Remote video surveillance
VuWall, a pioneer in video wall control and AV network management, announced new engineering and sales hires in the United States. Francisco Provencio has been appointed application engineer while Christian Cooper joins as account manager for the East Coast. These new positions will provide additional resources for customers throughout the U.S. as VuWall continues to grow globally. Currently, VuWall has more than 1000 deployments in over 45 countries, with more than 200 in the U.S. alone. As thi...
Echodyne, renowned manufacturer of innovative, high-performance radars for government and commercial markets, has announced the release of its ‘Protecting Critical Infrastructure From Drones’ white paper. The white paper is being released in conjunction with the Global Security Exchange (GSX) conference taking place September 8-12 in Chicago. 'Protecting Critical Infrastructure From Drone' The white paper offers an important look at the security risks facing today's critical infras...
Genetec Inc. (‘Genetec’), a technology provider of unified security, public safety, operations, and business intelligence announces that Stratocast™, its cloud-based video surveillance-as-a-service (VSaaS), powered by the Microsoft Azure cloud-computing platform, now supports new camera models from Bosch, MOBOTIX and EUKLIS. Stratocast is designed to meet the needs of organizations that require a reliable and cost-effective video surveillance solution without the expenses and...
At GSX 2019, in booth 251, Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, will announce availability in September for Wisenet WAVE 4.0, the next version of their VMS (Video Management System) designed to support the advanced features and license-free onboard video analytics that are unique to Hanwha cameras. Wisenet WAVE 4.0 VMS Available from Hanwha’s network of authorized distributors, Wisenet WAVE 4.0 is ideally suited to meet the needs of cus...
Avigilon Corporation, a Motorola Solutions company, announced that it is launching its Avigilon Blue™ platform in the United Kingdom. For Avigilon partners, the Avigilon Blue cloud service platform provides an easy-to-install, cloud-based video security solution with features and capabilities that allows them to remotely monitor and manage more sites with fewer resources. Partners can easily monitor the health of customer sites, update configurations and deploy system updates, all remotel...
Panasonic Business has announced the latest addition to its PTZ camera range at InfoComm 2019, with the brand new AW-UE4 set to enhance the flexibility and usability of filming solutions for AV professionals. AW-UE4 PTZ camera In celebration of the ten year anniversary of Panasonic’s PTZ camera range, the AW-UE4WG/KG has been revealed as the successor to the popular AW-HE2 remote camera, offering upgraded features which include 4K resolution and an ultra-wide viewing angle of 111 degrees...
Avigilon Corporation, a Motorola Solutions company, has announced that Avigilon Blue, its video security as a service platform, is now available in Australia and New Zealand. Avigilon Blue Video SaaS platform Powered by Microsoft Azure, Avigilon Blue is a subscription-managed video security platform featuring self-learning video analytics technology that detects the presence and movement of people and vehicles. When a potentially critical event is detected, the Avigilon Blue platform generates a notification to help business owners effectively self-monitor their security operations, while also offering the flexibility for users to contract a professional monitoring provider to efficiently verify and respond to events that may need further investigation. The Avigilon Blue platform enables video monitoring providers and integrators to remotely manage and service more customer sites with fewer resources. End-users benefit from easy web and mobile-enabled secure access as well as system upgrades that are pushed directly from the cloud, which help ensure systems remain secure and up to date. The platform’s architecture saves on bandwidth while making sure important video verification clips are archived in the cloud and accessible from anywhere. Avigilon Video Analytics “The Avigilon Blue platform is designed to bring Avigilon analytics to virtually any security camera and help our customers simplify monitoring and event verification,” said James Henderson, Avigilon's president. “We are excited to expand our cloud platform in Australia and New Zealand, bringing added value to our Partners and their customers in the region.”
Resideo Technologies, Inc. is highlighting its latest offerings at ISC West 2019 for the first time as a standalone company, following its successful spinoff from Honeywell. The security industry will see Resideo’s new home automation platforms, a new security dealer loyalty program and how the companies’ new voice, video and mobile solutions integrate with consumer’s connected lifestyles to give dealers opportunities to expand their businesses. Home Security “We are fully committed to providing our dealers with the right products and programs they need to win more customers, keep them longer and drive profits, while delivering an exceptional homeowner experience,” said Alice DeBiasio, vice president and general manager, Residential Pro Security at Resideo. “Increasingly, a majority of consumers prefer to have a professional install their home security system because it offers them assurance it was done right and will work correctly when they need it. It’s the professionally installed and monitored solution that helps homeowners have peace of mind that if something happens, their local police or emergency personnel will be alerted to help protect what matters most – their loved ones, valued possessions and property.” The loyalty program provides sales and marketing support, training and financial rewards Premier Security Dealer Program Further demonstrating its commitment to the professional channel, the company has launched the Resideo Premier Security Dealer Program to help participating dealers expand in the security and smart home market, while driving value for homeowners. Led by industry veterans and designed with input from top security dealers, the loyalty program provides sales and marketing support, training and financial rewards, and will help dealers differentiate in today’s market. Next Generation Security Platform Resideo is showing the new Honeywell Home ProSeries Security and Smart Home Platform that will be available later this year. From an entry-level security installation to a fully integrated smart home solution, the ProSeries was designed to give dealers the end-to-end platform they need to deliver a complete security and smart home solution. The platform offers fast and responsive operation and creates a sophisticated user experience that is simple to understand. The ProSeries boasts numerous features to fit today’s consumer lifestyle including built-in voice control for hands-free operation A common user interface is featured across all customer touchpoints – panel, touchscreen, app – making the system easy for consumers to learn and operate. In addition, the ProSeries boasts numerous features to fit today’s consumer lifestyle including built-in voice control for hands-free operation, video alarm verification to reduce false alarms, and the convenience of Bluetooth system disarming. Line Of Sensors And Life Safety Devices Built on a common platform, dealers can learn one system and know them all for easy installation and support. The expanded line of sensors and life safety devices are interchangeable across the entire platform to help reduce inventory and training costs, and user-replaceable parts provide added convenience and help to reduce truck rolls. Additionally, the new system features a modular design with expansion modules, allowing dealers to buy only what they need to help drive down operating costs. The ProSeries platform will integrate with the next generation of Resideo Total Connect for a seamless user experience. The updated platform features a redesigned consumer interface, faster connection and improved functionality, all streamlined with remote programming and device management through AlarmNet 360. Other Technologies On Display Expanding Smart Home Ecosystem: As voice assistants continue their use in homes, Resideo is expanding its ecosystem with key integrations to give users control of their system from their voice assistant platform of choice. In addition to Amazon Alexa, Total Connect will integrate with Google Assistant to provide additional voice controls, as well as IFTTT to help users connect more devices and services together for a broader platform. Total Connect Intelligent Multi-Family Property Solutions: New feature allows property managers, builders and others to remotely manage multiple properties while offering smart security options to renters. LTE (Long Term Evolution) Cellular Communicators: Resideo’s expanded line of LTE radios provides enhanced security and system longevity. Dealers are invited to visit the LTE opportunity pavilion located within Resideo’s booth to learn how they can turn routine upgrades into new sales opportunities. Tuxedo Graphic Touchscreen for VISTA®: The new Tuxedo graphic touchscreen controller offers a friendly user interface and seamless integration with security and automation, to help attract new customers and upgrade existing ones In addition, Brandon Board, chief information security officer at Resideo, will participate in the session Consumer Privacy – How Can Security Lead the Way? on Thursday, April 11, at 9:45-10:45 a.m. PDT. The panel session will explore current practices and opportunities for the security industry to strengthen their leadership in privacy standards.
