Network Video Recorders
Dahua Technology, a globally renowned video-centric smart IoT solutions and services provider, has announced the release of DMSS, its newly designed mobile client. DMSS can connect Dahua products via the Internet or Ethernet through P2P or IP, and can also be operated remotely. It supports all kinds of product types, including NVR, XVR, IPC, TPC, VTO, Alarm Hub, and Access Control, etc. Remote operations DMSS can work in an environment with multiple internet connections. It connects Dahua prod...
Matrix Comsec has confirmed its participation in the Virtual Exhibition on Railroad Equipment from 1st July 2020 to 31st August 2020. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and a new portfolio of IP Communication endpoints. Matrix has indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attend...
According to latest research from its video surveillance and analytics intelligence service, Omdia (Informa), Genetec Inc. (‘Genetec’), a global technology provider of unified security, public safety, operations, and business intelligence solutions, continues to build its position as the world’s major developer of video surveillance software with a widening share of the global market. Overall, Genetec grew at three times the pace of the global video surveillance solutions mark...
Connected Technologies LLC, provider of a powerful cloud-hosted security management platform and Digital Watchdog (DW™), the provider of digital recorders, surveillance cameras and video management software have unveiled new integrations between DW Spectrum and Connect ONE that provide deeper reporting and management controls for dealers and their customers. Connect ONE and DW Spectrum integrate natively through software to receive or trigger notifications or events without system configu...
Businesses are now gradually reopening in many countries, and people can return to restaurants, office buildings, and public spaces. A safe reopening process will rely heavily on effective public health strategies, including increased testing for the virus, social distancing, occupancy restrictions, and cleaning and disinfection activities. In many countries, temperature measurement and the wearing of masks have been commonly made mandatory in both business and public environments. While social...
Versa Networks, the Secure SD-WAN provider, launches Versa Secure Access, the solution delivering Secure SD-WAN services and private connectivity for employees who are remote or working from home. These employees can now securely connect to applications in both private and public clouds as part of Versa Secure Access Service Edge (SASE) services. The new solution is based on the Versa Operating System (VOS™) which powers Secure SD-WAN networks on-premises and in the cloud for thousands of...
PSA, the consortium of professional systems integrators, announces the addition of Mobile Pro Systems to its network. Mobile Pro Systems offers a family of different network/IP based mobile video surveillance systems utilized by many government and commercial entities. “Mobile Pro Systems’ technology is a great addition the PSA’s line card,” said Tim Brooks, PSA’s vice president of sales and vendor management. “They provide flexible and mobile solutions for powering security, network and communications technologies.” Network-Based video cameras By combining Mobile Pro Systems’ power-based hybrid platforms and various technologies together, they offer extremely effective products. Mobile Pro Systems utilizes network-based video cameras, video management and recording systems, wireless mesh, cellular communications, solar power and video analytics as fully integrated solutions. “We look forward to providing for and serving the needs of the PSA customer. We design our products to be ‘futureproof’, offering the greatest flexibility with components in the industry”, said Steve Dunker, V.P. of Business Development. Mobile surveillance solution “Mobile Pro Systems has professionally engineered purpose-built systems that include the basics and add smart technologies which provide dependability for years of successful operation. Our goal is to provide the user with the optimal mobile surveillance solution.” Mobile Pro Systems’ products are excellent ‘re-deployable assets’ for securing construction sites, utilities or any other facilities deemed as needing ‘critical infrastructure protection’ or CIPs. The securing of these remote areas is being strongly enhanced by Mobile Pro Systems’ solutions as they provide both live/recorded video & alarm solutions that can be monitored and viewed both at the site and from remote locations.
Health organizations around the world have created the common awareness that maintaining a safe distance between people is one of the best practices to avoid being exposed to COVID-19 and in slowing its spread. Effective social distancing As various countries and regions push to reopen businesses and relax stay-at-home orders, social distancing remains an ongoing requirement. More than that, crowd density information is also considered a significant reference in managing the ‘social distance’ of workplaces, businesses and public spaces. Business owners are working hard to keep employees, customers and visitors protected. Dealing effectively with ‘density’, a new imperative for management and operations, complicates staffing and interpersonal interaction. Flow Control Solution Hikvision’s Flow Control Solution uses people counting cameras and digital signage In the current situation, public and private managers and authorities have to do more than ever before to keep people safe, and in many cases efficient calculation of customer traffic will be essential. Hikvision’s Flow Control Solution uses people counting cameras and digital signage, which provide a dynamic on-screen display to show users how many people are entering and leaving a building or an area, and sends real-time alerts in case pre-defined capacity thresholds are exceeded. 3D binocular stereo vision and deep learning algorithms These people counting cameras utilize highly accurate 3D binocular stereo vision and deep learning algorithms, making complex counts easy, even in multi-door sites. More important, the Flow Control Solution can be easily and rapidly deployed. It is designed to be simple to use and highly accurate, with options to suit all potential application scenarios. In locations with a single entrance, one people counting camera can be installed at the entrance and connected to digital signage. People counting cameras with I-Series NVRs/HikCentral For multi-entry scenarios, people counting cameras can be installed at each entrance and exit, equipped with I-Series NVRs or HikCentral to calculate numbers of people entering or leaving, so as to accurately provide real-time number data. For example, a supermarket can install a clear and easy-to-understand, dynamic data number display at each entrance to provide real-time updates for people waiting to enter. An alert is generated when the pre-configured maximum is reached, and an audio alarm can be triggered if anyone attempts to enter before the numbers go below that threshold. At present, with expenses more critical than ever, users can use the Flow Control Solution to automatically monitor the situation, empowering businesses and possible reducing the required number of security guards and other resources. Hikvision Dual Lens Cameras Hikvision Dual Lens Cameras help retail stores and other businesses measure social distancing In areas where crowds are unavoidable, such as cash registers in supermarkets and the ticket kiosks at public transportation