Network Video Recorders
Honeywell is adding to its video series line with the launch of the 30 Series Embedded Network Video Recorders (eNVR), the latest affordable and fully featured NVRs that offer 4K HD (UHD) video resolution. The Honeywell 30 Series eNVRs are designed for use as part of video systems which comply with the John S. McCain National Defense Authorization Act 2019 (NDAA), Section 889. They are also PCI-DSS compliant and include enhanced cybersecurity with a built-in FIPS chip set Users will also benefi...
Arteco 9000 is the new surveillance server designed to offer the company’s customers a powerful and affordable solution for a variety of application demands. Ideal for those who need to manage IP video surveillance in medium-to-large installations, Arteco 9000 can handle IP video sources from all major international manufacturers and is compatible with ONVIF and RTSP devices. Each Arteco 9000 comes pre-loaded and tested with the users selection of Camera licenses (sold separately). Choose...
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announces a new line of NVRs (Network Video Recorders) that include its powerful Wisenet WAVE video management software (VMS). Designed for small to medium-sized video surveillance installations, the new, affordable NVRs deliver a complete video management and recording solution in a rack mountable chassis with no need to install a separate server. With a focus on ease of use and installation, the 8 channel...
Global Networking Company, D-Link Corporation has announced the release of its new DCS-8302LH Full HD Outdoor Wi-Fi Camera. Featuring AI edge-based person detection, this intelligent camera can identify human motion, thereby reducing false alarms, so that users receive more relevant detection notifications. DCS-8302LH Outdoor Wi-Fi Camera The DCS-8302LH Full HD Outdoor Wi-Fi Camera offers unlimited surveillance in vivid Full HD 1080p clarity and can capture every small detail, even at night or...
Senstar, a pioneer in video management and perimeter intrusion detection solutions, is pleased to announce the release of Senstar Symphony 7.4.1 featuring support for PostgreSQL high availability. The award-winning Senstar Symphony delivers an all-in-one solution for video, security, and information management. Senstar Symphony works with cameras from all major manufacturers, scales to deployments of any size, and is easy to use and configure. Video management software With built-in support f...
Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd, a provider of cyber security solutions globally, publishes its latest Global Threat Index for August 2020. Researchers found that the Qbot trojan, also known as Qakbot and Pinkslipbot, has entered the top ten malware index for the first time, ranking as the 10th most prevalent malware in August, while the Emotet trojan remains in 1st place for a second month, impacting 14% of organizations globally....
Matrix is gearing up for participation in the 2nd Edition of, IFSEC Virtual Expo 2020 to be held on 17 and 18 September 2020. Matrix will be launching its latest Time-Attendance and Access Control device COSEC ARGO FR along with its People Mobility Management and Video Surveillance solutions. Matrix is well-known for its indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attendance. Each of the solutions is specifically designed for large, multi-location enterprises, SME and SMB organizations. Matrix continuously works towards keeping abreast of the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Security and Telecom solutions at the Virtual event. Event Highlight ARGO FR is a performance, design, and engineering wonder, equipped with an enhanced IPS LCD touchscreen At IFSEC Virtual Expo, they will be launching COSEC ARGO FR. It supports multiple contactless credentials such as face, smart cards, PIN, cellphone using BLE. ARGO FR is a performance, design, and engineering wonder, equipped with an enhanced IPS LCD touchscreen for a visually splendid experience. The addition of Gorilla glass calls for enhanced toughness. This device has higher processing speed, wall and flush mounting options, and increased fingerprint and event storage capacity. It is specifically designed for serious Time-Attendance and Access Control applications. This device offers connectivity options like Bluetooth, Wi-Fi, PoE, and USB. Furthermore, IP65 and IK08 certifications make it suitable for challenging and outdoor installations. Temperature Screening Matrix’s solution experts will be demonstrating the touchless and auto temperature measurement solution In the wake of a pandemic, organizations are forced to navigate some attention on safety and hygiene. So, Matrix’s solution experts will be demonstrating the touchless and auto temperature measurement solution, User Temperature Screening. This eliminates the manual temperature reading process and replaces it with an advanced and much safer one. This setup notifies the authorities in case of exceptions. The other thing which is going to be shown in this exhibition is Time-Attendance and Access Control with contactless credentials. At IFSEC Virtual Expo, Matrix would be demonstrating their product range from the SATATYA family of security solutions which involves the 8MP Project Series Bullet Camera, SATATYA Network Video Recorders and SATATYA SAMAS. Bullet Camera The 8MP Project Series Bullet Camera is designed to meet the needs of large organizations To begin with, the 8MP Project Series Bullet Camera is designed to meet the needs of large organizations and demanding project applications. Powered by smart processors with Deep Learning Algorithms these IP cameras are an example of superior image quality and performance. To emphasize on the image quality, the cameras are equipped with SONY STARVIS back-illuminated sensors which give exceptional image quality in low lighting conditions. Besides this, the 4K cameras are equipped with intelligent video and audio analytics like motion detection, intrusion detection, tripwire, gunshot detection, scream detection and many more. Also, they are robust devices that can be installed in all kinds of environments. Network Video Recorders SATATYA Network Video Recorders are designed for serious video surveillance deployments To add to this, the SATATYA Network Video Recorders are high performance, power-packed workhorses which are designed for serious video surveillance deployments. In addition to high-resolution recording and live view of multiple streams, they offer innovative cascading, powerful investigators and instant notifications. Not to miss, the device has a 512Mbps throughput capacity with 4K Decoding. All in all, these flexible and reliable NVRs are ideal for modern organizations looking for proficient, persistent and preventive security. Lastly, the string that binds the video surveillance solutions and the devices together, SATATYA SAMAS is the solution that is designed to combat the security needs of modern organizations. Designed on pillars like optimizing cost and providing proactive security the solution is one's one-stop solution for diverse security needs. Intelligent video analytics Not to forget, the solution gives real-time security with the help of intelligent video analytics like Missing Object Detection, Motion Detection, No Motion Detection, etc. Apart from this, it can be integrated with other third-party security systems like Access Control, Fire Alarm, Parking Management System, etc. “IFSEC Virtual Expo is South Asia’s largest security, civil protection and fire safety show, which in turn provides us with a platform to expand our ties with industry experts and system integrators. The event also serves as a great stage for highlighting our well-engineered solutions. We aim to use this opportunity to expand our network and spread word about our technologically advanced Security solutions”, Kaushal Kadakia, Marketing Manager Matrix Comsec.