At ISC West, Bosch will showcase how its offerings deliver value to integrators and end users by enhancing security, improving efficiency, and solving common challenges. Visitors to the booth will see intelligent solutions for vertical markets and new products and services that make systems easier to install and manage. “Gaining efficiency, reducing costs, and increasing profits are challenges for integrators and end users alike," said Brian Wiser, President of Bosch Security and Safety Systems, North America. "With technology that is faster to install and easier to integrate, and services that simplify system management, we're helping integrators serve more customers in less time. Seamless integration and built-in intelligence also combine to empower integrators to create smart, customized solutions that substantially improve security and offer clear business advantages beyond security. As a result, there is significant value for integrators and end users that choose Bosch for their security, safety, and communications needs." Wireless Remote Commissioning At ISC West, Bosch will launch a new fixed dome camera series with wireless remote commissioning capabilities At ISC West, Bosch will launch a new fixed dome camera series with wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. The FLEXIDOME IP starlight 8000i cameras offer an innovative product concept that enables set-up in only three convenient steps: installing the mounting bracket, connecting the cables, and attaching the camera module. Innovative wireless remote commissioning enables installers to work smarter. Currently, to reach cameras, technicians must repeatedly climb ladders, or a lift needs to be rented. With this new camera series, commissioning can be done wirelessly or remotely with no need for ladders or lifts. A tablet or smartphone with the Bosch Project Assistant app can be used to adjust the pan, tilt, roll, and zoom to set the required field of view without touching the camera or lens. If any changes are required post-installation – to accommodate a different store layout or high-risk area – this can be done remotely to save time, effort, and resources. i Series Intelligent IP Cameras Bosch’s portfolio of intelligent ‘i’ Series cameras featuring built-in video analytics is also expanding. In addition to the existing IP 4000i, 5000i, 6000i, 7000i, 9000i and new FLEXIDOME IP starlight 8000i cameras, Bosch will preview MIC IP starlight and MIC IP ultra 7100i cameras. These rugged cameras are made with anti-corrosive metal and can function at temperatures ranging from -40 to +140 degrees Fahrenheit. The MIC IP ultra 7100i delivers 4K ultra HD resolution for mission critical applications, such as city and highway surveillance, making them ideal for monitoring highways, bridges, ports, perimeters, and more. A new firmware release for the IP 7000i, 8000i and 9000i cameras will also introduce Camera Trainer functionality to "i" Series cameras with on-board Intelligent Video Analytics. Camera Trainer brings machine learning to Bosch IP cameras, enabling integrators to tailor them to detect the objects and situations that matter most. The ability to identify user-defined objects and situations can be combined with the existing alarm rules and object filters of Intelligent Video Analytics for even more flexibility and accuracy. It substantially improves the level of security for people and property and opens up new possibilities for customized applications. For example, it could be used to separate vehicles clustered in front of traffic lights or to determine how long a vehicle has been parked in a bay. With Camera Trainer, video cameras can be taught to recognize and detect stationary objects or certain situations instead of being triggered by motion alone. Installer Services Portal Bosch will also preview an improved Installer Services Portal to help dealers and integrators better manage security devices, services, and invoices Bosch will also preview an improved Installer Services Portal to help dealers and integrators better manage security devices, services, and invoices. The mobile-ready site offers single sign-on for secure and easy access to Bosch communication services, including cellular data plans for control panel communications and cloud connectivity for remote programming and end user app connectivity. With the portal, dealers and integrators gain enhanced reporting for service billing by device, secure online invoice payment capabilities, and the ability to customize access to technical or billing information by assigning employee roles within an account. In addition, a new Installer Services Portal companion app will make it easier for dealers and integrators to add devices to their portal accounts by simply scanning a product's QR code with the app. Bosch Security Control Panels ISC West attendees will also learn how Bosch security control panels, video systems and analytics, access control, and communications technology work together to deliver increased security, efficient monitoring and control, automated audio announcements, and more. To demonstrate the full power of these solutions, Bosch will simulate a retail store within its booth where visitors can experience how integrated solutions improve overall safety and security, reduce shrink, and help retailers improve merchandising and operations. For example, visitors can see how pressing a cashier station panic button connected to the Bosch G Series Control Panel will display an alarm and video in the Bosch Video Management System (BVMS) as well as trigger the Telex Radio Dispatch system (IP-224) to issue an announcement on store personnel’s two-way radios. In addition, attendees can flip a switch to simulate a fire and experience how the AVIOTEC IP starlight 8000 camera uses video-based fire detection to quickly detect a fire before it spreads, while notifying store personnel. Parking Lot Video Monitoring Attendees will also learn how to improve management of outdoor areas, such as parking lots and loading docks, and to identify high-risk situations Attendees will also learn how to improve management of outdoor areas, such as parking lots and loading docks, and to identify high-risk situations like loitering using security and communications technology. For example, they will see how a camera can be used as a sensor to detect a delivery truck approaching a loading dock bay. The camera can trigger the warehouse's Bosch public address system to issue an audio notification that sends staff to a specific bay to receive the delivery. If the dock door is left open, the Bosch G Series Control Panel will issue an alarm and trigger a different audio notification to prompt staff to close the door. Bosch loudspeakers installed throughout the store, outdoor area, and booth can be used for both announcements and background music. Designed to work together, Bosch systems make it easier for integrators to implement customized solutions that provide significant benefits for their customers. Integrated systems are possible whether customers choose a complete Bosch solution or use software from other providers. Bosch products are compatible with solutions from a range of industry partners.
