Outdoor video analytics
Wavestore, developer of highly secure and open platform Video Management Software (VMS) solutions, will be hosted by three of its technology partners at ISC West, which is taking place at the Sands Expo, Las Vegas on 10th -12th April 2019. Visitors to the Feenics, Mobotix and Raytec booths will have the opportunity to see how easy it is to benefit from a fully integrated security system with Wavestore at its heart. Wavestore VMS Solution As a truly independent company, Wavestore focuses solel...
India’s foremost shop window and business hub for the security industry, Secutech India, is set to return from 25 – 27 April 2019 against a backdrop of rising government investment in smart city projects. Jointly organized by Asian Business Exhibition and Conferences Ltd (ABEC) and Messe Frankfurt Trade Fairs India Pvt. Ltd, the 2019 edition of the fair will introduce a new smart home zone to accommodate India’s growing home automation sector. Indian Security Indu...
iscHanwha Techwin America, global supplier of IP and analog video surveillance solutions, announced that the new Wisenet X series Plus camera line will be shipping at ISC West 2019. Focusing on ease of installation, the new, highly modular X series Plus is one of the easiest cameras to install, service and upgrade saving installers time and money. Wisenet X Series Plus Cameras Available in either 2MP or 5MP indoor or outdoor configurations, X series Plus cameras utilize magnets to lock sensor...
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as o...
In preparation for ISC West, the largest converged security and public safety industry trade show, the Security Industry Association (SIA) has identified the top technology advancements to look out for at ISC West 2019. The “Top 8,” presented with ISC Security Events, represent the key technology advancements impacting the converged security and public safety landscape. The “Top 8” Security Technologies At ISC West 2019: Cloud Artificial intelligence Robotics/autono...
BrainChip Holdings Ltd, global neuromorphic computing company has announced that it recently signed a strategic partnership agreement with Novo Technologies to sell BrainChip’s AI-powered video analytics solutions in Greece and Cyprus. Novo Technologies currently sells video surveillance, security and access control solutions to police and border control agencies as well as airports, sports stadia and retail/banking locations that require video monitoring. In addition, the company has exp...
DW, the provider of digital recorders, surveillance cameras and related management software, announces the upcoming release of our 4MP MEGApix video analytics cameras. The new cameras — including fixed and varifocal lens turrets (DWC-MTT4WiA, DWC-MTT4Wi28, DWC-MTT4Wi36 and DWC-MTT4Wi6), vandal domes with fixed varifocal lens (DWC-MVT4WiA, DWC-MVT4Wi28, DWC-MVT4Wi36 and DWC-MVT4Wi6), and fixed lens bullet (DWC-MBT4Wi28 and DWC-MBT4Wi36) — offer a vast array of analytical solutions. All the MEGApix video analytics cameras can be controlled and managed via DW Spectrum IPVMS. Image Enhancement Features These MEGApix IP cameras provide 4MP resolution at real-time 30fps with multiple analytics features that elevate the camera to the next level. Added intelligence includes line crossing, perimeter intrusion and video tampering detection. All cameras offer image enhancement features such as True WDR, 65-100ft range IR and Smart DNR 3D digital noise reduction, all in IP66-rated turret, vandal dome and bullet housing options. The varifocal vandal dome offers additional features such as two-way audio, alarm input and relay output, in an IK10 impact resistant housing The varifocal vandal dome (DWC-MVT4WiA) offers additional features such as two-way audio, alarm input and relay output, in an IK10 impact resistant housing. “DW continues to build the MEGApix line of camera’s reputation as a technology leader with crystal-clear high resolution imaging and intelligence on the cameras,” said Mark Espenschied, Director of Marketing, DW. “These new models provide cutting-edge features in a variety of housings to meet the needs of any application.” Video Tampering Some of the features of 4MP MEGApix video analytics camera include: 4MP 1/3” image sensor at real-time 30fps 2.8mm, 3.6mm and 6.0mm fixed lens options 3.3~12mm motorized zoom auto-focus lens True Wide Dynamic Range (WDR) Multiple codecs (H.265, H.264, MJPEG) with simultaneous dual-stream 65ft-100ft range IR Line crossing video analytics Perimeter intrusion video analytics Video tampering with scene change detection video analytics Video tampering with video blur detection video analytics Video tampering with abnormal color detection video analytics Smart DNR 3D digital noise reduction True day/night with mechanical IR cut filter Programmable privacy zones Auto gain control (AGC) Backlight compensation (BLC) Auto white balance (AWB) Motion detection Audio input Two-way audio TF card slot (card not included) (DWC-MVT4WiA models) Alarm sensor input (DWC-MVT4WiA models) Relay output (DWC-MVT4WiA models) Web server built-in PoE class 2 and DC12V Waterproof cabling ONVIF conformant, profile S IP66 certified weather and tamper resistant IK10-rated impact-resistant (vandal dome models only) 5 year warranty