hubs, managing distances between people queuing (standing in line) is also critical. Authorities in various locations have established specific guidelines and legislation in this area, balancing needs and risks for citizens. Hikvision Dual Lens Cameras (DS-2CD6825G0/C-I(V)(S)) help retail stores and other businesses measure social distancing, and its advanced 3D binocular stereo vision and deep learning algorithm can be configured to trigger alarms according to local regulations and requirements. Users can set the minimum contact distance threshold needed; when the distance becomes less than this pre-set threshold, an instant alarm and popup will appear with audio and video linkage. Mask Detection Solution Alongside the Density Control Solution, Hikvision also offers a Mask Detection Solution. This technology ensures that anyone entering a premise is wearing a face mask when they are required to do so. Those without a mask are not granted entry. The Mask Detection Solution can be delivered in a variety of formats, depending on user needs, including being added to a specialty camera or a Hikvision DeepinMind NVR for users with existing camera systems, integrated into Hikvision’s Temperature Screening Thermal Solution, or as part of a MinMoe door access unit with built-in face detection technology. Reducing risk of virus spread post lockdown Entry can be denied if a mask is not worn and/or an out-of-range skin-surface temperature is detected. As businesses begin to emerge from lockdown, they need to find ways to reduce risks of furthering the spread of the virus. This affects whole populations and all their normal activities, from getting coffee on the way to work and boarding public transportation, to shopping and eating out. But there are some technologies that they can turn to with innovations that will facilitate a ‘new normal’ and keep people safe. And Hikvision will be there, every step of the way.
Platinum CCTV announces release of their newest version thermal body temperature sensing camera for installation into small and medium-sized businesses helping them scan for fevers in their employees and customers. The new PT-AS7213X-T1 Thermal IP camera includes the latest thermal imaging system which is designed to sense for accurate body temperatures to ±0.5°C. Scanning for fevers in individuals can help identify the initial symptoms of viruses in people before they have a chance to spread further. This camera not only measures accurate body temperatures but also can detect if a person is wearing a face mask. Access control platform It is built on an access control platform and is designed to prohibit or allow access with a combination of fever detection, mask detection, facial recognition and/or IC cards. The thermal camera can help reduce the load on employees that are returning to work, by providing an initial screening of people that are entering the building, even reminding them to wear their masks. "We are really excited with the launch of this new thermal fever camera," said Michael Dunteman, CEO of Platinum CCTV. "It fits into the budget of small businesses, which has been one of our goals as the country began to reopen. Preventing entry of customers and employees with a fever or without a mask helps keep everyone safer.” “This camera facilitates that process automatically for small businesses everywhere, making it easier for people to return to work. We are proud to have begun installing these cameras in small businesses like salons and day spas, who are beginning open across the country.” Optional facial recognition database The PT-AS7213X-T1 thermal access control fever camera can be used as a standalone device The new PT-ASI7213X-T1 camera supports common electronic door locks and can be configured to remind people to put on a mask, prevent access to those without a mask, or ignore masks altogether as required at the time. The built-in card reader supports IC style access control cards, as well as having an optional facial recognition database to allow access based on an individual's face. The PT-AS7213X-T1 thermal access control fever camera can be used as a standalone device to allow access to the building automatically, or it can be incorporated with Platinum CCTV's proprietary AVM (Advanced Video Management) platform for recording. Other features of the thermal fever camera include: HD Resolution Video quality (600 x 1024) Facial Recognition and Temperature in 0.2 sec Temperature Measurement from 1-6 feet away Accuracy to ±0.5°C (±0.9°F) at normal body temperatures. Configurable Audible & Visual Mask Reminder or Mask Requirement Support for People with a height of 2'10" - 7'10" (for ADA compliance) Built in IC Card Access Control Optional facial recognition with up to 100,000 face memory ONVIF 2.0 compliant, works with most NVR software Wide variety of applications The current COVID-19 pandemic is just the latest in a long line of viral threats that have threatened our way of life and safety: Ebola, H1N1, SARs and others have all highlighted the need for greater security in places where masses of people travel or gather. The new PT-AS7213X-T1 thermal camera has a wide variety of applications, including: Salons and Day Spas Dentist and Doctor's Offices Nursing Homes and Assisted Living Facilities Food Service Facilities Restaurants and Bars Retail Facilities Small Businesses of all kinds Employee entrances Manufacturing Facilities, Warehouses, Factories Apartment Buildings, Condos and High Rises
PSA, one of the world’s largest consortium of professional systems integrators, announced the addition of Arxys to its network. Arxys solves complex industry application challenges by leveraging a deep understanding of the complete environment to create a purpose-built, highly optimized appliance solution. “We are pleased to welcome Arxys as a vendor partner,” said Tim Brooks, PSA’s Vice President of Sales and Vendor Management. “Their VideoX line provides an elegant solution to complex problems, helping our integrators bring more value and solidify their client relationships.” Security systems integrators Arxys has been crafting data protection and data analytics appliances for the most demanding organizations for more than 27 years. By combining storage, compute, networking and virtualization on commodity hardware, Arxys orchestrates the complexity of disparate systems into a synthesized solution. PSA Security is a unique organization that is delivering superior value to the security industry" “PSA Security is a unique organization that is delivering superior value to the security industry. Arxys and PSA Security are together bringing new levels of performance, protection and efficiency to security systems integrators,” said Deborah Inman, Arxys’ President. “Our VideoX Appliances are changing the equation for security integrators and helping them win new deals in these challenging times.” Video motion detection VideoX Appliances deliver hardware accelerated technologies like video motion detection and encryption to drive enterprise grade video surveillance recording for leading VMS’s in a powerful, efficient and high-performance network video recorder appliance. Certified and Validated with the world’s leading VMS platforms, VideoX Appliances offer GPU powered video motion detection, enterprise class storage and retention. The VideoX Appliance platform includes Enterprise, Professional and Base models to bring activated hardware acceleration and advanced data protection to mid-size to massive security projects. For more information about Arxys or other offerings from PSA’s trusted partners, users can visit the company’s official website.