As the media often reports, the world of cybersecurity can be seen like the ‘Wild West’. There’s now a wide range of Internet of Things (IoT) devices connected to the web, making this a hot topic. Among these devices are security cameras. IoT devices are computers that use software that makes them vulnerable. As the famous cybersecurity evangelist Mikko Hypponen says, "If a device is smart, it's vulnerable!" Hypponen is right. On a daily basis, new vulnerabilities are found in software, regardless of the manufacturer. In 2019, more than 12,000 vulnerabilities worldwide were made public and reported as a CVE (Common Vulnerability and Exposure) in the National Vulnerability Database (NVD). Unfortunately, vulnerabilities are a given. What really matters is how a company deals with and resolves vulnerabilities. Cybersecurity vulnerabilities Awareness of cybersecurity vulnerabilities is vitally important to protect one, one’s business and the Internet Awareness of cybersecurity vulnerabilities is vitally important to protect one, one’s business and the Internet, but it’s also important to understand that a vulnerability is not synonymous with “backdoor”, and is not necessarily indicative of “cheap quality.” But there are companies out there that are embedding safeguards into their development processes to reduce the risks. One could see them as ‘Sheriffs’, taking steps to make this Wild West a little safer. Hikvision ‘Secure-by-Design’ Manufacturers of IoT devices can significantly reduce these vulnerabilities during the production of devices Security cameras, like all other IoT devices, are vulnerable to cyberattacks. Fortunately, manufacturers of IoT devices can significantly reduce these vulnerabilities during the production of devices, using a process called ‘Secure-by-Design’. Implementation of Secure-by-Design requires a commitment on the part of the manufacturer’s management team and a serious investment in resources and technology, which can result in a longer production process and a higher cost of the IoT device. Cost is often the reason why some IoT device manufacturers do not use Secure-by-Design (and are indeed cheaper). Hikvision is a producer of IoT devices that takes security and privacy very seriously and has implemented Secure-by-Design in its production process. Management supports this process and has even set up a dedicated internal cybersecurity structure charged with product cybersecurity. This group is also the central point of contact for all other cybersecurity matters. Product testing Hikvision Security Development Life Cycle (HSDLC) is an essential part of Hikvision's cybersecurity program The Hikvision Security Development Life Cycle (HSDLC) is an essential part of Hikvision's cybersecurity program. Cybersecurity checks take place at every stage of product development — from concept to delivery. For example, product testing takes place during the verification phase, the company also regularly invites well-known security companies and public testing platforms to conduct penetrating testing. There is no guarantee if Hikvision products are immune to hacking, but the HSDLC is a testament to a manufacturer that makes every effort to produce products that are as cyber secure as possible. In addition to the Secure-by-Design process, Hikvision opened a Source Code Transparency Center (SCTC) lab in California in 2018, being a lab to open such a center. At this center, U.S., the Canadian government and law enforcement agencies can view and evaluate the source code of Hikvision IoT devices (IP cameras and network video recorders). Hikvision firmware Hikvision has a Vulnerability Management Program in place when a vulnerability is discovered It’s important to emphasize that no product is 100 percent secure. Hikvision has a Vulnerability Management Program in place when a vulnerability is discovered in a product. To date, vulnerabilities that have been reported to Hikvision and/or made publicly known, have been patched in the latest Hikvision firmware, and are readily available on the Hikvision website. In addition, Hikvision is a CVE CNA, and has committed to continuing to work with third-party white-hat hackers and security researchers, to find, patch and publicly release updates to products in a timely manner. These vulnerabilities are collected in the National Vulnerability Database (NVD) and are public. Hikvision recommends that customers who are interested in purchasing security cameras inquire about a manufacturer’s cybersecurity practices and if they have an established Vulnerability Management Program. Cybersecurity questions to consider The cybersecurity of IoT devices is a topic that needs to be addressed in a serious way and it should play an essential role in the product development process, beginning at the concept phase of an IoT product. This requires time, investment and knowledge. Consider the following questions: Trust on the manufacturer of a low-cost security camera Manufacturer with a dedicated cybersecurity organization Manufacturer on handling the vulnerabilities These are the questions that everyone should ask themselves when making a purchase, be it a camera or any other IoT product. Cybersecurity practices There is no absolute 100% guarantee of security, but Hikvision has practices to ensure the cybersecurity for its cameras. Cooperation, with its customers, installers, distributors and partners, and full transparency are key elements to successfully secure IoT devices. When one reads cybersecurity news, one is invited to look beyond the headlines, and really get to know the companies that produce the IoT devices. Before one buys a security camera or any IoT device, it is advisable to check out the manufacturer’s cybersecurity practices, look for a company with a robust vulnerability management program, a company that aligns itself with Secure-by-Design and Privacy-by-Design and a company that employs cybersecurity professionals who are ready and eager to answer one’s questions. One may remember that there are Sheriffs out there, as well as bandits.
ONVIF, the renowned global standardization initiative for IP-based physical security products, is announcing that it is now live on GitHub, an online open source development platform. The repository at github.com/onvif/specs will help drive the development of ONVIF network interface specifications. “By having a repository on GitHub, ONVIF is making its interface specification development process more accessible, transparent and efficient,” said Per Björkdahl, Chairman of the ONVIF Steering Committee. “We encourage ONVIF members and the global developer community to go to our GitHub site and contribute to the standardization work of supporting greater feature interoperability and innovation.” Physical access control systems The ONVIF GitHub site provides the source files of ONVIF specification-related documents ONVIF interoperability specifications are already publicly available as open standards and are implemented by more than 400 manufacturers of IP surveillance cameras, video management software and physical access control systems to enable communication between conformant devices and clients from different vendors. Opening the development of network interface specifications to the greater developer community will allow for input from other industries, such as IoT, artificial intelligence, cloud services and other technology domains. The ONVIF GitHub site provides the source files of ONVIF specification-related documents, including schema files, which describe the XML framework of specific ONVIF features and functions. Advanced video streaming Developers with an active GitHub account may propose changes via so-called pull requests. A dual license scheme enables ONVIF to publish these extensions and enables further evolution by the open source community. Changes ultimately accepted by the ONVIF Technical Committee will be published on the ONVIF public website. The GitHub platform enables greater automation and efficiency by automating key areas of the process The GitHub platform enables greater automation and efficiency by automating key areas of the process. This includes removing the manual handling of change requests via a ticket system, and automatically merging accepted changes into a development branch, which eliminates the need for a dedicated editor to update the network interface specification files. Physical security products Over the course of its 11-year history, ONVIF has also developed several profiles (groupings of certain functionalities derived from established ONVIF network interface specifications) that enable the performance of a set of features: Profile S for streaming video; Profile G for video recording and storage; Profile C for physical access control; Profile Q for quick installation, Profile A for broader physical access control configuration and Profile T for advanced video streaming. While profile development is not open sourced, ONVIF widely expects that specification contributions realized via open source will support the development of future profiles. Founded in 2008, ONVIF is a renowned and well-recognized industry forum that is committed to driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management software and access control companies, and nearly 19,000 profile conformant products.