BrainChip Holdings Ltd, global developer of software and hardware accelerated solutions for advanced artificial intelligence (AI) and machine learning applications, has signed a strategic partnership agreement with SoftCryptum to sell BrainChip’s AI-powered video analytics solutions to government agencies in France, Belgium, and Switzerland. BrainChip-SoftCryptum Strategic Partnership SoftCryptum sells security and data analytical solutions around the world, particularly to government agencies that require video and image content analysis tools for CCTV footage. Often recorded in low resolution, the recordings from such video surveillance systems are ideally suited to analysis using BrainChip’s unique, multi-award-winning technology. BrainChip Studio software enables instant training of many types of objects and patterns in the field Based on spiking neural networks, BrainChip’s video analytics solution has already been commissioned by several European government agencies to help speed up investigations. Law enforcement agencies require a way to rapidly sift through terabytes of recorded video to identify and track complex characteristics of suspects and witnesses, including faces and patterns on clothing. BrainChip Studio software enables instant training of many types of objects and patterns in the field, 20 times faster than a human operator. BrainChip Studio Software Guillaume Tissot, Co-founder and President of SoftCryptum, commented: “The fact that BrainChip Studio is being successfully utilized by government agencies highlights the benefits it can offer to other security agencies. We will use our growing customer base to further accelerate the adoption of BrainChip’s technology. With a solid network of contacts in Law Enforcement, Defense and Intelligence Agencies, our company is well positioned to help promote, install and support BrainChip’s AI-powered software and hardware solutions.” BrainChip’s Director of EMEA Sales, Luis Coello, added: “We are delighted to enter into this reseller agreement with SoftCryptum. This new partnership strengthens the visibility of BrainChip Studio in European government agencies and improves operational and sales efficiency for our business. SoftCryptum has long-established relationships within many government entities, and we expect to see many new customers implement our technology as a result.”
Eagle Eye Networks, global provider of cloud-based video surveillance solutions, announced that it has enhanced the video analytics offered within the Eagle Eye Cloud VMS. Customers can easily and instantly activate analytics on their cameras without having to install additional hardware or software. No on-site technicians or system upgrades are needed to immediately receive analytic alerts and data. Eagle Eye Cloud VMS Eagle Eye Cloud VMS customers can enable analytics from the dashboard for any camera in their account. Eagle Eye Analytics will function on any camera that is supported by the Eagle Eye Cloud VMS – no analytic functions of the camera are required. Eagle Eye Analytics will even operate with analog cameras. The ability to deploy analytics quickly and without upfront hardware or software investment shows the long-term advantages of a cloud-based solution. The following analytics are now available: Intrusion detection is used to generate a notification when an object enters that forbidden area Line Crossing – Detects when an object crosses a virtual line. Direction may be specified, and notifications may be generated. It is useful for receiving notifications when a security boundary (fence, restricted area, and one-way road) is crossed. It is also well suited for monitoring building entrances, loading docks, and parking lots. Intrusion Detection – Detects when an object enters a customer defined area. Intrusion detection is used to generate a notification when an object enters that forbidden area. Object Counting – Counts how many objects cross a line in either direction. This can be used for counting cars, people, or other objects. Total count per day, per direction, and current delta of the count are maintained and displayed. Loitering – Monitors a defined area and triggers an alert if an object lingers longer than the pre-configured dwell time. Eagle Eye Gallery Viewer In the enhanced Eagle Eye analytics experience, customers are able to track and view up to twenty-five analytic events in Eagle Eye’s intuitive Gallery Viewer. The Eagle Eye Gallery Viewer is an exceptional tool for quickly finding video of interest and viewing active motion and analytic events. In addition, the improved Eagle Eye Cloud VMS gives customers the ability to gain further operational insight by generating customized period graphs of the enhanced data from five minutes to seven days. The enhanced Eagle Eye Analytics are immediately available and can be enabled within the Eagle Eye Dashboard on a camera-by-camera basis. Customers do not need to replace their existing cameras to have access to Eagle Eye Analytics.
Pivot3, global provider of security, Internet of Things (IoT) and hybrid cloud infrastructure solutions, has announced the introduction of the Pivot3 Architect and Engineer (A&E) Program. This initiative will provide architects, engineers and consultants with the resources and support needed to make intelligent decisions when specifying infrastructure platforms at the core of enterprise-class IoT, video surveillance and security solutions for their clients. Pivot3 A&E Program The Pivot3 A&E Program is intended to help specifiers and their clients address the complexities of planning, designing, deploying and managing compute and storage infrastructure for today’s sophisticated security applications including video surveillance, analytics, access control, building management and all other integrated systems. Pivot3 understands the specific needs of both the security and IT markets" A&E firms will gain access to a wide variety of resources that can be used to facilitate projects based on Pivot3's high-performance, ultra-dense, highly resilient solutions that reduce risk, eliminate downtime and data loss, and simplify scale and management. With Pivot3, A&E firms can specify one common infrastructure to consolidate multiple applications and solutions — all manageable through a single pane of glass. Advanced Tools And Support “Pivot3’s A&E program seeks to provide the advanced tools and enhanced support necessary to specify infrastructure solutions that serve as the backbone of intelligent environments,” said Ray Bernard, president and principal consultant, Ray Bernard Consulting Services. “Pivot3 understands the specific needs of both the security and IT markets, as well as the design and deployment challenges in each domain." "The company has the in-depth deployment experience needed in both to effectively support system designers and specifiers in all stages of design and deployment work. The team also understands the client perspectives and issues, and the IT-physical security collaboration dynamics. This new program demonstrates Pivot3’s commitment to helping system designers access the expertise and tools needed to design enterprise-class, IT-proven solutions.” Pivot3 A&E Program members will have access to: Document development and review assistance with specifications, proposals, and commissioning and acceptance plans. A&E resources including CSI MasterFormat 2018 specification documents, 3D BIM Modules for AutoDesk Revit, MS Visio stencils and templates, and CAD drawings. Solution development and design support including review of system architecture, sizing and workload/throughput calculations, and application validation. Dedicated A&E support contact and local support from Pivot3’s Solution Architects and Regional Sales Directors. Design guides, best practices and white papers. Training, webinars and newsletters. Mission-Critical Infrastructure Solutions “The availability of dedicated Pivot3 contacts and resources will help the A&E community consider, design and ultimately, deliver infrastructure solutions that ensure the performance resiliency, and scalability that their customers’ mission-critical environments demand,” said Mike Maddox, director of A&E programs, Pivot3. “The Pivot3 A&E Program will provide the tools, insight and support necessary to achieve the successful design of enterprise-grade, IT-ready infrastructure solutions for a variety of applications and markets.”
Johnson Controls announces the latest version of the victor and VideoEdge flagship video management solution (VMS). This release features an array of tools to improve analytic reporting and streamline device and user management across multi-location installations. The victor client on VideoEdge hardware platforms allows users to leverage high-performance video streaming, audio, video intelligence and an expansive feature set for improved real-time command and management. victor And VideoEdge VMS “This is a major step forward for our VMS platform in its ability to better suit system owners and stakeholders that appreciate the benefits of regular updates and other proactive maintenance,” said Jammy DeSousa, senior product manager, American Dynamics, Building Technologies & Solutions, Johnson Controls. “In the past, keeping up with the latest and greatest firmware and cyber practices, such as rotating passwords on an array of devices, like cameras and NVRs, could be a hugely cumbersome process. With version 5.3 we've greatly reduced that workload while adding capabilities for cyber security and policy compliance.” This latest release presents firmware and software management with enterprise bulk configuration that reduces the time and complexity associated with managing updates across enterprise deployments of Illustra cameras and VideoEdge recorders. Also included is the ability to efficiently manage camera and NVR passwords to adhere to cyber security policies, enriched by the new enhanced security mode which removes default accounts and requires the creation of new accounts and roles. Video Analytics Metadata Visualization Analytic functionality has been optimized with a new dashboard that displays important operational business intelligence from search results and visuals Analytic functionality has been optimized with a new dashboard that displays important operational business intelligence from search results and visuals for average occupancy, conversion rates, engagement rates and more. Analytic overlay and live people counter allow built-in tools for video analytics metadata visualization by creating people counting areas and tallying entry and exit to those areas. VideoEdge NVRs VideoEdge NVRs now support H.265 streaming for efficient encoding in constrained environments, saving network bandwidth and storage costs. Further, NVR camera access permissions simplify the user interface by restricting camera access, effectively hiding cameras from operators who don’t need to see them. victor and VideoEdge offer powerful command and control to seamlessly synchronize video surveillance with access control, fire, intrusion and other systems into one powerful, intuitive interface and recording platform, allowing customers to manage their business more safely and intelligently.