Many organizations maintain regular technology refresh schedules where old equipment is replaced on a set schedule, usually every three to five years. Alternatively, organizations may choose to keep technology through its full, usable life. In such cases, the full, usable life may extend past the warranty period for hardware products or past the end of support period for software. Having a complete understanding of the complications of using older equipment can help organizations proceed with the correct equipment refresh policy for their needs. Cyber threats and liability risks One of the biggest risks to larger organizations is the brand impact and liability cost of a cyber-attack or theft of customer data. If software and equipment is kept past its end of support or end of life date, there generally will be no further firmware or software updates to the product. If there is a security flaw later discovered, and the equipment is in service, the options to protect against an exploit of the security flaw will be limited and inadvisable. Optimal utilization of equipment, software Utilising equipment and software that is actively supported and maintained by the product vendor is a much safer policy Utilizing equipment and software that is actively supported and maintained by the product vendor is a much safer policy. Reputable vendors with a strong vulnerability response policy who are actively supporting in-life products make it a priority to release a fix to any significant security flaw that is discovered. This means firmware or software patches should be provided shortly thereafter, keeping the equipment safe from being exploited, using a known security vulnerability. Replacing out of warranty hardware A purpose-built computer, such as a Network Video Recorder, may appear to continue to function well, even beyond its warranty period. With a personal or business-use computer, the purpose of the system is constantly changing to fit the user’s evolving needs. New software is installed, generally with higher system requirements than old software, more data is saved, and less free space is available. These effects, over time, lead to the appearance that the system is slow or out of date, prompting an upgrade naturally. However, if the NVR is performing the same tasks as when it was installed (recording the same cameras, streaming to the same displays etc.), it will continue to function with the same performance and efficiency as when it was first deployed, begging the question, “Why should we upgrade when the existing system still works fine?” One answer is the hardware may no longer be under warranty. High equipment failure rates If a vendor will not sell a warranty for longer than the customer’s plan to use the equipment, that’s a good indication there are problems with keeping equipment beyond that time period. Issues may include higher equipment failure rates or the lack of compatible replacement parts that may be available for equipment that old. If equipment is out of warranty and a hardware component has a failure, finding a replacement part may be expensive, time consuming, or impossible. In some cases, this could necessitate the purchase of a whole new system, which may be incompatible with other existing systems in use in the organization. Technical Support Sometimes technology deployments run into problems that require troubleshooting What was once a homogenous technology deployment may no longer consist of equipment that integrates, or requires separate client applications to control, or consists of products from different vendors leading to support complications. Sometimes technology deployments run into problems that require troubleshooting. It helps to have access to an expert who can assist. Commonly, vendors will not provide support on products that are end of life. Troubleshooting The support team’s training may not cover old and end of life products. The company may not even have an active deployment of a very old and end of life product in place to use for troubleshooting. If customers do have a support need on an end of life product, a very support-minded vendor may still try to help. For the reasons cited above, the troubleshooting process may be unsuccessful and will certainly take much longer than if a current and actively supported product were being used. Access to the latest technologies The consequence of using out of date equipment may include not having access to support, or at least longer troubleshooting times. In the most severe cases, if equipment can’t be brought back to a usable state, it could force the organization to replace failed equipment that was not planned or budgeted for. Using older equipment also means losing out on the latest technologies. For years, gas station surveillance was notorious for supplying grainy, low-resolution images, making it both difficult to discern what was happening and impossible to identify the parties involved. If the security system provides a similar level of quality, is it fulfilling the organization’s needs? Megapixel cameras and VMS technologies Megapixel cameras using progressive scan imagers provide crisp, high-resolution video Megapixel cameras using progressive scan imagers provide crisp, high-resolution video. Wide Dynamic Range cameras provide more clear images even with a very bright background. New VMS technologies provide better investigation tools, allowing users to quickly hone in on the evidence needed. Furthermore, video analytics can derive additional value for the business from the security cameras. Making the case to upgrade Although there are greater capital cost outlays required for an organization regularly upgrading security equipment, the benefits of keeping supported technology that is in warranty generally outweigh the costs. Benefiting from the latest technologies, having technical support and warranty coverage, as well as reducing cyber-attack risks make a strong case to plan for regular upgrades.