New Wisenet WAVE PoE NVRs introduced by Hanwha Techwin are designed to provide a cost-effective way for users to be able to take advantage of the highly popular Wisenet WAVE video management software (VMS), without having to install a server. The 8 channel Wisenet WRN-810 and 16 channel WRN-1610S NVRs are equipped with a powerful processor to provide users with a seamlessly integrated and optimized way of utilizing the latest version of the feature-rich VMS. The WRN-810 stores up to 12 terabytes of data with the help of 2 internal SATA HDDs and the WRN-1610S stores up to 24 terabytes of data via 4 SATA HDDs. “In addition to the immediate benefit that the Wisenet WAVE VMS embedded in the NVRs is ready to be used out-of-the-box, we also offer system integrators peace of mind in knowing they can rely on us to provide one-stop customer support for the combined hardware and software solution,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Licensing The cost of deploying the NVRs is further reduced by built-in PoE switches which provide an installation time-saving method A key objective of introducing the two new NVRs has been to minimize the total cost of owning Wisenet WAVE and Hanwha Techwin has achieved this by negating a requirement to purchase, install, house and maintain a server normally needed to run the software. Users are also able to take advantage of flexible ‘future ready’ licensing arrangements whereby they only have to initially purchase licenses for half the respective NVR’s channels and then only pay for the remaining licenses, if and when required in the future. The cost of deploying the NVRs is further reduced by built-in PoE switches which provide an installation time-saving method of supplying power to connected cameras. Operator friendly Intended to meet the needs of small to medium-sized video surveillance projects, with an emphasis on a simplified user experience, Wisenet WAVE features an intuitive ‘drag & drop’ tool which makes it extremely easy for operators to set up a display of live and recorded images on a single screen or video wall, with customizable layouts and sizes. This tool is supported by a ‘Layout-as-an-Action’ feature, which triggers a predefined screen layout to automatically open when an event occurs, whilst a wide range of Smart search options, including keyword, calendar and time-slice search, enable operators to quickly retrieve recorded video of specific incidents. Adding to ease of use, a virtual PTZ enables operators with just a few simple clicks of a mouse, to zoom in to see close up detail of any suspicious activity. WAVE 4.1 The 2 NVRs are embedded with the latest version of Wisenet WAVE 4.1, which is equipped with a long list of new practical features including Push notifications of user-defined alarm events which can be sent to mobile devices, and embedded camera web pages that enable operators to manage the settings of connected cameras without having to open a separate browser window. An enhanced Smart search allows users to set-up an Analytics Event Region of Interest (ROI), to narrow a search to a specific area of a field of view, while integration with Wisenet AI cameras enables the attributes of classified objects or people to be displayed on recorded vi Users are also able to forensically search for specific objects or people by filtering the recorded metadata. Wisenet AI cameras “The availability of these 2 new affordable NVRs, means even small shops and offices will now be able to take advantage of Wisenet WAVE user-friendly features to quickly retrieve and review recorded video of any incidents, as well as view live images,” said Uri Guterman. “Although Wisenet WAVE, subject to a minimum specification, will run on virtually any server, embedding the software on the NVRs means installation time is minimized and users can expect to enjoy a robust, cyber secure and optimized recording solution which offers a high level of reliability and performance.”
Infortrend® Technology, Inc., the enterprise storage provider, has introduced an excellent EonStor CS scale-out NAS solution for large-scale surveillance video archiving from more than 1000 IP-cameras. EonStor CS is a highly scalable solution with both scale-out and scale-up expandability to provide large capacity and high availability for continuous services. Capacity can be scaled to 100+ PB for archiving large surveillance data volumes. To get the complete sophisticated surveillance solution with high-quality video recording and archiving, CS can be integrated with such major VMS providers as Milestone, Genetec, and Digifort. Video surveillance projects CS 2000 is suited for video surveillance projects with 1000+ IP-cameras with video resolution 3MP or higher and requirement of at least 90 days video retention period. While Tier 1 storage devices feature high performance for real-time data writes, they lack capacity scalability options for large-scale archiving. All recordings from numerous sites are stored and accessed under a single namespace Contrarily, with excellent capacity scalability, CS 2000 works perfectly as a Tier 2 storage for archiving videos that were initially written to a local server. All recordings from numerous sites are stored and accessed under a single namespace to eliminate data isolation, thus, easing management burden for IT-administrator. High-Density form factor CS 2000 comes in 4U 60-bay high-density form factor offering high capacity and saving rack space. Data is completely protected within one node and across nodes via RAID and erasure code. To optimize capacity utilization and save costs, Infortrend's exclusive distributed mode can be configured. For critical footage, erasure code policy is recommended. "With EonStor CS 2000 cluster, you can rest assured that all surveillance videos are safely archived under a single namespace. IT-administrators can access them for analysis any time through a server, which is very convenient," said Frank Lee, Senior Director of Product Planning.
Panasonic is introducing the new i-PRO logo to its security cameras in the European market, starting with the newly launched X-Series of network security cameras with built-in AI capabilities. The i-PRO concept marks a new era and direction of flexible security products while underlining the established Panasonic brand values of innovation, image and product quality, and mission-critical reliability for low total cost of ownership of CCTV installations. i-PRO The centerpiece of the branding, the Nexus, symbolizes the central role i-PRO is taking in empowering customers by providing the information they need to make decisions. It is made up of a series of nodes — representing the raw data that i-PRO solutions capture and that underpin the critical insights which drive customers’ actions in the moments that matter. “Through the innovative use of technologies, we will extend our capabilities to provide vital information and intelligence to support those professionals who protect and save lives, providing a safer and more peaceful world,” said Norio Hitsuishi, Executive Officer and Director of Global Surveillance at Panasonic i-PRO Sensing Solutions Co., Ltd. Network security cameras The new i-PRO X-Series of network security cameras is the first example of this solutions approach making them ideal for the next generation of intelligent applications in business and society. With its built-in AI capabilities and open Software Development Kit, the camera range is designed for third party application development that can be tailored to a business customer’s needs. “In today’s fast-moving world, we need to be proactive with our security technology to focus on prevention rather than simply utilizing video as evidence following an incident,” said Gerard Figols, European Head of the Panasonic Security Business Unit. “By listening closely to our customers and working with our partners to develop security solutions to predict and meet their needs, our goal is to become the trusted next-generation security solutions provider.”
Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. With 4K-compliant cameras projected to make up over 24% of all network cameras shipped by 2023 – there is a fast-growing desire for reliable storage on-board security cameras. The question for businesses is: do they look to break up their existing smart video network, by separating and compartmentalising cameras to handle data requirements, or do they increase its storage capabilities? As some people begin to venture out and return to work following initial COVID-19 measures, we are also seeing demand for thermal imaging technology increase. New technology like this combined with more of these always-on systems being rolled out, means organizations will need to carefully consider their smart video strategy. Newer edge computing will play an important role in capturing, collecting, and analyzing data and there are some key trends you can expect to see as a result of this evolution. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. Edge computing and smart security As public cloud adoption grew, companies and organizations saw the platform as a centralized location for big data. However, recently there’s been opposition to that trend. Instead we are now seeing data processed at the edge, rather than in the cloud. There is one main reason for this change in preference: latency. Newer edge computing will play an important role in capturing, collecting, and analyzing data Latency is an important consideration when trying to carry out real-time pattern recognition. It’s very difficult for cameras to process data – 4K surveillance video recorded 24/7 – if it has to go back to a centralized data center hundreds of miles away. This data analysis needs to happen quickly in order to be timely and applicable to dynamic situations, such as public safety. By storing relevant data at the edge, AI inferencing can happen much faster. Doing so can lead to safer communities, more effective operations, and smarter infrastructure. UHD and storage AI-enabled applications and capabilities, such as pattern recognition, depend on high-definition resolutions such as 4K – also known as Ultra High Definition (UHD). This detailed data has a major impact on storage – both the capacity and speeds at which it needs to be written, and the network. Compared to HD, 4K video has much higher storage requirements and we even have 8K on the horizon. As we know, 4K video has four times the number of pixels as HD video. In addition, 4K compliant video supports 8, 10, and 12 bits per channel that translate to 24-, 30- or 36-bit color depth per pixel. A similar pattern holds for HD — more color using 24 bits or less color using 10 or 12 bits in color depth per pixel. Altogether, there is up to a 5.7x increase in bits generated by 4K vs. 1080 pixel video. Larger video files place new demands on data infrastructure for both video production and surveillance. Which means investing in data infrastructure becomes a key consideration when looking into smart security. Always-on connectivity Whether designing solutions that have limited connectivity or ultra-fast 5G capabilities, most smart security solutions need to operate 24/7, regardless of their environment. Yet, on occasion, the underlying hardware and software systems fail. In the event of this, it is important to establish a failover process to ensure continued operation or restore data after a failure, including everything from traffic control to sensors to camera feeds and more. Consider the example of a hospital with dozens or even over a hundred cameras connected to a centralized recorder via IP. If the Ethernet goes down, no video can be captured. Such an event could pose a serious threat to the safety and security of hospital patients and staff. For this reason, microSD cards are used in cameras to enable continuous recording. Software tools – powered by AI – can then “patch” missing data streams with the content captured on the card to ensure the video stream can be viewed chronologically with no content gaps. Thermal imaging Health and safety is the number one priority for all organizations as people return to work and public spaces. Some organizations are deploying thermal imaging to help screen individuals for symptoms as they return. Organizations that operate with warehouses, depots and assembly lines will traditionally have large amounts of cameras located outside of the entrance. With thermal imaging smart video in place, these cameras can now serve a dual purpose as a screening device. The thermal imaging technology is capable of detecting elevated body temperatures, with 10-25 workers being scanned in one shot, from one camera – making it an efficient and accurate process. This way, staff can use the information to help identify people who may need further screening, testing, and/or isolation before returning to work. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices While this may not increase data storage requirements, it can change your retention policies and practices. Smart security today is about utilising AI and edge computing, to deliver an always-on, high-resolution video provision that can help keep people safe 24/7. These trends increase the demands and importance of monitoring, which means requirements of the supporting data infrastructure improve to match that, including the ability to proactively manage the infrastructure to help ensure reliable operation. Companies need to make sure they have considered all the storage and policy challenges as part of their smart security strategy for the future.
The COVID-19 pandemic is the defining global health crisis of our time. In order to be able to fight against it, mask detection and temperature measurement have become daily routines for everyone. In this situation, Merit LILIN, with over 40 years of experience in IP video manufacturers of IP cameras, recording devices, and software, have created a cost-effective COVID-19 solution to ensure end-user health and safety. Temperature measurement Many solutions should provide temperature information, with alert settings that trigger alarms when temperatures are high. The main component of LILIN Temperature Measuring Camera is a dual-lens camera with two sensors, one a visible image lens and the other a thermal array sensor. This design not only provides temperature information and color image information but also high-temperature alert settings when the temperature exceeds. Mask detection With COVID-19 rules and regulations now incorporating person protection equipment such as masks, many solutions are now geared towards mask detection. LILIN has its own mask detection AI, which can be run on an i3 CPU-supported PC. Using the LILIN AI system and Aida NAV server, the system can recognize if the person is wearing a mask or not. If the system identifies a user that is not wearing a mask, an alert goes out with an image of the person. It allows the application to run automatically and enforces the wearing of masks in many situations. A notification is sent to an administrator when an image of a person is captured. Social distancing measures In addition to temperature measurement and mask detection becoming daily epidemic prevention matters, maintaining social distance is extremely significant as well. Through the LILIN Aida detection system, people can calculate the social density and use it with alarm notifications, if an area exceeds the density threshold. Moreover, the LILIN COVID-19 solution has a wide range of applications in different sectors, including schools, public transportation systems, offices, retail and more. By doing so, extensive safety measures can combat COVID-19, providing the public with intelligent epidemic prevention solutions, through innovative AI detection systems.