ExtraHop, global provider of analytics for security and performance management, has announced the availability of Reveal(x) for Microsoft Azure. With Reveal(x) for Microsoft Azure, enterprise security and cloud operations teams now have enterprise-grade network traffic analysis (NTA) that uses advanced machine learning to instantly surface high-risk threats and automate response across the entire hybrid enterprise. With this latest release, Reveal(x) is also available for remote site deployments, extending visibility from the data center to the branch office to the cloud. Reveal(x) Network Traffic Analysis (NTA) Solution Reveal(x) for Microsoft Azure is available immediately in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. While cloud platforms offer incredible scale and agility, they also expand the enterprise attack surface, creating new opportunities for malicious actors to exploit misconfigurations, access sensitive data, and compromise applications. Reveal(x) for Microsoft Azure provides an enterprise-grade NTA solution that delivers threat detection and investigation purpose-built for the cloud, extending the visibility and response capabilities of the enterprise security operations center (SOC) to encompass cloud infrastructure. Reveal(x) automatically discovers and classifies everything traversing the Azure environment, including rogue compute instances, to deliver complete real-time visibility at cloud scale. That data is correlated with event data from Azure Security Center to create a unified analytics and investigation source for SOC teams that provides always-on, always-everywhere visibility across the hybrid attack surface. Microsoft Azure Virtual Network Tap (Azure vTAP) The Reveal(x) network traffic analysis platform integrates with the Microsoft Azure Virtual Network Tap to analyze cloud-based application payloads at scale The Reveal(x) network traffic analysis platform integrates with the Microsoft Azure Virtual Network Tap to analyze cloud-based application payloads at scale. Announced at Microsoft Ignite, the Azure Virtual Network Tap (Azure vTAP) is the industry’s first virtual network tap offered by a public cloud provider that enables out-of-band monitoring of all network traffic. ExtraHop has partnered with Microsoft Azure to natively integrate Reveal(x) with the Azure Virtual Network Tap to deliver a completely passive, agentless approach to network traffic analysis in the cloud. With the introduction of Reveal(x) for Microsoft Azure, enterprises can effectively address shared responsibility models and prioritize use of security resources based on critical assets and risk, delivering complete visibility across each dimension of enterprise responsibility including: Applications & Content: Integration with Azure Security Center events enriches network-based threat detection with system-level activity (disabled logging, suspicious processes, suspect file execution), while real-time TLS 1.3 decode and transaction payload analysis spots threats and evaluates risk, even within PFS deployments. Inventory & Configuration: Automatic discovery and classification of all cloud assets gives cloud and security teams up-to-the-second understanding of the attack surface, including the ability to track rogue instances – even when logging is disabled - and instantly flag exposed resources. Data Access: Full support for Azure SQL Database and Azure Blob Storage protocols means visibility into behavior, not just activity, while machine learning at the application layer provides immediate detection of exfiltration activity. Identity & Access Management: Integration with Azure Activity Monitoring allows granular tracking of privilege manipulation, while analysis and machine learning performed on Microsoft Active Directory payloads surfaces and flags suspicious behavior like credential harvesting and brute force login attempts. Network Traffic Access From The Cloud The Microsoft Azure Virtual Network Tap is the first of its kind, allowing us to access network traffic from the cloud"“The Microsoft Azure Virtual Network Tap is the first of its kind, allowing us to access network traffic from the cloud as easily and passively as we do from our data center,” said Daniel Howard, VP of Information Technology at International Cruise & Excursions. “This integration immediately transforms that data into a powerful source of threat detection and investigation. We now have the power to secure our cloud workloads exactly as we do our on-premises applications.” “The enterprise attack surface is no longer confined to the data center. Enterprise IT assets exist everywhere the enterprise operates, from the branch office to the data center or the cloud," said Jesse Rothstein, CTO and co-founder, ExtraHop. "With Reveal(x) for Microsoft Azure, we're enabling SecOps to detect and investigate threats across the entire hybrid enterprise while focusing on the most critical assets first so business functions can continue uninterrupted and customer data remains protected.” Threat Analysis And Incident Management Adwait Joshi, Director, Product Marketing, Azure Security, Microsoft Corp. said, "ExtraHop Reveal(x) offers comprehensive threat visibility across the hybrid enterprise allowing SecOps teams to detect threats immediately and act decisively to eliminate them. The solution works with Microsoft Azure, enabling monitoring and incident response from cloud infrastructure to the data center.”
In the physical security space, video analytics have historically over-promised and under-delivered, often leaving end users sceptical about their capabilities. However, increased integration with security solutions and other business systems, as well as developments in deep learning and artificial intelligence (AI), have given video analytics a significant boost in recent years. Here, we take a look at the key trends putting video analytics in the spotlight, and how this opens up new opportunities for increased security and business intelligence. Deep Learning And AI Will Enhance Video Analytics Capabilities At the start of 2018, our security industry experts commented on how deep learning technology and Artificial Intelligence (AI) would extend to the video surveillance industry, allowing security professionals to gain very specific insights into human behaviour. Our experts predicted that this would permit organizations to reduce risk, enable efficiencies, reduce costs, ensure compliance and provide faster access to stored video. With AI-enables video systems, video analytics are set to perform more complex applications at a higher level of accuracy. Image Processing Developments Allow Intelligent Analytics According to Ambarella’s Chris Day, advancing chip technology combined with the neural network approach to computer vision is game changing for video analytics. Since the problem of higher resolution has already been solved, the key differentior for video surveillance systems will be the ability to add computer vision in parallel with image processing and high-resolution encoding – ideally in a chip that is low-power. Integration With Security Systems Increases Video Analytics Value Video systems produce an immense amount of data that is often wasted, says Bosch Security Systems’ Sean Murphy. When video analytics alerts are integrated with other security systems, video events can trigger responses from other parts of the security solution. For example, cameras with video analytics can initiate intrusion detection system events initiate intrusion detection system events, prompting the panel to take action by alerting the central station or sending video to security personnel. Video Analytics Add Value With Actionable Business Intelligence Adding network video to the current generation of Internet of Things (IoT) solutions provides actional value beyond situational intelligence for security purposes. With increasingly intelligent sensors, interactions between business systems are becoming more sophisticated, providing a value greater than the sum of the parts. Organizations can use smart applications to reduce energy consumption, allocate workspace, and reduce operating costs. In a retail environment, analytics are now capable of assessing a scene for occupancy and crowd control, even generating reports of trends over time. Video Analytics Detect Abnormalities To Predict Incidents Camera-based video analytics can go beyond assessing a current scene to predicting potential risks before they occur, explains Pelco’s Jonathan Lewitt. Based on predetermined factors or analysis of prior events, systems can collect all available information to determine the level of severity of a situation and whether an action needs to be taken. At the same time, systems can correlate data from video and other sources to help analyse similar occurrences in the future. Video Analytics Increasingly Supplemented With Audio Analytics Audio analytics are often overlooked, notes Hanwha Techwin’s Paul Kong, perhaps due to differing privacy laws from video surveillance. However, audio analytics processed in a camera can help provide a secondary layer of verification for events, as well as identifying gunshots, screams, or other sounds indicating an incident is taking place. This makes audio analytics ideal for dealing with active shooter events at schools and campuses. As Louroe Electronics’ Richard Brent explains, audio analytics software can detect rising levels of human aggression, as well as recognising firearm discharge. This can trigger alerts to ensure incidents are dealt with swiftly.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveler safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving Mass Transit Security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime Prevention In Transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train Security And Safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing The Right Technology For The Solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit Security With Modern Technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused Responses To Events Audio analytics processed in the camera, has been a niche and specialized area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Microphones And Algorithms Having a SoC allows a manufacturer to reserve space for specialized features, and for audio analytics, a database of reference sounds is needed for comparisonMany IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialized features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring A Camera For Audio Analytics Audio DetectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Noise ReductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyzes the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio Source ClassificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Messages And EventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customizable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
The cloud and deep learning are two technologies on the verge of transforming the video surveillance market. You often hear the two technologies mentioned as separate trends, but lately, I have been hearing about how interdependent they are. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. A New Era Of Autonomous Video One company that is combining the cloud and deep learning in an end-to-end system is Umbo Computer Vision, an “autonomous video security technology” company built on its founders’ expertise in deep learning and machine vision. The company’s cameras are equipped with basic video analytics, and they are tied into a cloud infrastructure that provides additional deep learning algorithms. The cameras provide computer vision pre-processing, with the bulk of detailed analysis happening in a neural network in the cloud.One customer benefits from another customer and all the knowledge is aggregated together" “Having a SaaS model gives companies like ours the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision. “We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefits from another customer and all the knowledge is aggregated together.” Adapting To A Changing Landscape Umbo’s deep learning analytics provide higher accuracy, says Guan. For example, the system can provide accurate alerts on people climbing a wall, and it can accommodate for elements such as shadows and adverse weather conditions. The cameras can also provide occupancy information from a video view of a room; unlike people-counting applications, the camera does not need to be mounted above the door. The algorithms can detect loitering and can track a subject even if he or she disappears briefly from view (such as walking behind a building). Umbo developed the algorithms from scratch using the company’s deep roots in technology. Guan says the company was “built on data and using data.” The company’s cameras are equipped with basic video analytics, and they are tied into a cloud infrastructure that provides additional deep learning algorithms The Cloud Serves As A Media Gateway “Cybersecurity is ensured,” says Guan. The cloud provides built-in authentication with the camera; user names and passwords are handled in the cloud, so there is no manual reset of the password at the device level. The cloud serves as a media gateway, and two-way communication between the camera and the cloud addresses how much data is streamed. Data in the camera has 256-bit encryption, and there is a secure “tunnel” through which data moves in the Internet. In the cloud, the host provider, such as Google, Microsoft or Amazon, protects the data to their own high standards. Each camera has industrial grade SD providing 30 days’ storage of full frame rate, 30fps video at 1080p, with backup in the cloud. In effect, the camera operates in-lieu of a network video recorder.The end-to-end system is designed to handle an essentially-unlimited number of cameras and can also be integrated with other products Handling Unlimited Cameras Customers interface with the system through the cloud’s software user experience. The end-to-end system is designed to handle an essentially-unlimited number of cameras and can also be integrated with other products. Umbo targets the enterprise market and has around two-hundred enterprise customers in the United States - their biggest market - as well as offices in London and Taipei, and customers around the world. The cost structure involves an annual payment per camera, between $280 and $600 depending on features/capabilities. Umbo is introducing a new bullet camera with a zoom lens for exterior applications, incorporating a higher-end Sony sensor for good low-light performance and wide dynamic range (WDR). The camera’s modular design enables the addition of features such as longer-range infrared – increased from 100 to 160 feet – white-light LED to provide a color image, and greater deterrence, at night, and a long-range microphone for audio. The company also offers a fixed-lens dome camera for indoor applications.
Digital Barriers, edge-based IoT surveillance and security technologies solutions provider, has announced that its cutting-edge facial recognition technology was successfully deployed at The O2 in London to enhance security at both The BRIT Awards (“BRITs”) in February and the National Television Awards (“NTAs”) in January this year. The technology was used to screen guests at multiple entrances at both events, which had a combined television audience of more than 10 million viewers. “After a series of demonstrations with facial recognition providers, we selected Digital Barriers for our live trials. Their holistic approach, analytic technology and partnership with human verification worked perfectly in a real-world deployment,” said Stefan Thompson. Digital Barriers – SRI Partnership At the O2, Digital Barriers partnered with Super-Recognizers International (SRI), whose trained staff identify faces in crowds, enabling them to respond quickly to any matches on the system. Digital Barriers provides mobile apps linked to its facial recognition system, enabling face-to-face secondary verification and the super recognizers were fully trained in this technology. Digital Barriers has the best facial recognition technology of any I’ve seen, and I’m excited to join" Digital Barriers has also announced that following this successful partnership, Kenny Long, SRI’s co-founder and COO, has joined Digital Barriers. “As an expert in people identification I’ve seen every solution on the market,” he said. “Digital Barriers has the best facial recognition technology of any I’ve seen, and I’m excited to join.” Facial Recognition System At O2 Arena Digital Barriers and SRI have agreed to partner together wherever there is a requirement to combine facial recognition and specialist operators. “This is a unique offering anywhere in the world,” Kenny Long explained, “and I look forward to working with my former colleagues.” “The O2 is the world’s most popular music and entertainment venue, we’re continually reviewing our security measures. The use of facial recognition is proving to be a valuable enhancement to the security and safety of the venue, its guests and staff. The trials with Digital Barriers have been successful and we’re committed to creating a safe and secure venue for all our fans, staff and performers,” said Paul Williams, Senior Security Manager at The O2. “There are multiple companies in the facial recognition field making claims as to what their technologies can do in the real-world – most have never deployed at scale successfully and rely instead on exaggerated marketing,” said Zak Doffman, CEO of Digital Barriers. “We work with government agencies around the world. Our technology is field-proven in the hardest operating environments. We are delighted with the successful deployments at The O2 and that Kenny Long is joining us. Both attest to the world-class quality of our technology.”
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
Bosch experts for building safety are networking the IKEA MAR Shopping mall in the Algarve, Portugal with trendsetting solutions. They make sure everybody can feel at ease and safe during their shopping experience. Scores of tourists are attracted every year to the Algarve, Portugal’s most southerly region where vacationers enjoy the sun and beaches and descend on popular seaside resorts like Lagos or Albufeira. However, whenever people have had enough of sunbathing, the Algarve also offers a multitude of other things to do – whether it is hiking or shopping, there is something for everybody. Those fancying a spot of the last mentioned have every opportunity to do just that in “IKEA MAR Shopping” – an IKEA-run mall in the Algarve that is home to about 100 other brand shops. Every day numerous visitors frequent the mall and they not only present a challenge to the staff at the checkouts. The safety technology in such a mall also has to work smoothly and on the dot. It is why the architects and planners of the IKEA MAR Shopping mall decided to use a connected, smart safety solution from Bosch Building Technologies. Intuitive And Fully-Integrated Security Solution “Our customer wanted a fully-integrated solution whose systems could be controlled via a single management system,” is how Luis Gomes, Bosch Building Technologies Sales Manager Iberia, describes the remit. Networked systems that communicate with each other have to facilitate quick and precise measures in emergencies. The customer also requested a means by which they could schedule the deployment of security personnel more efficiently plus intuitive-to-operate and clearly-structured systems to make their jobs easier. The Bosch Intelligent Video Analytics software which is installed in each and every camera processes the image data in real time Together with the customer and partners, Bosch has created a harmonious overall picture consisting of a video and public address system, a fire and intrusion detection system and access control within the space of two years. It includes 1,100 loudspeakers inserted in the ceiling and 390 video cameras. The mall is equipped with a total of 4,000 fire detectors and 520 sensors for both intrusion alert and controlling access to IKEA MAR Shopping. Bosch Intelligent Video Analytics The Bosch Intelligent Video Analytics software which is installed in each and every camera processes the image data in real time and recognizes suspicious activities by means of an algorithm. Whenever there is danger, it can make all the information available to the staff who need it as quickly as possible to initiate appropriate measures. For a person, it is virtually impossible to continuously retain an overview of the images provided by 390 cameras. “Intelligent Video Analytics and the complete solution make the security personnel’s everyday jobs significantly easier,” says Luis Gomes. “At the same time, the customer has lower costs – and every shopaholic can feel safe.”