The security networks have evolved from where they were 20 years ago. With these changes, there have been many amazing advances in the scope of technology and the connectivity between the systems that comprise modern complex security systems. All these advancements have also brought concerns on how to secure these systems and the data within them. When looking through the headlines, it seems a new data breach or network vulnerability is exposed daily, and this is why securing the system should be a top priority. Data confidentiality, integrity and availability In cybersecurity, many refer to the three pillars for security - confidentiality, integrity, and availability In cybersecurity, many refer to the three pillars for security, which are confidentiality, integrity, and availability. But what do these pillars represent, and how do we address these? Confidentiality is often considered the primary goal of security. To maintain confidentiality, the system and data should only be accessible to authorized users. To address the concern or integrity, the system should employ functions to ensure the data is untampered and accurate. Finally, if a system is not available, then this can create additional risks for a company, which is why the systems should provide safeguards to provide access for authorized users to the data and system resources when they need it. Enhancing end-point security Like other IT systems, there are some similar components found in the security system, and their security capabilities can be applied in a similar fashion. In a typical security network, the components which should be secured are the endpoint devices, the network, and the data. When addressing end-point security, users need to look at devices such as cameras, recorders, and workstations. Each of these points represents a means to access the overall security system. The first line of defense for these devices should be implementing strong passwords and disabling default user accounts. Strong password security and regular updating Next, these devices should be regularly updated. While updates for cameras, recorders, and workstations may provide new functionality, they will often include fixes to known vulnerabilities found in these systems or implement new security functionalities. Additionally, many devices come enabled with a host of services that can be used by the customer. If these services are not used, then they should be disabled to minimize exposure on the network. Finally, logging of the endpoint devices and regular audits can reveal unexpected behavior or potential vulnerabilities in these devices. Ensuring authorized access When moving from the end-point to the network, users need to identify how to fortify the security network from cyber threats. The biggest concern with network security is access. Network resources, such as switches and routers, should be located in secure TM spaces where physical access is controlled. Further, if the system architecture permits, the security system should be isolated from the corporate network. Segmentation can be achieved either by physically isolating the networks or by segmenting them through Virtual LANs. There are even technologies such as MAC filtering or 802.1X, which will only allow access to authorized devices. ‘No personal electronic device’ policy Implementing a ‘no personal electronic device’ policy will further protect from data breaches Finally, to protect the data within the security system, users can take the following steps. First, defining user access to the system data is critical. Even though user access to the system may be controlled, when watching the video, users may use a personal electronic device to capture the data displayed on their screen. Implementing a ‘no personal electronic device’ policy will further protect from data breaches. In the event data needs to be exported from the system, it should be done in an encrypted method. This safety measure ensures the data remains protected, and only an authorized user can decrypt the data for use. Maintaining systems’ cybersecurity Securing the security system should be a top priority, and it can be achieved with planning and proper implementation. Even with this practice implemented, the system should be reviewed regularly to ensure the latest patches are applied, the security plan is in place and operational. Users need to ensure that any new equipment or system integrating with the system meets the minimum standards in place for the system. These simple steps will help in maintaining the systems’ cybersecurity.
On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandalism to SMB is around $3,370 per incident (US Small Business Administration), including a staggering 692 vehicle vandalism claims per day. Likewise, the average cost of theft to SMB is about $300 per shoplifting incident and $1,500 per employee theft incident, which accounts for 38% and 34.5% of all theft instances, respectively (National Retail Security Survey). High-performance artificial intelligent systems can automate the monitoring tasks Vandalism and theft have proven time and time again to be inconvenient and deconstructively harmful towards SMB. However, these financial burdens can be prevented with the use of the right security system. AI-based security systems with Deep Learning contain many features that many SMB owners find advantageous in their pursuit to stop unwarranted and unwanted money loss. Intrusion and loitering detection The first of many features that can help with vandalism and theft prevention is Intrusion Detection. High-performance artificial intelligent systems can automate the monitoring tasks for high-risk sites to provide a high level of security and security personnel monitoring efficiency. Traditional intrusion detection systems detect objects based on size and location, but they do not recognize the type of objects. Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreases the false-positive intrusion rate. The more advanced AI-based systems, like those we offered at IronYun, enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Advanced loitering detection software as such can detect and trigger real-time alerts for both people loitering and/or vehicles that are illegally parked in certain areas of interest. A benefit, which only certain advanced systems contain, is the ability to send trigger actions to 3rd-party systems in reaction to receiving an alert of loitering and/or intrusion detection. These trigger actions can be set to contact authorities immediately and/or trigger a scare tactic alarm or announcement to intruder/loiterer. Certain Face Recognition and License Plate Recognition software can record individual people/vehicles Face and license plate recognition In addition to the activity detection solutions, certain Face Recognition and License Plate Recognition software can record individual people/vehicles and use pre-configured lists to identify particular faces or plates that may be of interest, such as those in watchlists. These systems can also enable the users to upload images of faces not in the lists and search for them in the camera recording. For instance, if a person is detected several times loitering outside a store, one may save one of the detection photos into the watchlist, and set up an alert when said face is recognized again outside the building in the future. The alerts will help to deter and prevent vandalism or theft, and notify the authorities to the scene before the troublemaker completes the act. The main attributes of high-performance Face Recognition systems which maximize assistance with vandalism and theft management include: Face match rate > 90% with good camera angles and lighting. Processing