Growing drone use in populated areas poses significant risks that, without additional safeguards, could result in attacks by malicious entities and exploited for use in cyberattacks, terrorism, crime and invasion of privacy, according to a new research report by Ben-Gurion University of the Negev (BGU) and Fujitsu System Integration Laboratories Ltd. researchers. Computer Vision Algorithms The first comprehensive study on “Security and Privacy Challenges in the Age of Drones” evaluates 200 academic and industry techniques designed to detect and disable drones flying in both unrestricted and restricted areas. Its findings coincide with the U.S. government proposal to allow civilian drone flights with new security rules that permit deliveries and other commercial uses in populated areas. The researchers demonstrated a new physical method to disable drone’s active tracking functionality To highlight the threat, the researchers demonstrated a new physical method to disable drone’s active tracking functionality, a new technology that was recently introduced by drone manufacturers that is based on computer vision algorithms. Rise In Drone-Related Security Incidents “The cutting-edge technology and decreasing drone prices made them accessible to individuals and organizations but has created new threats and recently caused an increase in drone-related incidents,” says Ben Nassi, a Ph.D. student in BGU's Department of Software and Information Systems Engineering (SISE) and a researcher at the BGU Cyber Security Research Center. “There are many difficulties that militaries, police departments, and governments are seeking to overcome, as it is a recognized threat to critical infrastructure, operations, and individuals.” The researchers examined different ways to detect drones in drone-restricted areas including radar, RF Scanners, thermal cameras, sound and hybrids of these methods. However, they believe the biggest challenge is determining the drone’s purpose in non-restricted areas. Drones Challenge Security And Privacy “An open-skies policy that allow drones to fly over populated areas pose a significant challenge in terms of security and privacy within society” says Prof. Yuval Elovici, Ben Nassi’s Ph.D. advisor, who is director of the Deutsche Telekom Innovation Labs@BGU; director of the BGU Cyber Security Research Center, SISE faculty member and the Davide and Irene Sala Chair in Homeland Security Research. The researchers propose methods that enable flying drone identification as well as registration, which is now a U.S. regulationAttackers can also disguise a cyber-attack as legitimate drone pizza delivery by hiding the hardware they use inside the pizza box. “In an unrestricted area, we believe that there is a major scientific gap and definite risks that can be exploited by terrorists to launch a cyber-attack,” Nassi says. “It is inevitable that drones will become more widespread, but we need to recognize that open-skies policy pose multiple risks and that current solutions are unable to solve as a result of a major scientific gap in this area.” Flying Drone Identification The researchers propose methods that enable flying drone identification as well as registration, which is now a U.S. regulation. This includes dedicated techniques for authenticating drones and their operators. While in their previous study, the researchers demonstrated a new technique to detect a spying drone, new methods to determine the purpose of a nearby drone must be developed.
Luxul, globally renowned innovator of IP networking solutions for security integrators, has announced its technology lineup for ISC West 2019, taking place April 10-12 at the Sands Expo in Las Vegas. In Legrand | AV's booth 29098, Luxul will exhibit PoE Self-Healing, managed Gigabit switches; award-winning routers with integrated Domotz remote management technology; the company's next-generation wireless controller; "Good, Better, Best" dual-band wireless access points (APs); and the new Easy Setup App. Switches, Wireless APs "Today's security solutions are only as good as the networks they are built on, so integrators can't afford anything less than exceptional performance from all components — from switches to wireless APs," said Keith Ebert, director of channel sales at Legrand | AV – Luxul. "For our lineup at ISC West, meeting this requirement is only the beginning. Visitors to our booth will see advanced features that dramatically simplify installations, lower costs, and deliver the ultimate customer experience, all while laying the groundwork for RMR programs to increase revenue." At ISC West 2019, Luxul-managed Gigabit switches featuring Self-Healing capability will include the 18-port/16 PoE+ L2/L3 AMS-1816P and 12-port/8 PoE+ XMS-1208P At ISC West 2019, Luxul-managed Gigabit switches featuring Self-Healing capability will include the 18-port/16 PoE+ L2/L3 AMS-1816P and 12-port/8 PoE+ XMS-1208P. The units empower security integrators with two advanced features: Auto-Recovery and Power Scheduling. With Auto-Recovery, devices connected to the switches by PoE no longer need to be manually rebooted when they fall offline or become unresponsive. The configuration in the switch triggers them to reboot automatically. With Power Scheduling, integrators can now trigger the switches to power PoE-connected devices on or off based on any schedule they create within the switch. Luxul Epic Series Wireless/Wired Routers Luxul routers on display will include the company's Epic Series, which consists of the dual-band wireless AC3100 Epic 3, wired multi-WAN Epic 4, and wired dual-WAN Epic 5. The routers' onboard Domotz technology sends security integrators alerts when network issues arise — allowing them to take immediate action — and also share device information with Luxul's support team for swift and easy troubleshooting. In addition, Domotz remote management provides security integrators with a foundation to establish added-value recurring monthly revenue (RMR) programs or offer a complement to existing camera monitoring programs. Also, on display will be the next-generation XWC-2000 wireless controller, which delivers twice the capacity of its predecessor with support for up to 32 Aps. Each AP can be configured for a designated wireless channel in addition to supporting individual wireless transmit power adjustment. Newly deployed APs are now automatically added for plug-and-play installation, and Luxul's Roam Assist technology, built into the wireless controller, ensures that mobile devices are always connected to the best AP for the highest performance. Wireless Apex APs For Security Systems Luxul will highlight a "Good, Better, and Best" offering of wireless Apex APs for security systems Luxul will highlight a "Good, Better, and Best" offering of wireless Apex APs for security systems. For smaller networks where budgets are a concern, Luxul's "Good" XAP-810 is a cost-effective wireless AP offering 802.11ac 2x2 dual-band technology and 5GHz beamforming for data rates up to 1200Mbps. The "Better" XAP-1510 features 802.11ac 3x3 dual-band technology and 2.4 and 5GHz beamforming for data rates up to 1900Mbps throughout a facility. The "Best" XAP-1610 features advanced 4x4 MU-MIMO (802.11ac Wave 2) technology and 2.4 and 5GHz beamforming for data rates up to 3167Mbps. The AP is designed to enhance transmission and reception performance, producing higher throughput when experiencing medium to weak signals within the effective range. Now available as a free download from the Apple and Android stores, Luxul's Easy Setup App, which allows integrators to install a Luxul wireless router and up to two wireless APs at the same time, from the convenience of a mobile phone, will be on display. The simple-to-use app not only speeds up installations but ensures the network infrastructure is installed with the appropriate settings and the latest firmware. The result is lower costs for integrators and their customers and a seamless wireless network that provides outstanding performance.