Cherokee Nation Entertainment (CNE) is the gaming and hospitality arm of the Cherokee Nation, operating multiple casinos and hotels across northeast Oklahoma, USA, including the prestigious Hard Rock Hotel & Casino Tulsa. Concerned that their security team was spending an overly large number of person-hours reviewing video recordings searching for a single person of interest, CNE sought to reduce the time it took to review security footage, so their security team could remain focused on proactive tasks, and optimize their day-to-day efficiency. CNE also wanted to obtain and assess accurate data on occupancy and visitor trends for business intelligence purposes. Furthermore, CNE wanted to be alerted to security-related events in real-time, in order to handle security issues as they developed. savVi’s Video Surveillance Solution CNE selected savVi, Agent Vi’s on premise video analytics solution, due to the wide range of video analytics capabilities that savVi offers. Over 1,000 savVi licenses were purchased, allowing cameras at CNE’s ten Oklahoma-based casinos to be enabled with different combinations of real-time event detection, video search and business intelligence capabilities. CNE utilizes the video search capability most widely – to enable rapid search through the surveillance video to pinpoint events of interest – and therefore video search capabilities are enabled on the majority of cameras at the sites. Business intelligence capabilities are mostly deployed around the various gaming machines, and at entrance and exit points, to show traffic patterns and real-time people counts. Real-time event detection capabilities are used largely for the high-security areas to ensure that CNE’s security team is informed regarding situations, as they unfold. savVi is deployed through integration with a range of Axis network cameras, primarily the AXIS P3225 and Q3505 fixed cameras, the AXIS P5635, Q6044 and Q6045 PTZ cameras, and for outdoor vehicle search, the AXIS Q3708 fixed camera with three sensors. CNE uses Milestone XProtect Corporate Video Management System (VMS), which is fully and seamlessly integrated with savVi, a Milestone Certified Solution. savVi’s video search capabilities allow for verification of personal injury claims by customers who may be trying to defraud the casino savVi’s Real-Time Event Detection savVi’s video search capabilities are of considerable importance to CNE. There is a prevailing need for the casinos to be able to swiftly locate specific events within masses of footage (“incident remediation” as it is known within the entertainment industry). Among other things, this allows for verification of personal injury claims by customers who may be trying to defraud the casino. Previously, the security team’s time was heavily occupied by observing hours of footage in search of a specific person or incident. savVi now enables CNE to run the search automatically, allowing far more effective use of the operators’ time, and reduced search time from as much as 16 hours for a single search, down to a matter of minutes. savVi’s real-time event detection capabilities are primarily used by CNE to ensure a safer and more secure environment within the casino parking facilities. By immediately alerting to any suspicious event, such as people loitering or cars moving in an unauthorized direction, the security team can monitor events and act accordingly as they unfold. savVi’s Heat Mapping Capabilities savVi also allows CNE to gather and analyze essential business intelligence data on occupancy and visitor trends. savVi delivers accurate headcounts, meaning that the security team is constantly aware of how many people are on-site and using the casino facilities. This provides essential knowledge in the case of an emergency where a facility might need to be evacuated, and also helps prevent over-crowding. By utilizing savVi’s heat mapping capabilities, CNE has knowledge of which areas of the casino are more heavily populated, and at what times. CNE can then leverage the data collected in a number of ways, including negotiating leasing deals for externally-owned casino equipment and knowing which internal locations require heavier investment of machines and personnel. This puts CNE well ahead of its competitors, as it is one of, if not the, first gaming company to employ Business Intelligence through video analytics. SavVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities" savVi’s Video Analytics Capabilities “It was savVi’s swift and effective video search that caught CNE’s attention when searching for an enhanced security solution, in particular due to the automated query ability,” said Joshua Anderson, Director of Surveillance and Technology, Cherokee Nation Entertainment. “We have been extremely impressed with savVi’s capabilities and the quality of its performance, and fully expect savVi to increase efficiencies and provide true ROI which will have a major impact on the bottom line.” “Cherokee Nation Gaming Commission’s approval of savVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities offer to gaming concerns,” commented AJ Frazer, VP Business Development, Agent Vi. “Having selected to deploy the full range of savVi video analytics functionalities, savVi offers CNE valuable insights into the activities and customer experience at their multiple sites, benefitting both CNE and their customers.”
It was over a century ago that Charlotte Hungerford Hospital (CHH) was founded, as a gift by industrialist Uri T. Hungerford. The vision was to create a community hospital that would serve as a beacon of hope and a place of comfort for the sick and injured. 100 years later, that same community spirit has helped CHH evolve into a vibrant, independent, affordable healthcare network that delivers a comprehensive range of healthcare programs and services for over 100,000 lives in Northwestern Connecticut. A Challenging Safety Diagnosis Avigilon has made us more efficient as we don’t have to spend much time sifting through large amounts of video” Charlotte Hungerford Hospital prides itself on supporting patient and staff safety in all hospital areas and locations. Several years ago, they found themselves with an outdated security system that lacked quality video coverage and recording capabilities. CHH struggled with reliable video playback and faced frequent system crashes. As a result, the hospital’s security operators were often unable to provide accurate evidence during forensic investigations and many liability claims and hospital incidents went unresolved. CHH needed a cost-effective, comprehensive security solution that could protect patients and staff across multiple locations while still being flexible enough to scale with the hospital’s growing needs. Avigilon AI & Analytics Technology With a desire to improve its legacy surveillance system, CHH looked to Avigilon’s advanced artificial intelligence (AI) technology and video analytics to meet their security needs. CHH began a multi-phase upgrade that included installing over 100 Avigilon cameras with self-learning video analytics, deploying AI-based Avigilon Appearance Search technology and using impulse radar technology with the Avigilon Presence Detector (APD) Sensor. Avigilon Appearance Search technology – a sophisticated deep learning AI search engine – helps CHH quickly locate a specific person or vehicle of interest across all cameras both inside the hospital and care centers as well as outside parking lots. This technology provides CHH’s operators with enhanced situational awareness, enabling fast event response and helping to save time and effort during critical investigations. To protect areas of the hospital where cameras cannot be installed, CHH installed the Avigilon Presence Detector (APD), a discreet impulse radar device with self-learning radar analytics that scans, learns, and continuously adapts to its environment. Avigilon Presence Detector Sensors Our Security Department’s mission at Charlotte Hungerford Hospital is the safety of our patients, visitors, and employees" Capable of detecting persons who aren’t moving or are hidden, the APD sensors help improve situational awareness for CHH staff, and are used in areas where cameras are not permitted, such as restrooms or change rooms. When integrated with Avigilon Control Center (ACC) video management software, APD sensors alert CHH operators of human presence while still maintaining privacy. Avigilon H4 cameras were used throughout the hospital to provide exceptional image quality and built-in self-learning video analytics, which provides accurate detection and notification of movement of people and vehicles. CHH also deployed HD Multi-sensor cameras which provide up to four camera views per camera installation, using only one camera license and network drop. This allows CHH’s staff to efficiently cover all angles in order to detect, verify, and act on potential security events across the hospital’s premises. Avigilon H4 and HD Multi-Sensor Cameras At the core of CHH is a desire to help the community and still serve as the beacon of compassion it was founded to be 100 years ago. With these values in mind, the hospital’s mission when it comes to security is the safety of patients, visitors, and employees. Avigilon’s AI solutions have helped achieve this by moving the CHH system from legacy to advanced and providing effective monitoring around the clock while also helping to create operational efficiencies. Since deploying ACC software, CHH’s operators spend significantly less time reviewing recorded video, allowing them to focus on proactive event response. Working with Avigilon, Charlotte Hungerford Hospital has a roadmap for continued growth and exceptional patient safety.
With a number of terrorist attacks having taken place around the world in the past days, city surveillance has become a crucial issue with top priority for the local and central governments. Surveon city solutions provide product lines including high reliability cameras with excellent image quality, feature-rich VMS with video analytics function, and RAID NVR with large storage capacity for 365+ days non-stopping recording. These comprehensive solutions help governments to build good foundations to improve social order, crack down on crimes, and protect citizens from horrible attacks. High Reliability Cameras Generally speaking, the governments might encounter some major challenges when designing a suitable surveillance system, such as heat, humidity, and temperature changes in outdoor environment. Under such circumstances, Surveon provides cameras with excellent image quality and lowest RMA rate to handle all kinds of outdoor condition. "Surveon’s industrial designed and 100% own manufactured cameras have made us feel confident about this project. The cameras are now being used for a few years with an average failure rate of less than 0.03% which is really impressive." said Chan, the surveillance project manager of Kaohsiung. Surveon NVRs provide large capacities for 365+ days non-stopping recording, extended IP storage, and RAID function for zero video loss RAID NVRs The data retention of recorded video is particularly important to the planning and acceptance of city projects. Surveon NVRs provide large capacities for 365+ days non-stopping recording, extended IP storage, and RAID function for zero video loss. Enterprise VMS In addition, Surveon intuitive VMS offers features such as video analytics, offering police units powerful yet easy to use solutions for city surveillance. By paired with Surveon enterprise VMS, the solutions provide robust prevention, preparedness, detection, and quick response measures. Surveon city solutions have been successfully applied in some major cities in Taiwan and Mongolia. “With Surveon’s E2E solutions, from 3-megapixel IP66 cameras, hardware RAID NVR, clustered storage, to enterprise VMS, we are now better equipped to monitor the entire district and protect the community against illegal activities.” said the Sükhbaatar district police officer in Mongolia.
Round table discussion
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?