multiple streams and multiple faces per image. Live face extraction and matching to databases of thousands of faces within 3 seconds. State-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras If the watchlist individual is wearing a mask or their face is not in view of the camera, their license plate may be a good indicator. If a particular car is detected several times loitering in the parking lot or street outside a store, the user can set the alerts for such car to get notified in the future. With an AI solution like this, common street cameras should be equipped with LPR capabilities. So, state-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras. high-performance alert mechanisms A high-performance AI solution, in addition to having high accuracy, should be able to: Easily integrate with 3rd-party systems Work well with all ONVIF IP cameras including infrared and thermal ones (for Intrusion detection) Analyzes video streams in real time and trigger alerts within a few seconds Send alerts to multiple VMSs, connect with signaling devices such as loud speakers or flashing lights Send email notifications to security staff and police departments Send notification on mobile device using AI NVR mobile app Maintains a record of all alerts to provide evidence of intrusion and loitering instances for police and insurance agencies. To assist in theft and vandalism prevention, AI-based security systems with deep learning will do all of the tedious work for you. Their low cost and high performance also make them the most accessible security solutions in the market with large return on investment. Stopping crimes is a difficult, ongoing challenge, but with the right AI software, business vendors and police departments can do so with more ease.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI Technology And Surveillance Solutions Artificial Intelligence technology built into surveillance solutions help organizations optimize their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organizations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organizations overcome this challenge and optimize their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognizing people, vehicles and even behaviors. Detection And Prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial intelligence changes all this by recognizing potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How Does Artificial Intelligence Work? Artificial intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognize different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organizations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organizations can enhance operational efficiency by making use of the data report. Increasing Commercial Success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organizations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organizations the opportunity to personalize the service experience, foster loyalty and maximize customer lifetime revenues. Artificial Intelligence can help organizations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organizations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centers to map footfall at peak times, ensuring that staffing is optimized to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximize the sales opportunities. Artificial Intelligence At Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognize, classify and respond to security threats. This article was written by Hikvision.
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
Toyota Argentina has been operating in the country for 26 years. It represents 40% of the exports of automotive companies in 2019 and currently has an annual production capacity of 141,000 units, exporting 75% of its production to 22 Latin American countries and to the Caribbean. Toyota’s Zárate plant in Argentina, which was closed due to COVID-19, is ready to reopen with new regulations to ensure the security of its employees. Given the need to apply a health protocol against the pandemic and resume a safe operation, Toyota Argentina carried out an analysis of the new technologies on the market and chose the Dahua Thermal Body Temperature Monitoring Solution for its high quality and high cost-performance value. Safety at the factory Due to the large number of people entering and leaving the factory every day, the automaker required a safe and efficient solution to help them control the commuting staff (including 1,500 employees that take buses, 900 employees that use parking lots and 700 contractors) without delays, while complying with the new government regulations. The solution included 4 sets of Dahua Thermal Body Temperature Monitoring equipment (DHI-NVR4216-I + TPC-BF-5421 + Blackbody). They were installed in different entrances, providing a non-invasive way to check the body temperature of their employees at the same time, ensuring that the temperature of the people entering the plant is normal. Maximising employee security “This situation took us from having two production shifts before the pandemic to one production shift only, having to rise the number of buses to bring employees and contractors to the plant, as well as applying additional security measures in dining rooms, common areas, and production line for social distancing and cleaning and hygiene measures,” said Alberto Martín López, Corporate Security Manager at Toyota Motor Corporation. The training of personnel was also conducted to allow them to be familiar with the equipment"“Before this implementation, every shift entered and leave the plant in 30 minutes. Now, maintaining a rhythm of fluid access and social distancing, we do it in 45 minutes but in a more secure way, ensuring a competitive timing and maximizing our employees’ security,” explains López regarding the immediate benefit of the solution in the daily operation of the company. Production resuming “The installation and calibration was relatively quick. The Zárate Plant was operational in 3 days, with the addition of some infrastructure improvements on the entry/exit areas, since work was carried out in semi-open places and the impact of climate changes had to be reduced. In this period, the training of personnel was also conducted to allow them to be familiar with the equipment and to ensure the equipment’s usage life,” he added. The Dahua Thermal Body Temperature Monitoring equipment is faster than hand-held scanners In addition, López also mentioned that “The current COVID-19 protocol was also implemented, randomly testing staff that reaches about 100 tests daily. These types of new technologies facilitate and maintain a safe production operation and care for our employees and contractors, allowing us to comply with the demand of our customers.” Business security The Dahua Thermal Body Temperature Monitoring equipment is faster than hand-held scanners and can screen massive number of employees at a safe distance, enabling efficient entry/exit access for employees. It provides security guarantee for Toyota Argentina’s reopening and routine operations, while meeting the government’s business resumption requirements. "This technology allows companies to return to business in an orderly manner and be compliant with the measures dictated by official entities. This reinforces Dahua Technology's commitment to provide solutions that aid prevention measures during this pandemic. The objective is to be able to continue offering solutions that facilitate community care by supporting the economic business resumption of industries,” says Franky Su, Dahua Technology Country Manager for Argentina & Uruguay. Specific solutions and products might vary depending on the different regulations and measures for COVID-19 in each country.
