 3 IP extension and switching capabilities to a new level, this new mode of operation permits an Extio 3 receiver unit to aggregate multiple video streams coming from different Extio 3 transmitter units. Multiple computer desktops can then be viewed and controlled simultaneously from an Extio 3 receiver unit—with a single keyboard and mouse. Moving the mouse across a multi-screen desktop of up to four displays shifts control instantly from one computer to the next, providing users with unprecedented operational efficiency. Aggregator Mode is ideal for a wide range of applications including process control, industrial and automation, military and defense, healthcare, broadcast and post-production, and more. Extio 3 IP KVM Extenders Aggregator Mode will be revealed for the first time at InfoComm 2019, in booth 3055. Aggregator Mode streamlines user operations by providing a unified view of information Aggregator Mode streamlines user operations by providing a unified view of information coming from different computer systems. Users have the flexibility to define which computer desktop gets mapped to which screen attached to the Extio 3 receiver unit—they can select the video sources from the Extio on-screen-display (OSD), and then create and save layouts through its easy-to-use, drag-and-drop interface. Aggregator Mode Extio 3’s Aggregator Mode supports computers with multiple video outputs, including independent or stretched desktop mode, while remote user-station setups can be arranged in various configurations such as 4x1, 3x1, 2x1 or 2x2. Guest connections are also available for collaborative environments, where different users can connect to the same source system simultaneously, with or without USB control. Aggregator Mode is easy to deploy as it is built into Matrox Extio 3 IP KVM extenders, minimizing equipment cost and maintenance. It also does not require any additional software to be installed on the source computer system, ensuring that all system certifications remain intact for a truly seamless and simplified KVM installation. IP KVM Extension And Switching Matrox Extio 3 continues to set the standard for IP KVM extension and switching" “Matrox Extio 3 continues to set the standard for IP KVM extension and switching,” says Caroline Injoyan, business development manager, Matrox Graphics Inc. “In addition to providing industry-leading 4Kp60 and quad 1080p60 4:4:4 performance at unprecedentedly low bitrates, Aggregator Mode provides users with the most efficient workspace. This is essential in 24/7 environments for example, where operators can now pull and view critical information from multiple system data points to make timely, well-informed decisions. We encourage you to stop by at InfoComm 2019 to witness this first-hand.” Aggregator Mode will be available as a free Extio 3 firmware and Matrox Extio Central Manager software upgrade in Q4 2019. Matrox Extio 3 Series Cards Redefining IP KVM extension technology, Matrox Extio 3 Series cards and appliances are capable of providing 4Kp60 4:4:4 or quad 1080p60 4:4:4, desktop-quality video at 5% of the bandwidth required by most other products available in the market today. With exceptional remote performance, smooth video playback, and pristine image quality, Extio 3 Series features the best-in-class resolution support required of professional applications—a DisplayPort 1.2 connector on Extio 3 N3408 IP KVM extenders ensure a maximum resolution of 3840x2160 at 60Hz in true color. Extio 3 Series also provides flexible configuration options, supporting copper or fiber-optic cabling in point-to-point or networked KVM operations. Extio 3 readily works with standard commercial off-the-shelf (COTS) network switches that significantly diminishes the total cost of ownership to deliver a scalable, secure, and cost-effective KVM matrix switching solution over IP.
Prysmian Group, pioneer in the energy and telecom cable systems industry, presents its latest innovations for high-value electrical assets monitoring systems at the Grid Asset Management conference that is taking place in London on May 14 to 16. More specifically Prysmian’s presence at the conference will be centered around PRY-CAM, the Group’s breakthrough technology for condition assessment and asset management of electrical systems and equipment from 3 kV to 600 kV. Artificial Intelligence Interface Collected data are stored via the cloud to be accessed remotely by ways of an AI interface Through a full range of electronics-based products PRY-CAM monitoring technology allows fast, accurate and reliable on-line measurements of Partial Discharge (PD) and key parameters of any electrical equipment for system diagnosis and defect localization purposes, to helps electric assets owners to increase uptime, asset longevity and safety, while reducing maintenance costs and risks. The PRY-CAM technology does not require to switch off the monitored system, thus offering remarkable benefits in terms of associated costs. Collected data are stored via the cloud to be accessed remotely, shared and analyzed by ways of an artificial intelligence interface that generates automated alarm signals if a critical situation is identified. Comprehensive Condition Assessment Prysmian will be in the spotlight at this year’s conference as Platinum Sponsor, having its representative, Roberto Candela, speaking about extended and comprehensive condition assessment and management of electrical systems to improve reliability and optimize performance and lifecycles, within the Day 1 program session dedicated to Power Grids Asset Management & Advanced Diagnostics. Prysmian is the only player in the cable industry capable of providing turn-key supply" “Prysmian is the only player in the cable industry capable of providing turn-key supply of such and advanced monitoring solution fully integrated with any cable system“ says Roberto Candela, CEO of Prysmian Electronics, the Group’s fully owned subsidiary, entirely dedicated to Condition Assessment and Asset Monitoring systems and services. Cable System Integrator “We are marking a turning point in the technology for power grids diagnostics, monitoring and maintenance systems and services and we are moving from the role of pure cable manufacturer to cable system integrator” he adds. Prysmian Electronics reported a significant growth in 2018 and was awarded important contracts for power grids monitoring systems by the main Utilities world-wide, including Italy, UK, Middle East, China, USA and Singapore.