At ISC West, in booth # 26061, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence will unveil a new version of Security Center, the company’s open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. With customisable live dashboards, enhanced privacy protection features, a brand-new map-driven mobile app, and new functionalities that help users actively monitor the health of their system and ensure compliance with cybersecurity best practices, version 5.8 will ensure that users can optimize their physical security environment while benefiting from greater visibility into their operations. Valuable Contributing Sensor Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system Security Center 5.8 will enable users to create custom dashboards that will display real-time data, such as video feeds, alarms, reports and charts in a way that is meaningful to them and their specific job function (security, operations, IT etc.). Users can set up their dashboards using simple point-and-click tools, and instantly combine data from the entire Genetec portfolio (video, access control, ALPR, etc.) in one screen to gain a new perspective on the evolution of events and key metrics across their operations. Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system when they are on the move and allow them to turn their smartphone into a valuable contributing sensor to their security system. Map-Oriented Interface In addition to recording incidents, accessing nearby video, access control, and ALPR devices as well as sharing video from their phones to Security Center, the new mobile app will let operators share their location with colleagues in the operations center, send in-app messages and share live and recorded video through an intuitive map-oriented interface. Key features will include: Video (live and recorded playback, PTZ controls, bookmarking, time- and event-based reports) Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information. Physical Security Devices With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes System administrators are acutely aware of the critical nature of security systems, but often lack the tools to assess the potential exposure of their software, operating systems and physical security devices. Security Center 5.8 will introduce a new Security Score feature to track each system’s compliance with hardening guidelines, firmware availability and updates, password strength, as well as several other dimensions of cybersecurity. Available through the built-in System Health dashboard, the Security Score will measure individual cybersecurity processes and verify that they are followed by the system. This will enable users to get a better understanding of the cyber security risks they face and enable them to take the necessary steps to harden their system. With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes, loss of image quality or tampering, and alert administrators immediately. This allows them to get ahead of problems and take the necessary corrective action immediately, rather than wait to find out there is a problem when they need footage and it is not available.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
By now your organization should know the drill. To keep your enterprise safe from unauthorized access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world. Protect Against Burst Attacks You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017. Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack. They recommend adopting two key solutions: 1) a behavioral DDoS protection system that utilizes machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred. Prioritise Network Infrastructure Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it? In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list. Hide Sensitive Web Pages From Search Engines Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible. Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches. Update Passwords On Your IoT Devices Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update. Use Encryption To Protect Data In Transit Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information. This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall video footage. Active Archive Strategy These challenges are thrusting storage tiers to the forefront of system design. Storage tiers in video surveillance had previously meant simply using a separate archive or attaching add-on capacity directly to network video recorders. Many of the new storage options designed for video surveillance are pulling together different storage tiers into a single storage architecture Many of the new storage options designed for video surveillance are pulling together different storage tiers (and in some cases storage media) into a single storage architecture, such as an active archive solution. This balance can be achieved with an active archive strategy that automates migration of data between different storage types, to ensure the data is on the correct storage type at the correct time to meet performance and retention requirements without blowing the budget. This approach also ensures ease of access while automatically moving content from more expensive tiers of storage to more cost-effective long-term tiers of storage. This allows for greater efficiencies in how recorded footage is treated throughout its lifecycle. In some cases, it includes moving data from edge devices to centralized storage, and then to the public cloud. Scalable Video Storage Solutions As storage demands have increased, video management vendors have turned to storage specialists for solutions that can accommodate large numbers of high-resolution video files, metadata associated with the footage for easy searching, along with much needed scalable solutions. In terms of video management software, this means the integration of video content from different storage types, tiers and physical locations is required, and which considers the performance profile of each storage type. With an active archive solution, video content is searchable and accessible directly by the end users regardless of where it is stored. Deploying an active archive solution enables surveillance users to reduce the complexity and costs of managing data for long term retention As seen in many product categories, camera and storage vendors continue to provide extremely competitive offerings. But, storage-specific solutions for video surveillance have lagged behind the roadmaps for video equipment and, as more and more cameras have entered the market, less attention has been placed on video storage capacities. Tiered Storage Strategy The surveillance industry has evolved considerably from the days of the 8mm video recorder; however, enterprise storage solutions will be forced to evolve further to cope with changing storage retention requirements. Video storage is quickly becoming one of the most expensive parts in a surveillance solution, but there is hope. Deploying an active archive solution will enable surveillance users to reduce the complexity and costs of managing from terabytes to petabytes of data for long term retention. By finding a storage solution that delivers the ability to implement a tiered storage strategy, users can adhere to regulation requirements to retain video footage and meet their safety and security objectives, while also significantly reducing storage costs and operational expenses.