For more than a century, SwedishAmerican Health System, its hospital and medical facilities, have been serving the community of Rockford, Illinois. As a division of the University of Wisconsin Health, the medical staff has been delivering high-quality healthcare and strategies to keep patients and families healthy. What families and patients don’t see is the security systems that have been put in place at all Swedish American medical facilities and outlying satellite healthcare clinics. “In an ongoing effort to provide security at the highest level, SwedishAmerican is upgrading all their servers to include Windows 10,” said Randy Lapp, a regional business development manager at Salient Systems. Reliable security solution “The security team has nearly completed the replacement of old DVRs with new enterprise network servers. This offers a much more reliable security solution tying all the medical facilities together. Each clinic will have a single server, while there will be multiple servers in the hospital. Server types and camera counts will depend upon the needs of each wing of the facility.” In keeping with SwedishAmerican’s mission to deliver excellence in healthcare, they also maintain the highest level of care when it comes to keeping their patients, medical staff, and facilities safe. One such effort is the migration from Windows 7 platform to Windows 10 and maintaining compliance in their OS. Utilizing Salient’s CompleteView VMS with Dynamic Resolution Scaling, the security team has more than adequate bandwidth to record and store video for 90 days at each facility. Video surveillance systems The servers replace an obsolete system and have been engineered by Salient System network engineers Because the medical center offers a daycare facility, recording is ongoing, and is stored for 90 days; however, some recordings are held for as long as six months. In locations where there are privacy issues, such as patient treatment areas, no video recordings are made. Still, in spaces such as parking lots and common areas, video recording is essential. The servers replace an obsolete system and have been engineered by Salient System network engineers to accept upgrades in security solutions as technology, and various solutions evolve. Even more important is the fact that the servers are tailormade to fit the specific needs of the various hospital departments and separate clinics. The servers, just like the hospital, have evolved over the years. The PowerProtect platforms extend the limits of operational capabilities for video surveillance systems engineered for continuous access and durability. Various requirements for storage “The reason for the custom build is to fulfill several missions of the hospital system,” Lapp said. “There are various requirements for storage and differing requirements for recording frames per second. The customized nature of these security solutions fulfills the unique needs of the customer.” SwedishAmerican Hospital has video recording requirements that weren’t necessary a few years ago. This is an inner-city hospital system, where there are different and sometimes difficult challenges" Terry W. Gagliano, security manager at the hospital system, said the investment in this server solution would not only help with the upgrade to Windows 10, but it will allow greater recording capacity. “This is an inner-city hospital system, where there are different and sometimes difficult challenges,” Gagliano said. “The clinics also are within the inner city, and we wanted to ensure that we had enough bandwidth to not only record, but to store the images that we are getting. We wanted to be able to effectively record and store video for 90 days.” Mission-Critical video surveillance Recording and storage specifications vary at the hospital. For instance, at the child daycare center at the hospital, recording is active only during hours of operation, and storage of those images last from three to six months. Parking lots also are under constant surveillance, and storage on the servers is ongoing. “We’re thrilled to have these server platforms in place and working,” Gagliano said. “What we had been using is obsolete. The PowerProtect solutions are engineered to accept upgrades as they are needed and as they become available. We expect these servers to last beyond five years before we have to consider replacement.” The servers or hybrid NVRs are a value oriented digital video surveillance system, offering continuous operation with advanced components. They are rack-mounted, and as any end-user would expect, delivers reliability and a processing power required by mission-critical video surveillance. High performance in a flexible platform Because the storage of video images is important, SwedishAmerican sought a single Intel Xeon processor with 16 GB of memory, which also offered the hospital system up to 48 TB of video storage. “We were looking for new servers at our existing buildings, so that meant we were in the market for 40 to 45 servers,” Gagliano said. Our clinics have varied and different missions, so demand for security services are different" “Our clinics have varied and different missions, so demand for security services are different. When we sought customized solutions, we found exactly what we needed.” PowerPlus is a two-unit NVR rack mount used for the installation because SwedishAmerican sought a balance between processing power, storage capacity, and redundancy for high performance in a flexible platform for its existing video surveillance applications. A hospital setting is a 24/7/365 environment, requiring a system that can withstand the rigors of continuous operation. That’s where the enhanced performance of CompleteView 20/20 comes in. Considering performance first and foremost “When we started the process of replacing our servers and NVRs, we considered performance first and foremost,” Gagliano said. “It was mission-critical to have flexibility, and it was important to honor the standard of excellence already offered by SwedishAmerican Hospital.” In recent years, SwedishAmerican has been honored in the medical professional for its commitment to quality, and it has become a gold standard for medical care of any other healthcare system in northern Illinois. The hospital has received a Top 100 Hospital Quality Award, 150 Top Places to Work in Healthcare, and a Distinguished Hospital Award by J.D. Power and Associates, among many other accolades. While there may not be an award or designation for security in the workplace, SwedishAmerican has done its best to ensure that patients are afforded the highest level of safety and security.