On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandalism to SMB is around $3,370 per incident (US Small Business Administration), including a staggering 692 vehicle vandalism claims per day. Likewise, the average cost of theft to SMB is about $300 per shoplifting incident and $1,500 per employee theft incident, which accounts for 38% and 34.5% of all theft instances, respectively (National Retail Security Survey). High-performance artificial intelligent systems can automate the monitoring tasks Vandalism and theft have proven time and time again to be inconvenient and deconstructively harmful towards SMB. However, these financial burdens can be prevented with the use of the right security system. AI-based security systems with Deep Learning contain many features that many SMB owners find advantageous in their pursuit to stop unwarranted and unwanted money loss. Intrusion And Loitering Detection The first of many features that can help with vandalism and theft prevention is Intrusion Detection. High-performance artificial intelligent systems can automate the monitoring tasks for high-risk sites to provide a high level of security and security personnel monitoring efficiency. Traditional intrusion detection systems detect objects based on size and location, but they do not recognize the type of objects. Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreases the false-positive intrusion rate. The more advanced AI-based systems, like those we offered at IronYun, enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Advanced loitering detection software as such can detect and trigger real-time alerts for both people loitering and/or vehicles that are illegally parked in certain areas of interest. A benefit, which only certain advanced systems contain, is the ability to send trigger actions to 3rd-party systems in reaction to receiving an alert of loitering and/or intrusion detection. These trigger actions can be set to contact authorities immediately and/or trigger a scare tactic alarm or announcement to intruder/loiterer. Certain Face Recognition and License Plate Recognition software can record individual people/vehicles Face And License Plate Recognition In addition to the activity detection solutions, certain Face Recognition and License Plate Recognition software can record individual people/vehicles and use pre-configured lists to identify particular faces or plates that may be of interest, such as those in watchlists. These systems can also enable the users to upload images of faces not in the lists and search for them in the camera recording. For instance, if a person is detected several times loitering outside a store, one may save one of the detection photos into the watchlist, and set up an alert when said face is recognized again outside the building in the future. The alerts will help to deter and prevent vandalism or theft, and notify the authorities to the scene before the troublemaker completes the act. The main attributes of high-performance Face Recognition systems which maximize assistance with vandalism and theft management include: Face match rate > 90% with good camera angles and lighting. Processing multiple streams and multiple faces per image. Live face extraction and matching to databases of thousands of faces within 3 seconds. State-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras If the watchlist individual is wearing a mask or their face is not in view of the camera, their license plate may be a good indicator. If a particular car is detected several times loitering in the parking lot or street outside a store, the user can set the alerts for such car to get notified in the future. With an AI solution like this, common street cameras should be equipped with LPR capabilities. So, state-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras. High-Performance Alert Mechanisms A high-performance AI solution, in addition to having high accuracy, should be able to: Easily integrate with 3rd-party systems Work well with all ONVIF IP cameras including infrared and thermal ones (for Intrusion detection) Analyzes video streams in real time and trigger alerts within a few seconds Send alerts to multiple VMSs, connect with signaling devices such as loud speakers or flashing lights Send email notifications to security staff and police departments Send notification on mobile device using AI NVR mobile app Maintains a record of all alerts to provide evidence of intrusion and loitering instances for police and insurance agencies. To assist in theft and vandalism prevention, AI-based security systems with deep learning will do all of the tedious work for you. Their low cost and high performance also make them the most accessible security solutions in the market with large return on investment. Stopping crimes is a difficult, ongoing challenge, but with the right AI software, business vendors and police departments can do so with more ease.
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
A national center of excellence for children and young people with mental health needs has been secured by a comprehensive security system from IDIS, the largest in country video surveillance manufacturer in South Korea. The £7 million refurbishment of Austen House, a 14-bed forensic hospital in Hampshire run by Southern Health NHS Foundation Trust, prioritized keeping both staff and patients safe from harm, given their specialized needs. Security systems integrator As the sole specialist National Health Service (NHS) unit of its kind in southern England, its refurbishment means vulnerable young people and their families no longer have to travel hundreds of miles to receive vital support. Video surveillance was key to allow incidents to be investigated and care practices to be monitored and improved. The solution had to cover all social and communal areas with no blind spots, be easy for non-specialist staff to use, and would have to comply with NHS cybersecurity requirements. Specialist security systems integrator ISD Tech selected IDIS technology as the best value and most robust solution, and one that would be the quickest and least disruptive to install. Outdated security setup The enhanced video coverage improves both standards of care and accountability Working with main contractor Kier Construction, ISD Tech and IDIS replaced an outdated security setup with an affordable cybersecure system which is easy to operate and maintain. It allows caregivers a complete overview of all internal and external communal areas at Austen House, including education facilities, music and sensory spaces, a gym and an art studio, as well as higher-risk isolation rooms. The enhanced video coverage improves both standards of care and accountability. It provides a complete record of events at the facility, making it easy for incidents to be investigated and video evidence to be provided, should it be required. Active tampering alarms Almost 100 IDIS 12MP Super Fisheye cameras, plus a mix of 5MP bullet and PTZ cameras, connected to 32-channel NVRs guarantee evidential-standard video coverage with a 360º view of all communal areas, a choice of 6 view modes and the ability to dewarp footage after the event. The 5MP bullet and PTZ cameras provide 24-hour coverage of the multi-use games area, gardens, car parks and perimeter. Built-in IR enables night-time image capture at distances of up to 30m, and the cameras enable intelligent functions such as active tampering alarms, motion detection, auto-tracking, and trip zones. All the IDIS cameras benefit from true DirectIP® plug-and-play set-up, which allowed the ISD Tech engineers to complete their work ahead of schedule. The ‘one-click’ set-up is faster and eliminates the cybersecurity risks associated with manual password entry. Local area networks IDIS Smart Failover protection ensures 24/7 continued recording, even during network instability or drop-out IDIS Smart Failover protection ensures 24/7 continued recording, even during network instability or drop-out. And, crucially, the Trust can link the new system to its local area networks without increasing the risk of hacking, thanks to IDIS’s use of proprietary software, which is inherently cybersecure. “Our upgraded IDIS video solution makes it easy for our clinical teams to review incidents quickly and work with external investigators whenever required,” said Tracey Edwards, Head of Security at Southern Health NHS Foundation Trust. “It’s not just an important tool for improving patient care, it allows us to maintain full public confidence and accountability.” Supporting clinical care Nicky Stokes, Managing Director of ISD Tech, commented: “We were impressed by the consultative approach of IDIS right from the initial design and planning, through installation to commissioning, and the ongoing support that they provide both to ISD Tech and the Trust. IDIS technology even helped speed up the installation so that we could deliver the project ahead of time.” IDIS Europe Sales Director Jamie Barnfield added: “This is the 4th major project that IDIS has completed for Southern Health NHS Foundation Trust, and it is part of one of the biggest refurbishments of its kind ever undertaken in the NHS. Not only is our video tech enhancing safety and security for patients and staff, it also supports clinical care and rehabilitation, which benefits the most vulnerable members of our community.”
March Networks, a globally renowned company in video security and video-based business intelligence solutions, is proud to announce that one of the world’s largest oil companies will deploy its cloud-based Searchlight solution at more than 300 c-store locations. The Fortune 500 Company is currently rolling out March Networks Searchlight for Retail as a Service at all of its U.S. corporate-owned stores. The company’s branded fuel products are sold at nearly 8,000 service stations in the U.S., providing a future platform for March Networks to continue to grow its c-store customer base. Cloud-based Searchlight solution By choosing March Networks’ cloud-based Searchlight, the oil company can deploy a powerful loss prevention and data analytics solution in a shorter timeframe and with less upfront cost than a traditional video surveillance deployment. The subscription-based service, combining high-definition video, transaction data and analytics, is managed by March Networks from its secure Network Operations Center (NOC). This eliminates the need for the company to purchase and maintain servers within its own IT infrastructure, and leaves it free to focus on its business, while March Networks handles all the software upgrades and maintenance of the application. With the addition of the oil company, nearly 15,000 business locations worldwide are now using the March Networks Searchlight solution. Security and transformational business insights “Leading banks, retailers and restaurant chains are choosing March Networks Searchlight for its unique ability to deliver both security and transformational business insights,” said Peter Strom, President and Chief Executive Officer (CEO), March Networks. He adds, “Organizations can not only reduce theft, fraud and shrink, but gather operational and business intelligence to boost performance and profitability. By offering Searchlight’s video insights in a monthly subscription model, March Networks is meeting increased demand for cloud-based video surveillance-as-a-service (VSaaS), and rapidly growing the services part of our business.” Convenient managed services Searchlight for Retail as a Service includes March Networks’ convenient managed services Searchlight for Retail as a Service includes March Networks’ convenient managed services, where trained professionals monitor each customer’s video network system health and performance, ensuring maximum uptime. Using the March Networks Insight platform, customers gain access to their network information, including device health and warranty information, through a secure web browser. Searchlight and Insight are part of the oil company’s complete end-to-end solution. Command Enterprise Software The end-to-end solution also includes March Networks’ highly reliable hybrid recorders, supporting analog and IP cameras, its Command Enterprise Software for advanced system management and administration, and its SE2 and SE4 Series IP Cameras for crystal-clear video capture. March Networks is partnering with NAVCO, a national electronic security systems integrator and long-time March Networks Certified Solution Partner (CSP), to complete the company’s deployment and provide seamless support for the solution moving forward.
South Africa conservationist, Brett Barlow needed a robust security solution to protect Munu, a blind, South Western Black Rhinoceros, whose species is critically endangered. FLIR video solution Barlow deployed an all FLIR solution, comprising thermal cameras, visible cameras and an NVR, for around-the-clock monitoring, early detection and real-time response. FLIR technology has played an instrumental role to protect Munu’s life and livelihood. Throughout the 20th century, big-game hunters, settlers and poachers have decimated Africa’s black rhino population. In the early 1970s, there were approximately 65,000 black rhinos, and by 2018, that number was reduced to 5,630. In 2020, there are three remaining subspecies of the black rhino, one of the most vulnerable being the South Western Black Rhinoceros, also known as Diceros bicornis bicornis, of which there are only 254 left in South Africa. FLIR thermal and visible security cameras deployed Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes Munu, a 20-year-old blind male rhino, is one of these critically endangered species. When Munu was in danger, South Africa conservationist, Brett Barlow stepped in to save Munu’s life. Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes, detecting threats, increasing safety and enhancing his overall quality of life. In 2019, rangers working at a South African National Park found a black rhino walking in circles and visibly disoriented. They knew they had to do something. After safely tranquilizing him, an ophthalmic surgeon confirmed that the rhino, known as Munu, had suffered two detached retinas and was completely blind, likely as a result of disputes with other rhinos in the area. Protecting endangered rhino, Munu As soon as he heard about the situation, renowned South African conservationist, Brett Barlow spoke with the South African National Park and offered to permanently house and protect Munu. “Every rhino matters,” Barlow adamantly affirmed, adding “You wouldn’t put down a blind child, so why would you put down a blind rhino?” The South African National Park later transferred Munu to Barlow’s care. However, Barlow wasn’t the only one who wanted to help Munu. Relocating Munu to the Mantis Founder’s Lodge Adrian Gardiner, globally renowned conservationist famous for founding the Shamwari Game Reserve and the Sanbona Wildlife Reserve in South Africa, extended the invite for Munu to stay on one of his properties, the Mantis Founder’s Lodge. Wasting no time at all, Barlow relocated Munu to the lodge, knowing it would increase his quality of life. The property, spanning 850 hectares, is home to five white rhinos, as well as other animals, including a zebra and giraffe. The White Lion Foundation, in which Gardiner and Barlow are both executive board members, donated funds to construct Munu’s boma, comprising a secure covered boma and a five-hectare open grazing area. American Humane funding Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats Additional support came from a local internet provider, who donated free internet services for the project. American Humane, a non-profit organization committed to ensuring the safety, welfare and well-being of animals, funded one year of feed for Munu. All donations for Munu go directly to the project with no administration costs deducted. Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats because of his highly valuable horn. He remained a prime target for illegal poaching. Much of Munu’s horn was removed to protect him, but the amount of horn that remained is still worth thousands of dollars. Experts say that one pound of rhino horn is worth at least US$ 3,000 universally and ten times that, on Asian black markets. Thus, even with much of his horn removed, Munu was still in danger. Self-harm was a risk should Munu charge into the boma. Munu’s next door neighbor, Rodney, a white bull rhino, was also a concern should a territorial fight occur. For all these reasons, Barlow looked for ways to enhance Munu’s safety. Video surveillance for enhanced security Previously, the Mantis Founder’s Lodge employed two guards for Munu’s security. However, Barlow believes guards should only be a second line of defense, a visual deterrent that responds to threats. “I wanted to go down to the electronic security system route,” Barlow said, adding “Technology doesn’t sleep.” The first security manufacturer Barlow hired charged high prices for their security products. More than this, once installed, Barlow discovered that these devices were unable to deliver quality images in extreme weather conditions, such as mist or rain, both of which are commonplace at the Lodge. As such, he decided Munu’s security required for a more robust and reliable video security system. In 2019, Wilke Pretorius, Distribution Sales Manager for Sub Sahara Africa at FLIR Systems, was working with Brett Barlow on a separate project. When Barlow told Pretorius about Munu, Pretorius informed the FLIR team who immediately got involved. FLIR end-to-end video surveillance system FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras, in order to protect Munu from poachers. FLIR’s powerful thermal and visible imaging cameras deliver intrusion detection at much longer ranges and complete, 24-hour perimeter protection, regardless of weather conditions. "Other camera manufacturers don't compare. Their cameras can't see through mist or rain. FLIR delivers images 24/7, rain or shine, darkness or light,” Barlow said, adding “technology like FLIR thermal cameras allow for early warnings for perimeter breaches. Even though rhinos have weak eyesight, without any sight, they are basically defenseless. So, in essence, FLIR became Munu’s eyes.” Beyond FLIR’s high-performing technology, Barlow loved working with the FLIR staff. Barlow said, “What drew me to FLIR were the people involved. Wilke and the rest of the FLIR team have been so passionate and resourceful, always available and willing to help when issues arise.” “When I started working at FLIR, Chief Executive Officer (CEO) Jim Cannon said our mission is to save lives and livelihoods,” Pretorius explained, adding, “These words stuck with me. Working on the Munu project, it was clear that saving lives and livelihoods are indeed a passion of FLIR employees. I am proud to be a part of a company so eager and passionate to produce solutions and technology that make a positive impact in the world.” Installation of FLIR cameras Installing the new security system was not an easy task. Merely two days prior to the arrival of FLIR cameras, in March 2020, South Africa was ordered into an immediate lockdown, due to the COVID-19 pandemic. But Barlow was eager to begin the installation process, so he set out to do it himself. By early May 2020, a two-person crew had manually dug over 600 meters of trenching to run cable and conduit through the lodge’s hard African soil. Barlow also installed a solar array to power the system. He cut bushes, installed polling and connected the entire system to FLIR’s central network video recorder (NVR), to view the camera feeds both inside and surrounding Munu’s boma. The result is a fully functioning, comprehensive video security system. FLIR Elara FB-Series ID thermal security cameras deployed Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system based on a two-tier model. The perimeter is shaped as a big triangle about 110 yards away from the boma enclosure. Six FLIR Elara FB-Series ID thermal security cameras, which use onboard analytics to classify human or vehicular intrusions, are installed to monitor the outer perimeter or the first tier. There are also 11 Ariel Full HD IP Bullet cameras deployed, which deliver 1080p video for high motion, complex and low-light scenes. FLIR Saros Dome DH-390 cameras deployed For effective surveillance of Munu’s boma, six FLIR Saros Dome DH-390 cameras, designed to deliver actionable alerts and alarm data, surround the enclosure. One FLIR Saros DM-Series camera is mounted inside the boma to capture every minute detail of Munu’s movement in all conditions. To manage the video from all the cameras, FLIR also supplied its Meridian TM product, a compact, all-in-one network video recorder (NVR), specially designed to support dozens of channels. Meridian also features a FLIR United VMS EZ Client web interface, which simplifies viewing capabilities and saves the cost of additional workstations. Powering, processing and managing this system are six edge servers, FLIR’s USS Edge Appliances, containing 12TB of storage and preloaded with United VMS software, built to seamlessly manage multiple, varied devices. Heightened perimeter protection Thanks to FLIR’s technology, Barlow is confident that Munu can be an ambassador for his species. He hopes Munu’s story may inspire future conservancies around the world to partner with manufacturers, like FLIR, for heightened perimeter protection. Case in point, actress Shannon Elizabeth, founder of the South Africa-based Shannon Elizabeth Foundation that is focused on wildlife conservation, was deeply moved by Munu’s story. She later asked Barlow to participate as an advisor to her foundation’s Ranger Relief Fund. Importance of early warning technology FLIR could prove invaluable to the efforts of rangers all over the African continent to protect endangered animals" In a time where conservation funding is down because of declining tourism due to the COVID-19 pandemic, the Ranger Relief Fund supplies money and much needed equipment to ensure conservation first responders remain employed and properly resourced. With early warning technology being more critical than ever, the need for conservancies to partner with technology manufacturers like FLIR is urgent. “FLIR could prove invaluable to the efforts of rangers all over the African continent to protected endangered animals,” Barlow explained, adding “With Munu being the proof point, FLIR could be more than Munu’s new eyes, but indeed the eyes of an industry desperate to protect the world’s natural heritage from the burgeoning poaching crisis.” Picking the optimal security solution When asked what advice Barlow would give to other conservancies considering similar security technologies, he said “Speak to the right people. Make sure you talk to someone who understands the product. See the solution in action. View a live site and see how it works. Work with the right people to implement that for yourself.” The longer Munu lives, the more good he’ll do. Barlow plans to expand Munu’s boma, once he has acclimatized to his new home. And he has already begun using the FLIR Saros DM-Series’ live stream capabilities to invite learners around the world to observe Munu up close. The plan for Munu is to mate with a female within his own subspecies, thereby directly contributing to the survival of his kind. If Munu does sire a calf, Barlow plans to donate the calf back to the South African National Park that Munu came from to help with the genetic diversity for the reserve. The future for Munu is bright and, with his new eyes, he will see through to the end.
Retailers face complex challenges that range from loss prevention and maintaining a safe environment for both customers and staff to improving customer experience and operational productivity. Choose Ava Unified Security (formerly Vaion) to ensure security operators can tap into advanced analytics to detect and react to anomalies in real-time. Additionally, store managers can use Ava’s customer intelligence insights to increase profits and meet the customers’ needs. Leverage Ava’s machine learning anomaly detection to get alerts on people and vehicles loitering or cars present out of hours. Facilitating advanced analysis Get a clear understanding of activity at rear entrances, aisles, or end-caps by counting people who congregate in certain areas. Track cash register points to minimize thefts and identify return frauds. Authorized users can share links of recorded video securely with team members, claim investigators, and law enforcement. Monitor queues and the number of employees behind counters to ensure minimal waiting time Use counting of people and vehicles entering and exiting to analyze store performance, footfall, queues, and allocate more staff during busy periods. Download and share historical data of occupancy information with store managers to facilitate advanced analysis. Improve store safety by detecting verbal aggression, robberies, and vandalism, and empower security operators to act before incidents escalate. Track goods and control access as vehicles are entering your warehouses. Get notifications in real-time when trucks are approaching loading docks and prevent the damage of fleet and storage areas. Monitor queues and the number of employees behind counters to ensure minimal waiting time. Use Ava’s powerful search features to investigate across all stores, warehouses, and distribution centers and identify repeat offenders or suspects. Enhanced overview of operational insights Increase operational productivity and reduce store and warehouse costs Distribute air efficiently to match economics and customer comfort Use people flow insights to manage queues efficiently Understand the customers’ in-store activity and which are the least and most visited areas Enhanced customer experience Get insights on the customers’ in-store traffic patterns Instant notification when queues are detected to allocate staff according to the busiest business hours Find out which of the locations perform the best and why Saving storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what is needed, when it is needed, without the hassle of complicated licensing Up to 200 cameras per Ava vserver appliance—small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons With a simple licensing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
e-BikePort has chosen Hanwha Techwin as the single-source provider of the video surveillance systems to be integrated with its autonomous, sustainable charging stations for electric-assisted bicycles and scooters. With city dwellers and workers throughout Europe being encouraged by governments to abandon their cars and use either public transport or bicycles to get to their destination, e-BikePorts provide a convenient way to re-charge light electric-assisted vehicles, as well as other electronic equipment, such as cellphones and tablets. Secure lockers In addition to the recharging sockets, secure lockers are available to temporarily store helmets and clothes, while internet access is provided by an integrated Wi-Fi kiosk. Powered by solar panels and not requiring any civil engineering work, the environmentally friendly e-BikePorts can be quickly and easily installed in virtually any location, including education campuses, shopping centers, office complexes and campsites, as well as city centers. Wisenet Solution The bandwidth-friendly Wisenet QRN-410S supports H.265, H.264 and MJPEG compression Three vandal-resistant Wisenet XNF-8010RVM fisheye cameras are integrated into each e-BikePort, one of which is located in the middle of the station to constantly capture 360-degree images of any activity. The two other cameras are positioned on the side of the stations to provide 180-degree panoramic fields of view. The three high definition 4-megapixel cameras are powered by the e-BikePort’s solar panels during the day and by battery at night, as is the installed Wisenet QRN-410S network video recorder (NVR). The bandwidth-friendly Wisenet QRN-410S supports H.265, H.264 and MJPEG compression, as well as WiseStream II, a complementary compression technology unique to Hanwha Techwin which contributes to the ability of control room operators to view live or recorded images over a 4G network. Video surveillance system “The video surveillance system is playing a very important role in helping create a safe environment for station users and for protecting their personal belongings,” said Philippe Faye, the creator of the e-BikePort concept and a director of the company which manufacturers the stations in France. “We evaluated cameras and recording equipment from a number of manufacturers before choosing Hanwha Techwin as our partners. It proved to be an easy decision for us in that in addition to the ease of installation, high performance and reputation for reliability of the Wisenet products, we were also impressed with the technical advice and support we received from the locally based Hanwha Techwin team.“ First e-BikePort The first e-BikePort has been installed on the banks of the Vienna River within the City of Limoges in south-west France. Based on its popularity with users who, thanks to the city’s local authority, are able to use its facilities free of charge, it is expected that many more e-BikePorts are likely to be deployed across France and other towns and cities throughout Europe over the coming months.
Marian University is a school with a mission. Having transitioned from a liberal arts college to a comprehensive university in 2009, it has become one of the private education institutions in Indiana. And that’s not all: the university has ambitious goals to grow its programs and broaden its mandate even further. Currently, the school has over 500 staff members and more than 3,500 students from across the United States and around the world. And by 2025, it aims to double its number of annual graduates. Located just ten minutes away from downtown Indianapolis, Marian University’s close proximity to a major center of American business, finance and culture is a major selling point. Managing increased traffic The city is also experiencing an influx of technology companies, making it the fifth-fastest growing municipality in the country for high-tech jobs. However, as in many booming regions, economic success isn’t evenly distributed. While some areas have experienced revitalization, others have seen social unrest and rising crime rates. As such, while Marian University’s campus has the privilege of sitting near a bustling city, these challenges aren’t far away. That fact — along with the increasing number of staff and students on the premises — motivated the university to upgrade their security systems to help keep both its people and the wider community safe. Marian University’s previous security system wasn’t up to the task of monitoring the premises, staff and students — so how would it manage increased traffic and additional properties as the school met its growth targets? High definition cameras ACC™ software is much more than a centralized source from which to review recorded video The ongoing maintenance and licensing costs were also prohibitive. Administrators were at a loss of what to do until the security integrator they were working with suggested Avigilon. With high definition cameras and built-in analytics that seamlessly integrated with Avigilon Control Center (ACC) video management software, it offered a comprehensive, intelligent and scalable solution. Additionally, the licensing fee was a one-time cost, saving the school both time and money. As the security team at Marian University found out, ACC™ software is much more than a centralized source from which to review recorded video. Not only can security operators analyze the video by zooming in and rewinding in real-time, but Avigilon Appearance Search™ technology leverages AI technology to help them instantly locate specific individuals and vehicles of interest. Advanced video analytics Furthermore, Unusual Motion Detection (UMD) technology uses advanced video analytics to flag events that may require further investigation and filter them in the recorded video timeline, allowing security operators to find and review these instances faster. All of this was made possible with the installation of intelligent Avigilon cameras and network video recorders (NVR) across the campus. “The organization is tremendous to work with,” says Ray Stanley, CIO/Vice President of Marian University. “I have never worked with a security company where I've been able to pick up the phone and have someone to help solve issues and make sure we are using the product the right way so that we see good value for our money. This was true not just in the beginning, their support exists right to this day.” Intelligent security system Avigilon coordinates with local third-party integrators to make sure the system is functioning Instead of sending Marian University setup instructions and leaving the security and IT teams to figure it out for themselves, Avigilon coordinates with local third-party integrators to make sure the system is functioning and actively helps operators learn how to utilize it to its full potential. Personnel will come onsite to work with staff and guarantee they know how to get the most from their various video analytics platforms and solutions. The main buildings at Marian University may be surrounded by quiet woodlands and wetlands, but the campus isn’t as isolated as it appears. Being a mere ten minutes away from the middle of Indianapolis, the school’s property borders several roadways, businesses and residential neighborhoods that all benefit from having an intelligent security system in the vicinity. Keeping the community safe “The great quality video has helped keep the community safe, without a doubt,” says Ray Stanley, CIO/Vice President of Marian University. “In one case, local police were able to identify a suspect involved in an incident at a nearby gas station because of our Avigilon system. Being able to help our surrounding community stay safe is absolutely an added benefit for us.” With its Avigilon solution, the Marian University campus has become an extra set of eyes for law enforcement. UMD and Avigilon Appearance Search technologies mean that criminals who make the mistake of moving across campus have a much higher chance of being detected by the authorities who can then quickly track their route to see where they have been and where they are headed. Potentially-Dangerous behavior It enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis With its user-friendly interface and high-quality video, the security installation not only helps with police work and prosecution, but it enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis, creating a safer environment for students and staff. "For example, we were able to see a suspect driving at a high rate of speed across campus, and with Appearance Search, we were able to see where the vehicle went and identify the suspect,” says Chief Richard Robertson, Marian University Police Department. “That helped us to save a lot of trouble and potential injuries.” Protecting local communities In the United States, Indianapolis looms large not only as the crossroads of the country — two-thirds of Americans can drive to the city in ten hours or less — but also as a hub of innovation and investment. However, safety continues to be a top-of-mind issue as crime increases in certain sections of the city. This is why Marian University chose Avigilon: as the school aims to provide a safe space for students and prepare them for the many opportunities Indianapolis has to offer, there’s also a deep-seated obligation to help protect local communities and public spaces. Avigilon allows it to do both — and even better, the solution will be able to scale with the university as it evolves and expands in the years ahead.
Round table discussion
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Network Video Recorders: Manufacturers & Suppliers
- Dahua Technology Network Video Recorders
- Vicon Network Video Recorders
- Hikvision Network Video Recorders
- Avigilon Network Video Recorders
- IDIS Network Video Recorders
- Video Storage Solutions Network Video Recorders
- BCDVideo Network Video Recorders
- QNAP Network Video Recorders
- ADPRO Network Video Recorders
- Surveon Network Video Recorders
- Ganz Network Video Recorders
- Promise Technology Network Video Recorders
- TruVision Network Video Recorders
- March Networks Network Video Recorders
- LTV Europe Network Video Recorders
- Seagate Network Video Recorders
- Axis Communications Network Video Recorders
- GVD Network Video Recorders
- Hanwha Techwin Network Video Recorders
- AMAG Network Video Recorders