From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs And Autonomous Systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies being used for security and safety benefits is progressing at a rapid pace. Let’s look at some of the exhibitors in the 2019 Unmanned Security Expo: Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations. Indoor environments, which are confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response Compact Surveillance Radar (CSR) System SpotterRF provides the world’s most advanced compact surveillance radar (CSR) system for affordable wide-area, all-weather perimeter security and small force protection. Incorporated in 2009, the company attained profitability quickly and is ahead of forecasts. Dedrone has remained at the front of the issue of drone threats, integrating installations to military bases, stadiums, public events, and private individuals. The company has expanded its operations to include a new office in Washington, D.C, and has continued to upgrade its DroneTracker software. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. Airspace Security And Drone Tracker Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider. Founded in 2007 in Israel, Magos first specialized in advanced radar solutions for the military and defense markets. In 2015, Magos’ technology was declassified, allowing the company to focus on developing best-in-class systems for the commercial security market. Today, Magos radars are used in over 30 countries in critical infrastructure, data centers, electric utility sub stations, and oil refineries as well as in other commercial verticals like vineyards and car lots. Now, Magos is positioned to see increased adoption of its solutions in the U.S. Patriot One Technologies Inc. develops solutions to detect concealed weapons, utilizing novel radar technologies. Their innovative radar technology provides first responders and security personnel valuable time in active threat scenarios. The technology offers stand-off detection of concealed threats typically employed in public locations. These are just a few of the exhibitors in the Unmanned Security Expo. They represent technologies that will help to shape the future of the security marketplace.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow drones to fly autonomously, using global positioning systems (GPS), vision sensors and algorithms to constantly analyze what the drone “sees” through an on-board camera. The system can work with any camera that provides an adequate image for real-time vision algorithms. Perimeter Security At ASIS Tyco Integrated Security invited Percepto to display its technology in the large integrator’s booth at ASIS. “It was the first show where we targeted perimeter security,” says Ariel Avitan, Percepto’s Chief Commercial Officer. “Tyco took us under their wing. We had about 100 conversations at the show. After about 10 minutes everyone understands the business logic behind the solution. You have to talk to the end users to understand that your concept is validated.” Percepto is in the contractingphase with TycoIS and alsohas a number of other pilotprojects, including energycompanies in Europe TycoIS is also working with Percepto on several pilot projects to demonstrate and fine-tune the technology. Percepto is in the contracting phase with TycoIS and also has a number of other pilot projects, including energy companies in Europe. “Our challenge is robustness,” says Avitan. “The technology is trustworthy. We just need to make sure the system is. And the industry needs to identify applications where we can provide more value.” Autonomous Drone Performance Percepto’s products include a hardware base station to control the drones, and the PerceptoCore module is installed on board the drone to allow it to interface with the base station. The core is pre-loaded with multiple task applications that enable the drone to perform tasks relevant to its purpose – autonomously. The “core” can be installed on almost any size or type of drone, whatever the manufacturer. In addition, Percepto provides an interface that integrates with existing systems in the security department’s control room. Cloud management software enables remote access and management of multiple drones. The software collects, analyses and presents data, while streaming live video on an ongoing basis. Perimeter security is just one application where drones will be deployed in the near future. Having a drone stationed on-site, charged and protected by its hub, enables fast reaction to any need in the field, day or night. Additional sensors and other equipment can be added to drones to detect gas leaks, thermal energy, or smoke, and even to provide life safety capabilities. Lighted drones with voice messaging could be used to direct employees or the public to the best exit route in case of a mass evacuation. 24/7 Perimeter Security Using drones to patrol 24/7 addresses the needs of perimeter security. Adding more sensors and providing additional data to operators helps expand the system’s utility and increase return on investment (ROI), says Avitan. “These applications are a tremendous benefit for security,” he says. “We actually find that adding safety and inspection applications is a good way to increase security. When you have a drone that knows how to provide ROI, it saves tons of money. It’s always about security, but above that we want to add value and increase ROI.” In addition to perimetersecurity, drones will soonbe used to inspect thethousands of solar panelsat solar energy sites In addition to perimeter security, drones will soon be used to inspect the thousands of solar panels at solar energy sites. Drones with cameras can detect the presence of dust or other factors that lower solar-panel efficiency, or cracks or malfunction of the actual panels. Thermal imaging on board a drone can detect which panels are under-performing. Drones could also be used to provide alerts if a transformer or cabling overheats in a power plant or critical infrastructure application. Restrictions On Drones The U.S. Federal Aviation Commission is evolving its position on autonomous drones. Drones are restricted from populated areas, can only fly at certain altitudes, and must be equipped with lights if flying at night. Currently, applications require that there be an unmanned autonomous vehicle (UAV) pilot on site, maintaining “line of sight” with the drone, who can take control if needed. However, the requirement for the UAV license has been lowered to allow certification with an online course. There have also been some exemptions granted for the line-of-sight requirement (e.g., railroad inspections). “We include control mechanisms now to be compliant, and when the barriers come down, we are ready for that,” says Avitan. Many global jurisdictions are following the FAA’s lead, although some countries do not regulate drone traffic. Avitan says he expects regulators to allow drones to fly autonomously beyond line of sight in specific closed facilities in the next 12 months. Based on the pilot projects, Percepto will fine-tune the system, streamline manufacturing and launch a fully commercialized system by Q1 2017. Avitan expects to have up to 100 units deployed in 2017, and up to 1,000 units deployed in the next 18 to 24 months. Like I said: Sooner than you think.
For one installer, Hikvision’s range of Turbo HD PIR-equipped cameras has had a dramatic impact on his business, allowing him to more efficiently monitor and secure construction sites and other valuable locations during vulnerable out of hours periods. Paul Hookings, Managing Director of Hampshire-based security installation firm Forward Securities, had a problem. His company had built a solid reputation for, amongst a variety of other services, securing building sites, notably the important materials and equipment left overnight and unattended in the site compound. Building site compounds, Hookings explains, can include any number of super-valuable and enticing materials for potential thieves. “Diesel, copper, tools, cabling, right down to bricks, breeze blocks, agricultural fuel, road diesel, even the metal gates,” he says. “Thousands and thousands of pounds worth of stuff is stored there overnight.” Forward Securities would use traditional PIRs – passive infrared detectors – to raise an alert Intrusion detection To monitor these compounds for intruders, Forward Securities would use traditional PIRs – passive infrared detectors – to raise an alert when the compound perimeter was breached. The problem had to do with the PIRs, Hookings explains. “On critical sites like these, where there’s a lot of activity during working hours, people are able to move those PIRs in the daytime when they’re off,” he says. “And come night-time, they’re then able to return and rob the place without being picked up by the detectors, and then move the PIR back to where it was previously. Then it’s down to the security company, who end up scratching their heads, thinking: why didn’t that go off?” Passive infrared detectors As a result, Hookings was on the lookout for a solution, something which would counter that potential for tampering and provide a more effective deterrent to potential thieves. Then he noticed that Hikvision had released a new range of Turbo HD PIR cameras. “These are lovely little products,” Hookings said. “When Hikvision brought them out, I binned our separate PIRs. With a PIR camera, during the armed period, if someone moves into its field of view, there’s an alarm. If someone covers it up, it goes into alarm. If someone moves it into another direction, it goes into alarm. So I’ve binned the products we were using previously and now I exclusively use Hikvision.” Turbo HD PIR cameras The Turbo HD PIR camera range uses advanced video surveillance technologies to improve alarm accuracy and prevent intrusions. Video verification of alarms means a rapid response from a manned guarding service can be achieved. The camera’s built-in PIR detector captures infrared light given off by human bodies and distinguishes it from other visual ‘noise’. It can be ‘double knocked’ with Hikvision’s Turbo HD K series DVR’s motion detection to reduce false alarms caused by moving targets without human body IR emission. This way, filtering false alarms reduces storage space and costs, and it also means more efficient post-event footage search. Supplemental lighting The camera also produces a flashing white strobe light that serves as a warning signal to stop intruders The camera also produces a flashing white strobe light that serves as a warning signal to stop intruders. And the white light serves as supplemental lighting, enabling the camera to capture clear images of suspects as evidence when the alarm is triggered, even in extremely dark environments – such as the construction site compounds. “When we have an alarm triggered on one of our sites, we basically get a guaranteed guarding response,” Hookings says. “Because the combination of PIR detection and video serves as proof that the assailants are there. It’s a confirmed signal going to the monitoring station, and as a result we always get people apprehended.” PIRL bullet cameras The model Forward Securities prefers to use is the DS-2CE12H0T-PIRL, a 5MP bullet PIR bullet camera referred to as the ‘PIRL’. They offer 2560 x 1944 pixel resolution, smart infrared illumination up to 20m, and Hikvision’s own ‘up the coax’ technology, which allows cameras to be controlled over a coaxial cable from the DVR and also to transmit the alarm signal to DVR. They’re also IP67-rated for external use, so they’re tough and suitable for the sorts of environments, like construction sites, where they’re most needed. As an example of how he uses the Hikvision PIRL cameras, Hookings points to the example of one specific construction site currently being protected by Forward Securities. Hikvision 4K cameras and hybrid DVRs We use six PIRL cameras, as well as additional 4K Hikvision cameras running analytics and thermal cameras" “We’re securing the main compound, along with any remote sites,” he says. “We use six PIRL cameras, as well as additional 4K Hikvision cameras running analytics and thermal cameras, and they all sit on the same server, recording to a Hikvision Hybrid DVR, with alarms and images sent to our monitoring station.” Other site setups can include an audio warning system, particularly for very high value equipment. “That’s another place we’d use a PIRL,” Hookings says. “If someone, out of hours, walks up or even climbs the fence of the compound, the monitoring station is alerted to that by the PIRL camera, and they can immediately broadcast an audio warning, real time and live. That’s transmitted through the Hikvision DVR, to an amplifier and speakers.” Crime prevention and effective video surveillance “If the intruders persist despite the warning, we then get a guarding response. It’s not just big construction sites where the Turbo HD PIR cameras are effective, I do use them on other high value projects as well.” “Ultimately, the Turbo HD PIRL cameras are incredibly effective,” Hookings says. “They pick up suspicious activity, including thefts and attempted thefts, three to four times a week across all of our sites. That means they’re actively helping to prevent the thefts of materials worth hundreds of thousands, sometimes millions of pounds.”
Video surveillance is used for more than just safety and security: users are discovering that high-resolution images and user-friendly features make surveillance cameras a valuable asset for all sorts of applications. A cattle ranch in Manatee County, Florida found that a Dahua PTZ was the perfect way to observe eagles without disturbing their habitat. Dahua PTZ Cameras When Hurricane Irma pummeled Florida in 2017, Victoria and Nicholas, a pair of American bald eagles, watched their nest get destroyed. Undeterred, they began building a new nest in a tree right next to the old one. The ranchers on whose property the eagles lived were so inspired by this show of dedication that they decided to install cameras nearby to share the eagles’ story with the world. They reached out to Jens Buff, security consultant with Rapid Security Solutions, for support, and he contacted Dahua. Dahua donated a 4MP 30x IP PTZ, which was mounted to a tree in order to observe the nest up close. Dahua donated a 4MP 30x IP PTZ, which was mounted to a tree in order to observe the nest up close But disaster struck yet again! In 2018 “an unnamed storm, unexpected and unseasonable, blew through our area with pounding rain and ferocious winds,” stated the Eagle Country YouTube page. “Sadly, the eagles’ nest was blown to the ground in pieces again! We wondered if they would relocate, but this was Nicholas and Victoria. The very next day they began to rebuild. The cameras we placed after Irma were not destroyed and we are able to watch this incredible story continue.” Smart IR And Day/Night Surveillance Dozens of YouTube videos, as well as a live feed, give viewers a rare glimpse into the day-to-day lives of these majestic birds. Whether they’re incubating eggs, eating dinner, cleaning house, or fending off intruders, their activities are captured in clear video both day and night. The camera’s true day/night IR cut filter and Smart IR allow for crisp nighttime images without “whitening out” as the eagles get close to the camera. True WDR preserves the image in the direct sunlight that’s unavoidable at the top of a tree in the Sunshine State. The easy-to-use PTZ features let the ranchers follow the eagle’s actions without bothering them by manually repositioning the camera. “Dahua’s PTZ was the perfect choice to view one of life’s most beautiful creations living in nature,” Mr. Buff remarked.
Kunsthalle Mannheim is a museum in Germany which contains a major collection of important art. Reliable technology, integrated in a networked solution from Bosch, ensures all-round protection on a total of 3,600 square meters of exhibition and storage space. A special focus of this is optimally safeguarding people and property without interfering with visitors’ encounters with priceless works of art. Customized Security Solution And Integration Since its inauguration in 1909 over a century ago, Kunsthalle Mannheim has acquired a global reputation as a very special place to experience modern art. The complex comprises a building in Art Nouveau style dating from 1907, underground storage rooms, a main building, and the newer Hector Building, completed in 2018. Coinciding with the opening of the Hector Building, a customized security solution installed and integrated by Bosch experts also debuted. The system’s components are almost invisibly connected with the various exhibition areas. The modular alarm system UGM 2040 and around 260 state-of-the-art video cameras monitor the interiors of Kunsthalle Mannheim as well as the open areas around. Fire Protection All of the security equipment is controlled by the Building Integration System from Bosch Comprehensive fire protection is provided by a fire alarm system spanning 700 detection points. There are 330 speakers in case it should ever be necessary to evacuate visitors and employees. All of the security equipment is controlled by the Building Integration System from Bosch. Modular Alarm System Thanks to this new solution, Kunsthalle Mannheim is facing the future with confidence. The modularity of the alarm system UGM 2040 allows fast, cost-effective implementation of modifications and extensions. Professional service technicians from Bosch regularly maintain it and perform any required repairs to ensure highly reliable operation and low overhead.
Dundee’s rejuvenated waterfront has breathed new life into the city, and not far from the new V&A Museum building is Foxlake Dundee, an exciting new water sports facility. Taking advantage of the regenerated docks area, Foxlake Dundee offers cable wakeboarding – where boarders are propelled by an electric cable rather than a boat – paddle boarding and Scotland’s first urban Aqua Park. Hikvision Thermal Video Solution Foxlake Dundee was the second Foxlake water park to open, following the very successful adventure park in Dunbar, East Lothian, on the Scottish coast. The Dundee facility, which opened fully in summer 2018, includes a large floating assault course, which has proven hugely popular with visitors, featuring huge obstacles, slides and rafts, and a giant 3.5m inflatable tower known as ‘the Mountain’. Unfortunately, due to its city center location, the assault course and the wider facility was likely to be something of a magnet for unauthorized activity, primarily of the inebriated variety, explains Zak Hegarty, Foxlake Dundee’s manager. “Because of our location, right in the heart of Dundee city center, we’re quite near a lot of pubs,” Hegarty adds. “And sometimes a 3.5m floating inflatable tower looks pretty inviting to someone with a quantity of ale in their system – it looks like an irresistible challenge.” Remote HD CCTV MonitoringI introduced myself as I saw they were opening and was invited initially to look at a CCTV system" The concern was that accidental or deliberate damage or vandalism to the equipment was a real risk – and along with that came the danger of injury or worse to those attempting to exploit the park, at night, in the dark, unsupervised on the water. Hegarty’s first instinct was to investigate the option of manned guarding: having a security officer on-site during those out of hours periods overnight when the facility was at its most vulnerable. But an approach from Brian Davidson of Webster Security & Fire was to change his mind. Davidson had noticed the development in the docklands with interest. He approached Hegarty to see if Webster Security & Fire might be able to help with securing the site. “I introduced myself as I saw they were opening and was invited initially to look at a CCTV system,” Davidson says. “This then blossomed during further conversations into a proactive, remotely monitored CCTV solution. They were looking at going down the route of employing manned guarding for when the site was closed, but we thought this would provide a cost-effective and workable solution that offered the same level of protection.” GJD Motion Detectors The challenges presented by the Foxlake Dundee site were not insignificant. The system needed to be remotely monitored and based on some form of movement detection – on a site which itself was constantly moving, due to the changing tidal water levels. Davidson and Webster Security & Fire got in touch with Hikvision in Scotland and together they designed a solution to meet all of Foxlake’s needs. The centerpiece of the system proposed by Davidson and Webster Security & Fire was the use of Hikvision thermal cameras to detect activity on the jetties. This is complemented by the use of GJD motion detectors and Hikvision cameras to pick up movement on approach areas, further Hikvision cameras which monitor the internal office reception areas, and additional Hikvision cameras providing a security, health and safety and management overview of the both the assault course and the paddle and wakeboarding facility areas. A public address tannoy system is also connected to the surveillance solution. Hikvision Thermal Bullet Cameras The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view – so a human body is always visible as hotter than its surroundings, particularly in a marine or waterfront environment. Hikvision’s thermal cameras also utilize behavior analysis technology, so figures moving into specific zones in the image can automatically generate alarms. The advantage of thermal cameras for a water-based site like Foxlake is that they can operate in all weather conditions – they’re not impeded by fog, mist, heavy rain, snow or other environmental factors, the sorts of conditions which could severely impede even the most advanced of conventional cameras. Hikvision 8-Channel DeepinMind NVRs The other cameras in the Foxlake Dundee system benefit from Hikvision’s Darkfighter technology, allowing for video monitoring and recording in even the lowest of light conditions. And the whole solution records to a Hikvision 8-channel DeepinMind network video recorder, which utilizes powerful AI technology to learn to filter out false alarms and accurately raise alerts. In the evening, after normal operating hours, the site is locked up and alarms are set. It’s then remotely monitored by the Corps of Commissioners, who are alerted when the thermal cameras or motion detectors pick up any movement on the site. Operators check the live cameras to confirm that intrusion has occurred. If an intruder is detected, they immediately contact Foxlake management via phone, and are also able to contact police if required. At the same time, the Corps operatives can use the PA system to issue warning announcements to allow the intruders to know they are being monitored. The effect is almost instantaneous, Hegarty says. Enhanced Intrusion Detection The overall reception for the video surveillance solution has been extremely positive “We’ve had three incidents since the system was installed,” he says, “and the response by the intruders is pretty remarkable. I’ve reviewed the footage and compared it to the time notification I’ve received a missed call on my phone: you can see the intruder on the video footage hear the warning, and then they’re off. They just leave straight away. It’s amazingly effective.” The overall reception for the video surveillance solution has been extremely positive. “We’re really happy with the system,” Hegarty says. “The video footage quality is very high and we’re glad we haven’t had to go down the manned guarding route, as similar facilities have done. We appreciate that Webster and Hikvision took the time and thought to design something that would work for us in our specific circumstances. Of course, the proof is in the performance, and the fact that a number of intruders have been quickly and effectively warned away is evidence that it is doing the job it was designed for.”
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner has announced that the Kentucky School Boards Association (KSBA) is delighted with their recently-upgraded 3xLOGIC video surveillance system, installed and monitored by Sonitrol of Lexington. 3xLOGIC - Sonitrol Collaboration The Kentucky School Boards Association was established in 1936 and represents 863 school board members from across the state to provide training, services, and collegiality to aid in the effort of providing the best education possible for public school students across Kentucky. KSBA is a long-time Sonitrol of Lexington customer, going on 25 years. Hence, Sonitrol and Danny Goodpaster, Security Consultant, were well positioned to understand KSBA’s situation and recommend the solution best suited for their needs. “About three years ago, during the budgeting process, we had an incident in our parking lot in which there was a minor fender bender,” related Jeff Million, Print Shop and Operations Manager for KSBA. “The camera watching the parking lot was only 30 feet away, but I could not even make out identifying writing on the car that struck the other car. On another occasion, we had a break-in and from three feet away I could not make a positive ID on the perpetrator. After these incidents, things got rolling and we soon embarked on upgrading our video surveillance capabilities.” Full HD IP Video Surveillance Solution The multi-sensor device is a camera with a unique set of capabilities, it is also equipped with impact-activated audio, glass break, and motion detectionGoodpaster wrote the first upgrade proposal in 2016. After some discussion about installing a hybrid DVR, KSBA at Goodpaster’s urging decided to remove the analog cameras and go full IP. Now, the organization has four static cameras and two 3xLOGIC multi-sensor devices, trained on the front door and the back door, loading dock, and parking lot. The multi-sensor device is a camera with a unique set of capabilities, it is also equipped with impact-activated audio, glass break, and motion detection along with video and audio verification of alarm activations. The multi-sensors are connected to an updated Sonitrol panel and they provide video feeds, as well as glass break and audio verification for both entrances. “With our former system, I’d get the first call on alarm, but often I did not have enough video information to make an informed decision. Now, I have the data and the images I need to deal quickly with any situation,” said Million. Goodpaster recalled that there was a lot of competition for this business—'KSBA really did their homework.’ At the end of the day, it was the multi-sensor’s video and audio verification that provided KSBA with real, tangible benefits they could feel. Further, between the Sonitrol app and VIGIL Client software installed on Million’s laptop, KSBA now has a fully-integrated solution, as opposed to the two separate systems they had before. The four non-monitored cameras are overseen by 3xLOGIC VIGIL Central Management software (VCM), so if any equipment issues arise, Sonitrol knows immediately and can act to proactively solve them. Multi-Sensor Devices The new cameras also provide a better field of view, I’m picking up my entire parking lot, before I could only see half of it"As noted earlier, the Multi-sensor devices monitor the front and back entrances, as well as the parking lot. The other four 3xLOGIC cameras are trained on the front door reception area and down the hallways away from the front and back entrances, to provide visibility on where any visitor or employee is going. These cameras are viewed live and used for incident review. The receptionist at the front desk has a dual screen that shows her the approach to the building and who is coming through the door before that person reaches her desk—this creates full situational awareness and keeps the receptionist safe. “We really do like our new cameras, and we are light years ahead of where we were as far as quality and ease of use with the 3xLOGIC system,” said Million. “We now have video verification capabilities. Before I’d get a phone call, while away from the office, providing video images but I couldn’t make anything out. I’d have to head home to view the video and I still didn’t have sufficient resolution to make out what was happening. The new cameras also provide a better field of view, I’m picking up my entire parking lot, before I could only see half of it.” IP HD Cameras Million continued, “Recently, we had a forced entry attempt on the front door, and we went to the video. We could immediately resolve what had happened—that’s real peace of mind. We have to make quick decisions, and in the event of a real incident, we’re shaving at least 10 minutes off of police response times. Million can view all six cameras on his mobile app. We don’t want to call on false alarms, we want to make certain. Now we can and the video quality is about 10 times better.”
Located southeast of Los Angeles, California, the City of Whittier hosts a water pumping utility installation that provides water to the businesses and residents of the surrounding Gateway Cities Region. In recent years, the installation routinely suffered attacks by vandals and looters, resulting in regular defacement with graffiti and the theft of copper components from pumping stations. This caused interruptions in service to businesses and residents across the surrounding cities. To ensure the security of the water installation and avoid public health and safety concerns, the City of Whittier turned to a virtual guarding solution from iNet Security LLC. iNet Security leveraged comprehensive monitoring from the Surveillance Acquisition Response Center (SARC), powered in part by IDIS technology, for a high-performance video surveillance solution that has already shown powerful results. Enhancing Multi-Site Security And Safety The City of Whittier turned to a virtual guarding solution from iNet Security LLC With the health and safety of the City of Whittier and its surrounding region potentially at risk, it was essential that any security solution deployed by the city be dependable, effective, and capable of low-maintenance 24/7 monitoring. The system also required ease of remote use as the installation is located in a remote wildlife preservation area far from the city center. Any surveillance solution had to: Secure multiple locations within a remote wilderness location Manage authorized access to installation premises Maximize security of the installation with encryption speeds capable of constant live monitoring Provide compatibility and integrate seamlessly with SARC virtual guarding systems Enable the coordination of live responses to security events Feature intuitive software that is easy for users to operate and master. Representatives of the City of Whittier reviewed systems from several manufacturers before they determined that the virtual guarding solution from iNet Security, powered in part by IDIS, would best meet their requirements. DirectCX Technology And Center VMS The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology SARC and the City of Whittier leveraged technology from the high-performance and cost-effective IDIS DirectCX solution and IDIS Center video management software (VMS) to meet their remote monitoring needs. The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology. IDIS incorporated its expertize in image processing to provide unrivaled HD recording performance at an affordable price point for the responsibly cost-conscious City of Whittier. Designed for simplicity, convenience, and performance, the DirectCX technology and the powerful, full-featured IDIS Center VMS incorporated by iNet Security have proved to be optimal components of the comprehensive solution, meeting the challenges faced by the City of Whittier. IDIS HD-TVI DVR The most powerful IDIS HD-TVI DVR, the TR-4116 16 Channel Full HD Recorder, offers: Support for HD-TVI, 960H, and analog cameras Up to 480ips Full HD recording Full HD display with HDMI and VGA output Support for CVBS spot monitor Long distance transmission over coaxial cable Support for HD-TVI camera OSD control over coaxial cable Expansion up to 32TB using 4 SATA interfaces and 1 eSATA storage interface One click network configuration using IDIS For Every Network (FEN) service Dependable Security Environment IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations In partnership with iNet Security and SARC, IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations. Within the first week of installation, a group of vandals was caught attempting to fault the installation fence and was successfully deterred remotely using SARC’s remote “voice-down” protocol. In a dramatic security and safety success, the system was used to coordinate a fast and effective response to two isolated fires as well as a dangerous wildfire that threatened both the utility and surrounding wildlife. SARC operatives utilized IDIS technology, in part, to accurately and quickly guide first-responders through the remote wilderness to the site of the fires, minimizing damage and risk to the surrounding areas. Thanks to the power and performance provided by the iNet Security solution, including IDIS DirectCX technology, the City of Whittier is benefiting from: Low total cost of ownership Unparalleled ease of use through the IDIS Center VMS Complete dependability of system components Lower system maintenance requirements A scalable solution to allow for expansion to additional installation sites
Round table discussion
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
Once again, ISC West has come and gone. The show continues to please exhibitors and attendees. Reviews are generally glowing and enthusiastic. For all its successes, however, there is a certain repetition from year to year – a lot of the same players, the same technology trends (not to mention the same venue every year, but who doesn’t like Vegas?) But even among the repetition, there is usually at least one element that is surprising. Perhaps it’s the unexpected elements that keep us all coming back. We asked this week’s Expert Panel Roundtable: What surprised you most at ISC West in 2017?