When Broome County, in the US State of New York, took the decision to upgrade its public safety radio network, it required the highest quality video surveillance system to safeguard its US$ 23 million investment in critical infrastructure. New radio network Working with Integrated Systems, a solution combining networked Axis cameras, illuminators and radar motion detectors, with Qognify’s Ocularis video management system (VMS) was installed, to deter, detect and respond to unauthorized activity, at each of its nine new radio towers. The new radio network replaces a system that was in place since the 1970’s and improves communications for police, fire, along with other emergency services and public works departments for the municipalities across the county. 24/7 security monitoring Each of the radio tower sites required a combination of networked PTZ and fixed cameras" Such mission critical infrastructure requires reliable round-the-clock security monitoring, so Integrated Systems was approached, for its reputation in the delivery of technology solutions to government and industry, to specify and install a new video surveillance system. President of Integrated Systems, Mark Hamilton, explains, “Each of the radio tower sites required a combination of networked PTZ and fixed cameras, as well as radar motion detection to provide comprehensive coverage that would ensure any unauthorized activity would be swiftly detected, automatically recorded and alerts triggered, to initiate a timely and appropriate response.” Axis camera and radar detection technology Axis camera and radar detection technology was chosen for interior and exterior use at each radio tower site and the award-winning Ocularis to provide the all-important integration. Hamilton adds, “Early in our engagement with Broome County we urged them to migrate from their disparate video surveillance architecture, whereby VMS, NVR and DVR systems were all being managed individually across the county.” He further said, “Our recommended solution was a single unified, IP-based system that was county-wide sanctioned. To achieve this, we specified the Ocularis VMS from Qognify.” Ocularis video management system Ocluaris is a VMS that is ideal for large-scale projects such as Broome County, with an emphasis on tactical real-time operations and live visualization, it is supported by full system redundancy and 24/7 availability. Integrated Systems were impressed by Ocluaris’s rich feature set, intuitive user interface (including visually mapping of the entire camera estate) and impressive scalability. What’s more with Axis as a Qognify Technology Partner it instilled the confidence Broome County needed to switch to a more unified approach to video surveillance. PTZ and fixed cameras installed All surveillance camera footage is recorded and centrally archived at the County Data Center Using Ocularis, authorized personnel at the Central Security Building and Emergency Management Services Center have 24/7, 365-days access to live and archived footage from every camera at each of the nine sites. The PTZ cameras installed give a 360-degree view of each radio tower site, while fixed cameras monitor the tower yards main gates and shelter doors. Meanwhile, the radar motion detection system guards the perimeter. All surveillance camera footage is recorded and centrally archived at the County Data Center via the county’s microwave data network. “If any suspicious activity is detected an operator can rapidly view, review and replay all relevant footage through Ocularis,” explains Hamilton. Use of video analytics and visual maps To aid the speed of response, the operator also benefits from the use of visual maps to rapidly determine what cameras are available across each site, as well as video analytics to minimize time required to trawl through footage to identify activities of interest. Broome County has been impressed with the Axis and Qognify solution, which has also been integrated with its existing county-wide video network that includes street cameras, buildings and mobile video command systems. The success of the project has been recognized with a prestigious Security Solutions Award. Hamilton concludes by saying, “Qognify’s Ocularis is now the lead VMS that Integrated Systems specifies whenever embarking on a new video surveillance project.”
Interface Security Systems, a managed services provider delivering managed network, asset protection, and business intelligence solutions to distributed enterprises, provided RMH Franchise, the world’s second-largest Applebee’s franchisee, with secure SD-WAN over broadband, 4G/LTE wireless WAN backup and VoIP solutions. A significant update for RMH’s aging network environment, the solutions are boosting RMH’s application performance, wireless failover capabilities, and providing a seamless voice solution that has proved to be particularly useful during times of lockdown and social distancing. Stricter compliance rules Founded in 2012, RMH Franchise operates more than 131 restaurants across 14 states. While it traditionally has offered in-house dining, additional Applebee’s options such as Carside To Go, online ordering and delivery have proved invaluable throughout the current health crisis. “I had been mainly keeping our IT in-house and managed our own Internet connections, routers, security, etc.,” explained Roger Somers, Executive Director of IT, RMH Franchise. “As our footprint was growing, the requirements for a secure network were also increasing, and it made sense for us to outsource. PCI (Payment Card Industry) requirements also became more stringent and businesses were required to adhere to stricter compliance rules.” Cost-Effective solution Interface implemented a next-generation Secure SD-WAN network architecture with broadband upgrades Somers was looking for a managed services provider who could quickly deliver a cost-effective solution for managing and securing their IT network and voice communications across all locations. Interface, a preferred provider for CSCS, the purchasing agent for Applebee’s, perfectly fit the bill and customized a scalable solution bundle. Interface implemented a next-generation Secure SD-WAN network architecture with broadband upgrades. Additionally, Interface combined managed 4G/LTE wireless capability with terrestrial circuits in areas with low-speed broadband to deliver an improved restaurant and guest experience. The 4G/LTE service automatically takes over should the primary network connection fail. It offers seamless fail-over for POS transactions, credit card processing, inventory management and other key processes to continue to perform without interruption or store personnel involvement. Consolidating several vendors Interface also implemented its VoIP phone service and consolidated several vendors, migrating all RMH’s locations from legacy phone systems to a fully hosted cloud model, saving long distance costs and standardizing all locations. As the worldwide health crisis became an ever-increasing concern and more restaurant guests were staying home, RMH leveraged these solutions for Carside To Go, and online delivery. Apart from the significant cost savings realized through Interface’s managed VoIP services, another benefit Somers sees is the cloud auto attendant feature. “The remote recording plays our business hours, curbside delivery or take out specials and can dynamically route calls. This reduces a lot of the call volume directly into the restaurants, has increased our efficiencies, and saved us time and money,” he explained. Providing business continuity Somers added that Interface has made spinning up secure networking and voice services ‘simple, fast and scalable’ with a fully configured proprietary cabinet that includes all of the franchises’ managed services. The Interface Cloud-Powered Remote Reboot feature power cycles equipment without any onsite intervention" He continued that the wireless backup has become “Increasingly important as we continue to layer more critical services on our Internet connection like tabletop devices. The Interface Cloud-Powered Remote Reboot feature power cycles equipment without any onsite intervention, before employees or guests realize there may be an issue. If an Internet provider is down or there is any sort of network failure, rolling over to 4G/LTE is automatic and provides for business continuity. That has become critical for us.” Alarm monitoring services Since implementing the Interface solutions, RMH has increased agility, gained operational efficiencies, and augmented security, all while realizing 10X cost savings. RMH is planning on further strengthening the partnership with Interface by adding alarm monitoring services to Interface’s powerful bundle of managed services for networking, voice and security. “RMH Franchise has been at the forefront of implementing technology that delivers a superior experience to their clients. We are proud to be their managed services provider and look forward to our continued partnership,” said Brent Duncan, Chief Revenue Officer at Interface Security Systems.