3xLOGIC, PAC/GDX and PACOM, providers of security and access control solutions, have announced they will be exhibiting on stand IF2930 at IFSEC International 2019, which takes place on 18th-20th June at ExCeL, London. For over 15 years as one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has an enviable track record in redefining what’s possible with security technology. After successfully launching into the European market earlier this year, 3xLOGIC will exhibit its diverse range of cutting-edge products as well as demonstrate their integration capabilities. Leading the way is the integration of 3xLOGIC’s NVRs and standalone cameras into PACOM’s GMS and Unison product lines. VIGIL Enterprise Grade VMS 3xLOGIC’s VIGIL enterprise grade VMS is the driving force behind the VIGIL range of NVRs, DVRs and PoE cameras3xLOGIC’s VIGIL enterprise grade VMS is the driving force behind the VIGIL range of network video recorders (NVRs), digital video recorders (DVRs) and Power over Ethernet (PoE) cameras. To further enhance VIGIL’s suitability for multi-site environments, it has been integrated with the PACOM Graphical Management System (GMS). Engineered to communicate over an IP network, the PACOM GMS allows for full integration of access control, alarm monitoring, video surveillance and many other security functions. 3xLOGIC’s Visix Facial Recognition camera is making its European debut at IFSEC 2019. This special purpose, low cost, dual lens 2MP device is designed for instant face detection, and the identification and notification of persons of interest. Using camera-based analytics and 3xLOGIC’s exclusive facial recognition software and mobile app, users can review images and choose which individuals to place on a watch list. Unison Security Management Furthermore, 3xLOGIC’s Facial Recognition camera has recently been integrated into PACOM’s Unison security management platform. An open security solution designed specifically for campus-based organizations, Unison is the solution of choice for organizations within vertical sectors such as healthcare, universities, commercial buildings, public facilities, municipalities, airports, shipping ports and data centers. The combination of Facial Recognition capabilities with Unison improves operational efficiency by quickly and accurately identifying persons of interest, and streamlining processes to use this information to meet the organization’s security and marketing goals. TRENDS empowers the user to interpret vast amounts of disparate data more effectively and efficiently than ever before For those looking to optimize organizational efficiency, 3xLOGIC’s TRENDS cloud-based business intelligence tool incorporates exception-based reporting, video data and third-party applications into an easy to use dashboard that provides a simple visual snapshot of business operations. TRENDS empowers the user to interpret vast amounts of disparate data more effectively and efficiently than ever before, offering unrivalled levels of visibility to quickly spot issues and liabilities that can seriously impact a company’s bottom line. Bluetooth-Based Card Reader Last, but certainly not least, visitors will have the chance to get hands on with the new PAC GDX Bluetooth-based card reader technology, which has been specifically designed to meet the requirements of companies of all sizes that want the most secure access control solution possible. Experts from the company will be available for product demonstrations and to discuss a new online training program that has been developed to enable installers and end users to get the very best out of their PAC GDX solution. “It has been a tremendously exciting year, and we are looking forward to discussing our activities with those attending IFSEC,” commented Matt Kushner, Global President, Stanley Products and Solutions. “With a combined legacy of over 100 years in the security industry, 3xLOGIC, PAC GDX and PACOM lead the way in the design and manufacture of video surveillance, access control, and business intelligence solutions. By visiting Stand IF2930 and talking to our experts, visitors have a fantastic opportunity to find out how our technology can enhance security provision in a diverse range of built environments and how we can help them achieve their operational and security objectives.”
Luxul, the innovator of IP networking solutions for AV integrators, announces its lineup for InfoComm 2019, taking place June 12-14 in Orlando, Florida. At the Legrand, AV Commercial Solutions booth 2500, Luxul will showcase its latest family of Gigabit switches designed for AV over IP applications. “With the rise in popularity of AV over IP distribution, the network switch is now the matrix — but not just any switch will do,” said Brannon Young, Luxul’s Vice President of Business Development. PoE Power Scheduling “A managed switch with QoS, VLAN, or IGMP support is usually required. Luxul managed switches support all three of these protocols, with the addition of full-speed backplanes to easily handle data traffic. They are perfect for classrooms, boardrooms, huddle rooms, and other professional environments, and we can’t wait for attendees to see them in action at InfoComm.” Auto-Recovery allows the switch to power cycle unresponsive PoE devices Luxul’s newest 18-port/16 PoE+ L2/L3 AMS-1816P and 12-port/8 PoE+ XMS-1208P managed Gigabit switches, featuring Self-Healing with PoE Auto-Recovery and PoE Power Scheduling, will be on display. Auto-Recovery allows the switch to power cycle unresponsive PoE devices, and Power Scheduling enables switch PoE ports to be turned on or off on a schedule. Self-Healing Feature For simple network expansion, the AMS-1816P is equipped with two Gigabit RJ-45 (one combo port and one dedicated) and two Gigabit SFP ports, while the XMS-1208P features two Gigabit RJ-45 uplink ports and two SFP ports. These features allow for high-speed interconnection between SFP-compatible Luxul switches and enable integrators to connect devices via Ethernet or fiber-optic cable. Luxul’s Self-Healing feature is also available on the company’s 12-port/8 PoE+ AMS-1208P, 26-port/24 PoE+ stackable L2/L3 AMS-4424P, 26-port/24 PoE+ AMS-2624P, 26-port/24 PoE+ XMS-2624P, 52-port PoE+ L2/L3 XMS-5248P, and 52-port stackable L2/L3 XMS-7048P.
VuWall, the provider of video wall management and AV distribution solutions, will display its new CoScape multidisplay collaboration and presentation system and the next generation of the industry-trusted TRx 2.0 AV network management solution, in addition to a live demonstration of the complete family of interoperable solutions available within the VuWall ecosystem, in booth 2281 at InfoComm 2019. “This year marks our 10-year anniversary of simplifying the lives of AV/IT integrators and video wall operators in the most demanding control rooms around the world,” said Paul Vander Plaetse, founder and CEO of VuWall. Turnkey Display Solution “As we move into the next decade, VuWall is focused on further streamlining the evolving and complex world of technology. We are committed to delivering solutions that enable easy configuration and deployment, interoperability between brands, and future-proof implementation through open architecture.” CoScape allows presenters to display all sources on one or multiple touch surfaces “At InfoComm, attendees will see our latest advancements within the VuWall ecosystem and how we integrate with other solutions to create a superior viewing experience that goes far beyond simple control of video walls, and where multiroom and multisite solutions can be integrated with simplicity.” At InfoComm 2019, VuWall will demonstrate the full capabilities of its CoScape multidisplay collaboration and presentation system. CoScape allows presenters to display all sources on one or multiple touch surfaces, creating a true high-resolution, interactive turnkey display solution for easy visual collaboration. Network Management Solution It's perfectly suited for collaboration rooms, allowing sources to be shared on a touch video wall or projection screen. It features an open platform to ensure full support of standard corporate applications and a high-end performance workstation driven by powerful NVIDIA graphics cards for 3D acceleration graphics. In addition, it works with third-party collaboration programs, allowing users to interface directly and seamlessly with the chosen program from the CoScape controller and eliminate complex steps from the presentation process. Also at the booth will be VuWall's TRx 2.0 AV network management solution that provides distribution of audio and video signals over standard IP networks. User Management Capabilities Designed for presentation rooms, control rooms, and content distribution across multiple locations throughout a campus Designed for presentation rooms, control rooms, and content distribution across multiple locations throughout a campus, TRx supports multiple formats of video streaming up to 4K resolution and offers simple management of an unlimited number of sources and display surfaces. The latest version offers a new, intuitive control panel designer allowing integrators to create custom control panels that can be run on any HTML-enabled device for easy control from anywhere on the network. TRx also supports a broadened range of devices and user management capabilities as well as the ability to stitch together multiple decoders, allowing for a virtually infinite number of displays to be brought together as a single video wall with limitless resolution. Live Presentations The system consists of a centralized TRx server for easy deployment of a large number of devices and a series of encoders, decoders, and IP video wall processors that support H.264 4K/UHD, SRT, and SDVoE. Attendees at the show will also benefit from live presentations of the entire VuWall ecosystem, which includes TRx and CoScape along with VuScape video wall controllers and VuStation visualization and control workstations. Furthering the value of the system, VuWall has partnered with the most innovative and trusted technology leaders in the industry, including IHSE, SVDoE, Matrox (SRT), AMX SVSI, Datapath, NVIDIA, AMD, Genetec, and Milestone. Now featuring integration with Genetec, Milestone, Verint, and ISS solutions, VuWall is helping customers meet increasing visualization requirements in security and surveillance markets.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratization of AI in the IP camera market.Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding The Global IP Camera Market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analyzed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-Processor-Enabled Video Analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most timeMicroprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognize how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast Processing For Rapid Response At City Level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyze traffic situations Quick local decisions on the video cameras are also used to help analyze traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-Time HD Video Monitoring And Recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-Gen IP Cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognized in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyze the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalization. Each camera at the edge can be personalized to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recognizer on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI At The Edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
Managed services provided through the cloud offer multiple advantages for system integrators. These Include: Increased Recurring Monthly Revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier Customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. High Gross Profit Margins: Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. They Are Easier To Provide: The cloud enables integrators to serve more sites without hiring additional technicians. Problems Can Be Fixed Proactively: When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue - possibly before the customer even notices a disruption in service. Increased Valuation Of Business: According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Importance Of Cloud-Based Solutions The cloud also challenges integrators to educate customers on the value of the new approach The cloud also challenges integrators to educate customers on the value of the new approach. For example, the cloud changes the expense model of security systems. It allows customers to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into the service, you don’t need a large capital outlay up front - you simply pay a predictable expense every month. Leveraging this difference opens new sales opportunities for integrators. The benefits of cloud services on how physical security equipment and software services can be monitored and maintained through a connected service is a particular benefit to integrators. Data Monitoring And Security “By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user,” says Stuart Rawling, Director of Business Development, Pelco by Schneider Electri, and one of our Expert Panelists. A daily challenge for end users is balancing human resources used in the operation of a system “Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymized, it could also be used by manufacturers to analyze and form conclusions about maintenance schedules and system lifespan.” A benefit is happier customers. “A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator,” says Rawling. The Cloud Software As A Service The SaaS model gives companies the resources to improve the deep learning model" The cloud also can help to make cutting edge technologies more affordable. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. “Having a SaaS model gives companies the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision, a provider of deep learning video analytics. “We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefit from another customer and all the knowledge is aggregated together.”
Lack of cybersecurity of video systems made headlines in 2016. The Mirai cyberattack that year impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cybersecurity attacks later in the day were more global in nature. The cyberattacks were carried out by a botnet, a network of bots, which are software applications (in this case, computer viruses) that communicate with each other and run tasks automatically over the Internet. IP-Enabled Cameras Bots can infiltrate unprotected computers and then use the computing power of their ‘hosts’ to carry out various kinds of cyber-attacks on other Internet targets. In the case of the Mirai attacks, a hidden army of bots worked together to bombard various websites with so many bogus requests that the sites became overwhelmed by the volume of traffic and could not respond to legitimate requests. It’s called a denial of service (DDS) attack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders (DVRs). In other words, the bots used the computing power of our industry’s video products to launch the headline-grabbing cyberattack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders Safeguarded Communication Since 2016, awareness of cybersecurity for video systems has grown. Today, it is understood that video solutions should be designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted, and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS). Some basic best practices can go a long way to improving the cybersecurity of video systems. A small change is to remove default passwords from products and software, and to avoid using ‘guessable’ passwords. All firmware should be encrypted to reduce the possibility of it being downloaded from the manufacturer’s website and deconstructed. Use of a secure operating system that is regularly updated can protect against video tampering, altering, spoofing and snooping. Video Surveillance Systems Another precaution is to avoid remote login using Telnet or FTP, which are less secure. Finally, use of digital certificate provides assurance that data from a third party is true and not falsified. All data should be encrypted with digital certificates. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats Free downloadable guides and other resources provide specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives. For example, the OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices, collaboration with IT and HR departments and how to apply software and firmware security updates. Hardware-Level Encryption It also includes standard, advanced and enterprise cybersecurity best practices for cameras, servers and workstations and networks. Another cybersecurity requirement is data-at-rest encryption to ensure that data, such as stored video, is secure right down to the storage medium in which it is held. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Despite the clear benefits, data-at-rest encryption lags other areas, such as network and endpoint security, in terms of the investment it currently receives. A Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated Video Cloud Service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organizations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-Accelerated Solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM Software Platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial Recognition Software IOmniscient Corp. provides facial recognition software that can recognize multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognize multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorized person and track him or her across non-overlapping cameras. Enhance Situational Awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-Class Security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimized to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic Physical Security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable products UL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive Automated System Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create Significant Value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organization.
Video surveillance is used for more than just safety and security: users are discovering that high-resolution images and user-friendly features make surveillance cameras a valuable asset for all sorts of applications. A cattle ranch in Manatee County, Florida found that a Dahua PTZ was the perfect way to observe eagles without disturbing their habitat. Dahua PTZ Cameras When Hurricane Irma pummeled Florida in 2017, Victoria and Nicholas, a pair of American bald eagles, watched their nest get destroyed. Undeterred, they began building a new nest in a tree right next to the old one. The ranchers on whose property the eagles lived were so inspired by this show of dedication that they decided to install cameras nearby to share the eagles’ story with the world. They reached out to Jens Buff, security consultant with Rapid Security Solutions, for support, and he contacted Dahua. Dahua donated a 4MP 30x IP PTZ, which was mounted to a tree in order to observe the nest up close. Dahua donated a 4MP 30x IP PTZ, which was mounted to a tree in order to observe the nest up close But disaster struck yet again! In 2018 “an unnamed storm, unexpected and unseasonable, blew through our area with pounding rain and ferocious winds,” stated the Eagle Country YouTube page. “Sadly, the eagles’ nest was blown to the ground in pieces again! We wondered if they would relocate, but this was Nicholas and Victoria. The very next day they began to rebuild. The cameras we placed after Irma were not destroyed and we are able to watch this incredible story continue.” Smart IR And Day/Night Surveillance Dozens of YouTube videos, as well as a live feed, give viewers a rare glimpse into the day-to-day lives of these majestic birds. Whether they’re incubating eggs, eating dinner, cleaning house, or fending off intruders, their activities are captured in clear video both day and night. The camera’s true day/night IR cut filter and Smart IR allow for crisp nighttime images without “whitening out” as the eagles get close to the camera. True WDR preserves the image in the direct sunlight that’s unavoidable at the top of a tree in the Sunshine State. The easy-to-use PTZ features let the ranchers follow the eagle’s actions without bothering them by manually repositioning the camera. “Dahua’s PTZ was the perfect choice to view one of life’s most beautiful creations living in nature,” Mr. Buff remarked.
Responsible for the safety and security of a huge number of public facilities, including leisure centers, libraries and event spaces, local authorities are increasingly looking for ways to improve security, while also streamlining the security management process. With multiple requirements from a legislative, insurance and public safety perspective, local authorities need a simple and effective solution that provides flexibility through advanced technology. Security must be closely monitored and access restricted where necessary, while at the same time enabling easy access to public areas. Electronic Key Technology Advanced software suites can provide access to all operations performed by users Through innovative electronic key technology, local authorities can simply and cost-effectively replace existing mechanical locks, with a solution that provides integrated intelligence in the key, with permissions stored within it. If your key has authorization for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by your key will be recorded. With high volumes of people entering and exiting local authority facilities, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by local authorities for audits, improvements or compliance. Utilising the latest contactless technology further enhances the electronic key solution, enabling multiple access options and deeper levels of access rights. Manage Access Operations The most innovative system is compatible with badges and cards, and the keys are equipped with a radio-frequency identification (RFID) module. Combining the solutions enables local authorities to manage access operations in great detail, with access rights granted depending on specific conditions. For example, the members of an orchestra may only be able to access the music conservatory, using their membership card or badge, if a music professor has already entered the premises using his electronic key. Permissions can be added or updated from a computer or, even more conveniently, using an app on a smartphone at any time, which will update your key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with local authority access policies and removes travel and fixed authoriser costs. Public Safety And Security Saint-Avertin's access points are now managed by the new LOCKEN solution In turn, this delivers increased flexibility and higher levels of security. With public safety and security high on the government’s agenda, local authorities are increasingly required to adopt the most technologically advanced access control solutions and LOCKEN, the leader in cable free access control solutions is on hand to help with their solution based on advanced software LOCKEN Smart Access. Equipped with LOCKEN electronic cylinders since 2010, Saint-Avertin's access points are now managed by the new LOCKEN solution. More efficient and communicative, this makes it possible to adapt to even more varied types of access. Laurent Lacour, head of the municipal police, highlighted the benefits of this decision: “It is a very positive step for us. Firstly, because the new contactless key is much faster than the previous one. It is impressive and very important for our day-to-day work: as soon as the key is entered into the lock, the cylinder opens. It opens regardless of whether any dust or foreign bodies have built up." New-Generation Keys “Above all, the MyLocken app significantly enhances the system’s security by allowing rights to be allocated anywhere and at any time.” Christophe Fort, deputy head of the police, added: “The new-generation keys offer another vital advantage for our town. The system is compatible with the use of badges and the keys are equipped with an RFID module, which acts as a badge.” While an electronic key cannot be given to every member of a sports association, it is possible to give the members a badge. This means that, eventually, several thousand people will have access to the facilities while respecting the security of the premises as a whole. Access Control Solution Combining the solutions does not stop the management system from remaining perfectly effective" “Combining the solutions does not stop the management system from remaining perfectly effective. On the one hand, because the program manages access operations in great detail. And on the other, the badge reader specific to a building is only triggered if access to the site has previously been unlocked by an electronic key belonging to a manager. For example, the members of a swimming association will only be able to access the building if a swimming pool manager is already on the premises.” The future prospects mentioned by the two police officials - installation in a new gymnasium, fitting electronic padlocks to the mobile barriers around the château, etc.- demonstrate the extent to which the solution meets the municipality's needs across the board. Saint-Avertin, is a dynamic town with a population of 15,000, which forms part of the university town of Tours, twenty times larger. LOCKEN hopes to extend its access control solution to other areas of this historic city.
Maintaining an educational environment that is conducive to learning requires, at a minimum, that we keep our school children safe and secure. It’s easier said than done, given the wide range of sizes and types of educational institutions. Campus Security High-profile violence in educational environments highlight the urgency of the need for security and safety systems High-profile violence in educational environments highlight the urgency of the need for security and safety systems, and the challenges extend beyond preventing the active shooter incidents that grab headlines. In the United States, 79% of public schools recorded that one or more incidents of violence, theft, or other crimes had taken place, amounting to 1.4 million crimes. That translates to a rate of 29 crimes per 1,000 students. Security is a 24-hour challenge. Protecting schools involves deployment of a range of security and physical hardening tools. Reducing risk requires that access to school buildings be controlled, while also preserving an ‘open’ campus atmosphere that promotes a learning environment. Schools should be an inviting place for students and families, so technology solutions aimed at restricting access should be low-profile and unobtrusive. School security must also be designed in layers, or concentric circles of protection, starting at the school’s perimeter and working inward to secure individual classrooms and other internal areas. Enhancing Video Security At Schools Video surveillance is a technology that is unobtrusive and can promote security beginning at the outermost boundaries of the school environment – at the perimeter and as automobiles drive onto school grounds. Surveillance can keep a silent and constant watch on people comes and goes. Furthermore, incorporating new artificial intelligence (AI) and deep learning technologies are increasing the real-time capabilities of video surveillance to provide early warning of a possible security threat as it enters a campus. AI and deep learning analyze the content of video feeds and provide usable information to security personnel, including analysis of trends and real-time alarms when an event takes place. Incorporating AI Into Video Security Video feeds are analyzed in real-time and alarms can be raised only if there is a problem In addition to controlling perimeter access, video surveillance incorporating AI can also provide other benefits, such as keeping watch on a school campus after hours – before and after school, or even on weekends when extra-curricular activities may be taking place. The systems can monitor traffic flow and ensure that only authorized vehicles enter an area. The benefits of AI-driven video systems also enable greater effectiveness of systems that are not being actively monitored. Video feeds are analyzed in real-time and alarms can be raised only if there is a problem. Whenever a vehicle passes into a restricted area on a school’s campus, the video system captures a vehicle image and automatically provides significant data. ANPR systems Automated number plate recognition (ANPR) systems identify the license numbers of cars that enter a school’s parking entrance or gate and can match the numbers to a watch list and provide an alarm. The technology could also be used to monitor compliance with restricted areas; for example, to only allow vehicles that registered for a parking pass to park in a certain lot. A more advanced approach could involve dual identification technologies – vehicle plate and facial recognition of a driver – to add another layer of security. Video systems with illegal parking detection can define a zone for no parking at a school. If any vehicle enters the area, the camera will be triggered to collect evidence. Images are captured of illegally parked vehicles, and the system provides data about when and where it occurred, the vehicle plate number and the parking violation. Traffic Cameras With DL Technology Traffic cameras with deep learning technology can also identify and classify vehicles Traffic cameras with deep learning technology can also identify and classify vehicles; in effect, to distinguish between small and large vehicles and even detect a vehicle’s make, model and color. For instance, it is possible to differentiate between cars and buses in ‘buses only’ areas. Currently such cameras are more commonly deployed on public streets and highways, but the capability is there. The system can also capture images and produce alarm data if a vehicle is driven in the wrong direction, such as into an exit-only lane or the wrong way on a roadway. Facial Recognition Systems Facial recognition can be used at school entrances and gates to promote security of students and staff and to identify known suspects who attempt to enter the building. ‘Blacklist alarm’ technology generates a notification if a known suspect enters. Clarity is paramount when identifying faces, and cameras that provide wide dynamic range (WDR) can offset challenges such as backlighting on a bright day when the light behind a person coming in is brighter than the ambient light inside. People Counting Cameras Facial recognition systems can also be used inside school buildings. A facial recognition terminal installed at the entrance of a campus building or library can be configured to ensure that only registered students and staff have access to the buildings. People counting cameras can be used in cafeterias and libraries to provide daily or monthly traffic reports and to better understand peak times and arrange workflow accordingly. Unified Security Solution Tedious and error-prone manual monitoring can now be replaced by more intelligent systems Feeds from all the cameras can be managed, monitored and stored in an authorized security center, either located on a campus or in a central location that combines camera feeds from multiple campuses in a school district, for example. In general, security staff can access surveillance data in a variety of ways, via a desktop, laptop, or mobile device. Such flexibility makes the job of security personnel easier. A campus police or resource officer can view video on a mobile device while patrolling the campus. Often video surveillance systems at schools are not monitored. School security personnel have more pressing duties than sitting in front of a video monitor, and it is difficult for operators to stay alert for detailed incidents that may be shown on the screen. Tedious and error-prone manual monitoring can now be replaced by more intelligent systems that provide alarms only when there is something to see. Maximizing School Surveillance Capabilities Systems to maximize school surveillance and security include dedicated, high-performance cameras for event capture, embedded network video recorder for event recording and storage, and a centralized video management platform to unify the system. AI and deep learning technologies automate security processes and provide useful real-time information that extends beyond video images. Deploying these technologies at the perimeter can promote better security campus-wide by preventing danger from entering the learning environment.
The Malaysia government water treatment plant envisions providing the best water treatment with demand of high security protection in the industry sector. Furthermore, the highly reliable platform with flexibility to expand storage by year and budget becomes important criterions to select the ideal surveillance partner. Surveon NVR7800 ensures high video image quality with high throughput capability, in addition to flexible JBOD storage expansion capability. Surveon NVR7800 Series Surveon NVR7800 Series was designed as a recording server with an archiving function Price and performance are always the key elements to help Surveon to win projects. Surveon NVR7800 Series was designed as a recording server with an archiving function that offers multiple advantages compared to traditional system structures composed of recording server plus a separate storage device, making it the top choice for the water treatment plant. The big scale industrial plant installs 50 to 100 cameras at each site in demand of high image quality. The plant needs a reliable system that supports recording with hundred channels and is able to transmit high resolution images smoothly. The NVR7800 Series delivers a high level of recording throughput of nearly 2000 Mbps, supporting recording with more channels, allowing system to receive better video image quality by higher bitrates, and ensuring smooth transmission even with high frame rate. Compatible With 3rd Party VMS Support up to 316 drives with high density 4U 60-bay expansion enclosure (maximum capacity of up to 3.6 PB with 10TB HDD). It supports to expand storage through JBOD by year, timeline and budget with best flexibility. This provides the government owned plant to expand facilities by year, timeline and budget. The water treatment plant prefers a solution which is fully compatible with Axxonsoft VMS. The NVR7800 Series is 100% compatible with major 3rd party VMS, including Milestone, Genetec and Axxonsoft VMS with certification. Supports Multiple Network Cameras Based on Milestone test findings, NVR7800 Series supports up to 150 cameras Based on Milestone test findings, NVR7800 Series supports up to 150 cameras, more than twice Milestone’s benchmark level in a non-stop recording scenario. The system is even capable of supporting more than four times the number of cameras estimated by benchmark under the testing scenario where motion detection is enabled, giving medium to large projects the best price-performance solution. "The hybrid server-storage design of NVR7800 Series gives us the best C/P value candidate. The enterprise level RAID engine enables highest level data protection with RAID 1+Spare, 5+Spare, 6+Spare technology to support robust data protection even with HDD error. Further, the flexibility to connect JBOD provides the high flexibility to extend recording time base on project demand. We are very satisfied with the result and look forward to working with Surveon next time." said the administration manager of the water treatment plant.
Decades of experience, innovative ideas, a strong commitment to quality, and a full range of first-class offset printing services: Mohn Media Mohndruck GmbH, a company of the Bertelsmann Printing Group, is one of Europe’s providers of printing and media services. At its facility in Gütersloh, Germany, some 2,000 employees are involved in professionally creating and executing tailored solutions for customers across a variety of industries. To avoid endangering staff and production, the company also has extremely high standards where the plant’s safety and security are concerned. And Bosch has supported the print specialists with advanced technology and services through multiple system generations. Cutting-Edge Solution The latest new project involved implementing a networked solution to improve fire safety “Again and again, we’ve been impressed by the innovative solutions that Bosch comes up with for us,” says Jörg Naumann, who heads the company’s fire brigade. “Bertelsmann has been partnering with Bosch for over 35 years, and for good reason.” The latest new project involved implementing a networked solution to improve fire safety in the eight-meter-high waste paper warehouses. On average, around 300 tons of paper are stored there at any given time. Problems in waste paper removal would directly impact production. To enable prompt responses to any fire events in these sensitive areas, the Bosch experts planned and implemented a cutting-edge solution. Fire Detection System AVIOTEC, the first video-based fire detection system to be certified by VdS Schadenverhütung GmbH (the VdS is an independent, renowned institution for enterprise safety and security, and harmonized body for international safety standards) plays a key role in it. Intelligent algorithms directly integrated in cameras reliably detect the first signs of any smoke or flame. This technology detects fires at their source much more reliably than conventional detectors Particularly in challenging large-volume buildings, this technology detects fires at their source much more reliably than conventional detectors, which are not triggered until smoke reaches them. The data generated by the new fire protection solution come together in the Bosch Video Management System. If AVIOTEC identifies a potentially dangerous situation in any of the waste paper warehouses, it immediately alerts the continuously staffed emergency service desk of the plant fire brigade. Building Integration System The situation can then be checked on a video screen and appropriate steps will be initiated. The use of this innovative technology permits very early detection of any fires. This prevents major damage and resulting production downtimes, thus saving the company a great deal of time and money. To additionally enhance security and efficiency, all of the integrated on-site systems for fire protection and video security are managed by the Building Integration System from Bosch. As required, the security systems can be centrally or locally monitored and controlled by staff as appropriate. Not only Mohn Media benefits from this, but also all of the other companies of the Bertelsmann Printing Group operating at the same site.
Neath Port Talbot residents have been given a road safety boost in the form of a new Mobile Enforcement Vehicle (MEV). It has been supplied by Videalert, one of the UK’s leading suppliers of intelligent traffic enforcement, video surveillance and management solutions, which was awarded the contract after due procurement process. Mobile Eforcement Vehicle “Indiscriminate and dangerous parking around Neath Port Talbot will no longer be tolerated,” said Councillor Rob Jones, Leader of Neath Port Talbot County Borough Council. “The newly purchased mobile enforcement vehicle seeks to challenge those drivers who choose to park on school keep clear markings, within clearly defined bus stops and on pedestrian crossings with no thought for the safety of others. It is hoped that this MEV vehicle will help to further ensure greater safety and protection for pedestrians and other road users as we progress through 2019.” It is hoped that this MEV vehicle will help to further ensure greater safety and protection for pedestrians" As part of an ongoing campaign, the council’s road safety team carried out a county-wide School Gate Parking campaign in partnership with South Wales Police and the Mid and West Wales Fire and Rescue Service. This included banners to be displayed outside all schools to raise awareness as well as delivering education to all pupils - encouraging them to be a positive influence on their guardians taking them to and from school. However, it was determined that enforcement for persistent drivers was the most effective way to tackle this growing road safety menace. ANPR And Digital Video Platform The Mobile Enforcement Vehicle (MEV) comes equipped with two roof-mounted high-tech ANPR cameras and two colour cameras to capture contextual video evidence of vehicles whose drivers have chosen to contravene traffic orders across the County’s territories. The on-board systems are controlled by one of the Council’s Civil Enforcement Officers using a dashboard-mounted touchscreen. All contravention evidence data is transferred to Videalert’s Digital Video Platform in the parking office at the end of each shift. The Videalert system automates the construction of video evidence packs which are reviewed by trained council operatives prior to sending confirmed offences to the back-office processing system for the issuance of penalty charge notices to the registered keepers of vehicles. Road And Residential Safety The winning entry of ‘iPatrol’ was submitted by a pupil at Gnoll Primary School In order to promote the safety messages to younger residents, the Council’s Road Safety Team also engaged with all Primary School pupils in a competition to name the vehicle. The winning entry of ‘iPatrol’ was submitted by a pupil at Gnoll Primary School who was presented with a Chromebook, sponsored by Videalert, by Neath Port Talbot Council Mayor Cllr Dennis Keogh at the Mayor’s Parlour in Port Talbot on Thursday, January 24th. According to Tim Daniels, Sales and Marketing Director at Videalert: “This new generation of multi-purpose mobile enforcement vehicles (MEVs) gives Councils greater flexibility in the way that they can deal with a wide range of moving traffic and parking contraventions.”
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?