The New Athos Cave (also known as Novoafonskaya, Novy Afon Cave, and New Afon Cave) is a karst cave in the Iverian Mountain located in Abkhazia, Georgia. It is one of the largest caves in the world with the volume of its void of about 1,000,000 m³. As a well-known tourist attraction, one of the most important factors that keep tourists from visiting this cave is its security. To achieve this, the management of the cave deployed a surveillance solution from Dahua Technology to provide visitors with comprehensive security throughout their cave exploration. Dahua Technology's Vari-focal Bullet Camera Due to the harsh environment with high humidity and low-light conditions in the cave, the customer needed a high-quality monitoring system to ensure the safety of tourists, avoid accidents, as well as achieve remote management. For the low brightness and high humidity condition in the cave, a group of highly reliable infrared cameras were installed. The main function of the cameras is to prevent visitors from crossing the installed fence which might pose danger to them. The IR Megapixel Vari-focal Bullet Camera presents a 2MP resolution with a motorized 2.7mm - 12mm vari-focal lens. With IR illumination, the camera can capture detailed images in low light or total darkness condition, making it suitable for the environment of the cave. IP video surveillance applications Smart IR technology prevents IR LEDS from whiting out images as they come closer to the camera The camera's Smart IR technology adjusts to the intensity of the camera's infrared LEDs to compensate the distance of an object. Smart IR technology prevents IR LEDS from whiting out images as they come closer to the camera. The camera's integrated infrared illumination of up to 60m (197ft) provides high performance lighting under extreme low-light environments. As for back-end equipment, Dahua's NVR5216-16P-4KS2 network video recorder was selected. It offers excellent performance and high recording quality for IP video surveillance applications. For applications where details are critical for identification, this professional NVR provides a powerful processor with up to 4K resolution. It also features a mouse shortcut operation menu, remote management and control, central storage, edge storage, and back up storage. Access camera remotely In addition, the NVR's Heat Map option highlights the areas with the highest concentration of people. This information can then be exported into a customized report to assist in business or forensic analysis. Security is one of the keys to sustainable tourism. These high-quality and reliable surveillance devices provide a convenient way for the customer to access the camera remotely, allowing the security personnel to monitor the situation in the cave 24/7 and respond quickly in case of an accident. The Dahua solution reinforces the security of this popular tourist destination, creating a safe and enjoyable cave exploration experience for visitors all over the world.
Sussex Police have purchased a fleet of redeployable CCTV cameras from Revader Security, primarily for use on lampposts and urban infrastructure. The Transit-lite mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure vital video evidence for prosecution. Cost-Effective solution Using the Revader EasyFit bracket system, police operators are able to regularly re-position each camera to respond to the movement of crime hotspots, antisocial behavior, vandalism and other street crime around the locality. As the units can be installed in virtually any location within minutes, only minimal planning is required. Revader Security proposed a cost-effective solution of coupling an auxiliary camera to a Transit-lite unit In this instance, Revader Security proposed a cost-effective solution of coupling an auxiliary camera to a Transit-lite unit to provide twice the visibility and coverage. The Transit-lite unit contains the recording and transmission technology and acts as a server to the auxiliary camera. It also has the capacity to host other specialist cameras, such as those for number plate recognition (ANPR). Live and recorded footage is quickly and easily retrieved over the 4G mobile network. Redeployable camera solutions A member of Sussex Police’s Divisional Operations Team commented: “We have been really impressed by the Revader cameras, which are straightforward to install, easy to use, and have provided us with some very high quality CCTV evidence”. Stuart Caldecourt, Managing Director of Revader Security commented: “The use of another PTZ camera on the same Transit-Lite unit has provided our customer with a significant operational advantage at an only marginal increase in cost, representing excellent value for money”. Revader Security offers a wide a range of mobile CCTV and redeployable camera solutions for all applications, including those with low or zero power. The company continues to support Police and a variety of clients in the public and private sector.
Round table discussion
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Network Video Recorders: Manufacturers & Suppliers
- Dahua Technology Network Video Recorders
- Vicon Network Video Recorders
- Hikvision Network Video Recorders
- Avigilon Network Video Recorders
- IDIS Network Video Recorders
- BCDVideo Network Video Recorders
- QNAP Network Video Recorders
- ADPRO Network Video Recorders
- Surveon Network Video Recorders
- Ganz Network Video Recorders
- Video Storage Solutions Network Video Recorders
- Promise Technology Network Video Recorders
- TruVision Network Video Recorders
- March Networks Network Video Recorders
- LTV Europe Network Video Recorders
- Seagate Network Video Recorders
- Hanwha Techwin Network Video Recorders
- Axis Communications Network Video Recorders
- GVD Network Video Recorders
- Teleste Network Video Recorders
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload