Remote video surveillance
Dahua Technology, a globally renowned video-centric smart IoT solutions and services provider, has announced the release of DMSS, its newly designed mobile client. DMSS can connect Dahua products via the Internet or Ethernet through P2P or IP, and can also be operated remotely. It supports all kinds of product types, including NVR, XVR, IPC, TPC, VTO, Alarm Hub, and Access Control, etc. Remote operations DMSS can work in an environment with multiple internet connections. It connects Dahua prod...
A series of free interactive webinars is launched by 2N – global provider in Internet-enabled intercoms and access control systems. 2N On Air aims to help owners of residential and commercial property, architects, designers, security firms and building managers to identify and apply touchless technology which protects buildings and their occupants. The webinar series, beginning on 11 June, will profile the latest products for door controls in residential and commercial property. It will a...
Transit agencies have traditionally relied on multiple single-purpose proprietary systems that don't interconnect. To help security, IT, operations and vehicle maintenance staff work together, Genetec Inc. (“Genetec”), a technology provider of unified security, public safety, operations, and business intelligence solutions, announced a portfolio of solutions designed to help transit organizations unify their security and operations from a single intuitive interface. The Genete...
Rhombus Systems, a cloud physical security platform, announces a strategic partnership with global real estate investment management company CA Ventures, through which Rhombus Systems will provide CA with a video security platform for multifamily and student housing communities. The platform will be capable of supporting an unlimited number of cameras and locations from one console – fully accessible from any web browser or mobile device. “The real estate sector has been going...
Maxxess Systems, a global renowned provider of event response management and collaboration systems, is pleased to announce their partnership with Seek Thermal, an advanced imaging technology company, to deliver a complete temperature screening solution to help manage health risks. Temperature screening solution Unlike stand-alone systems for temperature screening, this new complete solution helps organizations not only detect health risks in real time, but also to trigger immediate automated s...
Swann, a globally renowned provider of do-it-yourself security solutions, has announced the release of the Swann Tracker security camera as well as the Swann Enforcer camera systems in 4K resolution, a perfect indoor and outdoor security solution for any home or business. The 1080p resolution Enforcer cameras are coming soon. Swann Tracker security camera The Swann Tracker security camera was first unveiled at the Consumer Electronics Show (CES) 2020 earlier this year and was named a CES 2020...
Video surveillance technologies continue to evolve. Salient Systems looks at some of the fastest-growing areas in this sphere, including AI-based video analytics and cloud-based video access and recording. Market awareness will continue to drive interest, which will, in turn, drive available solutions and offerings in 2020 and beyond. Another trend to watch out for is more VMS interfaces offering greater access-to and control-of analytics information and access control systems. This relates to the ongoing trend of consumers moving towards unified video/access/analytics solutions. Consumers will benefit in the coming years from simplified offsite access, automated analysis of security events, and better presentation and reporting of security information. Cloud-based AI Analytics The number of video analytics companies that have come into being over the past three years is tremendous The number of video analytics companies that have come into being over the past three years is tremendous. The growth has accelerated over that time due in great part to the popularity of GPU hardware for applications beyond video games or CAD/ CAM, such as deep learning, computer vision and AI. However, with more sophisticated analytics come significant processing requirements and high server hardware costs. This high hardware cost puts analytics out of reach to most video surveillance consumers. Depending on the analytic being used, how many cameras are analyzed, camera resolution, etc., the upfront hardware cost of a deployment designed for processing under a dozen cameras could easily exceed US$ 10,000. As a result, more analytics companies this year have begun offering cloud-based AI analytics. Video analytics and cloud The premise is simple, instead of deploying hardware onsite for processing the analytics, video is streamed to the cloud, where servers with the analytics software are hosted. The analytics software is configured to provide alerts when detection occurs. Upfront hardware costs are replaced with ongoing monthly fees, making the acquisition cost of the technology much more affordable. The downside of this model includes lower scalability and higher ongoing costs. Scalability Scalability is limited by the consumer’s internet connection speed, due to the need to upload video to the cloud for processing. This is not likely to limit adoption for many consumers, because it is not uncommon for only a subset of cameras at a site to require analytics processing. In the event a high number of cameras need to be analyzed, many cloud-based analytic solutions can process video at a lower resolution and/or frame rate while still achieving accurate detection. Unified GUIs from VMS platforms Several prominent security product manufacturers have been moving toward providing unified solutions Several prominent security product manufacturers have been moving toward providing unified solutions, as opposed to focusing on a single product area to develop a “best of breed” offering. This move is driving a shift in thinking with consumers, putting more emphasis towards deeper integration of complementary security technologies, and a corresponding need to easily associate security data. As such, consumers want access to all the information in a single interface, which allows for the association of complementary security data. As an example, if a cardholder presents an access control credential to enter an area, the access control system would show the name of the individual associated with the credential that had unlocked the door. Ensuring authorized access The video system would display the person walking through the door. If the live video and the access control records are presented together in the same interface, a security officer would be able to see the person who walked through the door was not the person associated with the access credential. Traditionally, most integrations occur between video and access control systems. Users would view the integrated video and access data in the access control system interface. Technologies such as point-of-sale integration, license plate recognition and video analytics have become more widely used over the past several years. Moving towards single unified interface Data from those technologies are best presented within the video surveillance system, and as such, it makes sense for video management platforms to move towards becoming a unified interface. Several VMS providers have already taken steps in this direction. Either data from a complementary security system can be presented alongside video and other data directly, or add-on components for LPR, Analytics, and the like are purchasable options from such vendors. Hybrid cloud VMS functionality Interest in cloud-based video surveillance deployments continues to grow Interest in cloud-based video surveillance deployments continues to grow. Market awareness and education is high, due in great part to the growing number of available solutions, including those from mainstream VMS Platform providers. However, full Cloud VMS deployments in the professional market are not yet widely utilized as a result of high bandwidth costs, which limit scalability. Bandwidth costs disproportionally affect mid-sized to enterprise-scale consumers, as a result of those consumers having more cameras and therefore requiring more bandwidth. Even so, benefits such as simplified remote access, which is discussed below, and the ability to scale video retention without adding on-premise storage may drive hybrid cloud features in traditional VMS platforms. Video retention and cloud archiving Traditional deployments utilize on-premise servers with fixed amounts of storage. This traditional model lacks flexibility many users seek. As an organization’s requirements evolve, their video retention requirements may also change. A cloud-archiving service built into a VMS would allow the VMS user to leverage cloud storage for long-term archiving on selected cameras. This capability would remove the need to add additional on-premise storage as retention requirements change. Cloud storage Using cloud storage would allow the user to extend their storage capacity at any time, by simply making configuration changes in the VMS that would correspond to a monthly fee for cloud storage. Another cloud feature that would benefit users of traditional VMS systems is simplified remote access. Users of traditional VMS deployments can set up remote access via the internet using a VPN connection Users of traditional VMS deployments can set up remote access via the internet using a VPN connection or by making the VMS server available via port forwarding on an internet-connected router. Those configurations may involve additional cost, configuration complexity or security risks. VMS-supporting, cloud-based video sharing A VMS-supporting, cloud-based video sharing may allow an administrator to configure remote access by simply checking a few boxes during configuration, causing the VMS to connect securely to a cloud-based server where users can log-in to view selected cameras. This setup removes the need for complex configuration, which would need to be maintained every time there are network changes affecting the VMS servers. Staying ahead of the curve Keeping an eye out for new technologies allows system designers and consumers to identify those which may provide a cost benefit or strategic advantage. With cloud offerings becoming more and more mainstream, new uses for cloud architecture are coming to light in video surveillance. Finally, with technology integrations and video management interface development growing more sophisticated with every passing day, live monitoring practices and security operations center design may be affected in the coming years.
With the introduction of the much publicised 5G networks, alongside the evolution of live chat facilities impacting on the way people stay connected, there is extra pressure to deliver on extra speed and bandwidth, faster operating and more powerful mobiles to enable apps to work much harder and video to become the cornerstone of security. CSL and Amthal, who have worked in partnership for 15 years, are operating together for customers to ensure the safe delivery of advanced routers, alarms and data embracing all available signaling technologies. Remote monitoring services through mobile technology Says Dave Willetts, CSL Head of Key Accounts: “Technology and the way we connect is evolving faster than ever and understanding the key trends, whilestaying at the forefront of its impact on system design, is critical to all our success, especially in the fire and security sector." “Working closely and building relationships with customers such as Amthal is vital. And this is not in a supply chain, but in true partnership. We have both seen significant business growth, operating through some extraordinary circumstances, not least the current pandemic. Through delivering on tailored customer requirements, we can continue to upgrade systems to ensure connectivity standards remain high.” Amthal operates with CSL to ensure connectivity for key CCTV and alarm signaling, allowing for remote upgrade and maintenance of installed products and services. The fire and security specialist is now looking to upgrade with CSL to adopt more live functionality that allows remote monitoring services through smart mobile app technology. Greater intelligence and faster response systems Jamie Allam, CEO Amthal Fire and Security adds: “For fire and security, we are just on the cusp of seeing the potential of technological advancements and ability to create greater intelligence, faster response systems, visual insights and dedicated data." “And while the lockdown period has halted many sector operations, as critical workers, it is our duty to continue our operations to keep buildings safe and secure. By working closely with trusted partners as CSL Group, we can bring these ideals together and ensure more powerful devices can be connected to one another, maintained and monitored remotely and efficiently for the benefit of customers across the UK.” Intruder, Fire, Access and CCTV systems Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
Arcules, innovators in integrated video and access control cloud services, has announced a strategic partnership with RAS Watch to deliver a fully managed and outsourced global security operations center (GSOC) solution. The jointly developed Rapid Deployment Kit incorporates the Arcules cloud video management system and Axis Communications IP cameras, as well as remote monitoring, alert verification and system health monitoring from RAS Watch. During the outbreak of COVID-19, businesses are looking for solutions that help them monitor and protect their physical assets against security threats as their employees leave their things behind and work from home for the unforeseeable future. With Arcules’ secure cloud-based video surveillance service and RAS Watch’s fully managed and outsourced GSOC, business and security leaders can quickly, efficiently and cost-effectively secure assets. Short-term contracts are available immediately to help organizations navigate through the COVID-19 crisis. Alarms systems via video camera technology “Over the past few weeks, we’ve seen a majority of jurisdictions issue stay-at-home orders. These directives are necessary to limit the spread of the virus, but they are leading to theft or other problems at recently vacant buildings,” said Ryan Schonfeld, CEO and Founder, RAS Watch. “We knew we needed to come up with a solution that is cost-effective and easy to deploy and offers businesses the kind of protection they need to ensure their facilities are safe.” The Arcules and RAS Watch partnership allows for rapid deployment of both video camera technology and remote setup through the intuitive, easy-to-use Arcules cloud video surveillance interface. The Arcules service enables users to remotely manage views across all of a company’s locations, organize user and group permissions, check the status of cameras, set up alarms and notifications, and view security and business analytics. RAS Watch’s managed GSOC empowers remote response and oversight, as well as system health monitoring for security infrastructure, including video surveillance cameras, access control readers, switches and other infrastructure necessary to ensure system functionality. With RAS Watch’s tools and proven analytic methods, security is transformed from a typically reactive environment into a proactive strategy that delivers the information and guidance necessary to mitigate risks before they happen. Security and safety with cost-effective solutions “Arcules is excited to partner with RAS Watch on this Rapid Deployment Kit that enables clients to quickly establish security and remote monitoring for their sites,” said Nigel Waterton, CRO, Arcules. “The time to provide clients with quick and cost-effective options to increase security and safety is now, and both Arcules and RAS Watch are dedicated to providing services that ease complexity, reduce additional infrastructure costs and minimize the requirements for smart, effective security monitoring.”
Video surveillance company Ocucon launches a new technology that cleverly monitors the number of people going in and out of a store, automatically shutting the entrance when the occupancy threshold is met. Occupi by Ocucon is a response to a growing need for controlled entry to retail stores during the COVID-19 pandemic. Social distancing has meant many retailers are spending thousands of pounds a week per store on extra security personnel to manage store entrances and exits. Occupi by Ocucon presents an opportunity for retailers to save millions of pounds per year and provides a return on investment that can be achieved within weeks. Deep learning technology The technology works on an automated traffic light system. Managers can set a maximum number of customers in their store, and when that is met, the traffic light system, visible to customers, at the entrance will turn red and the automatic doors will not open. Using Deep Learning technology to identify people and count them entering and exiting the store, the system allows for a fully-automated, unmanned control over the store occupancy level. Ocucon are providing a ‘Rapid Deployment’ solution that will be easy to install and configure. Occupi is controlled through a remote connection via the cloud, which allows individual store managers to change the occupancy level at any time, to respond to events on site and control the flow of customers. Signage will be provided to inform customers of the store and make them aware of how the system works. Guided installation process Our guided installation process means that Occupi will be remotely configured, monitored and controlled" Gary Trotter, Co-Founder of Ocucon, says, “I am thrilled to bring a truly innovative and beneficial product like Occupi by Ocucon to the market during this difficult time. We know that the crowd control measures in place in stores around the country will not go away any time soon, so this newly developed technology will help both customers and staff stay safe by adhering to social distancing guidelines, as well as helping save retailers millions of pounds for years to come.” “It is our goal to help retailers in these challenging times to reduce costs and improve customer safety. Our guided installation process means that Occupi will be remotely configured, monitored and controlled so managers can instantly set occupancy levels and start saving money straight away.” Crowd control measures The technology will be welcomed by retailers in the UK as they continue to manage the sale of food and essential supplies to the public while keeping customers and staff safe. Most stores that are still trading have crowd control measures in place, mainly in the form of manned entrances and exits, which increases the costs for retailers. Occupi by Ocucon will reduce the need for staff to maintain access to the store, thus removing human error from occupancy levels. Occupi by Ocucon is available now.
Following a reported 50 per cent surge in construction crime rates since the coronavirus (COVID-19) lockdown, the industry is being urged to tighten security measures to defend sites from opportunistic criminals. Increase in security incidents The Construction Equipment Association (CEA) announced the significant increase in raids on vehicles and sites and theft of plant equipment and tools, which is in stark contrast to overall crime rates, which dropped by up to 40 per cent in March . Even before the COVID-19 crisis, construction site theft was an ongoing problem that blighted the industry, costing an estimated £800 million per year. In a survey carried out by the Chartered Institute of Building, 92% of respondents confirmed they had been affected by theft, with 21% reporting weekly site robberies. Since the pandemic and the initial uncertainty around government guidelines and whether construction should remain open, a spate of sites have entered shutdown, often leaving valuable assets in place. Effective site security Simon Oakley, Operations Director at Biosite Systems, comments, “Establishing effective site security is critical at all times but with the recent increase in incidents of construction-related crime, it is clear that opportunistic criminals are targeting sites in shutdown”. The Biosite CCTV solutions in operation link back to a dedicated control room to offer 24/7 surveillance and protection" He adds, “The construction industry has needed to respond rapidly to advice led by government and industry bodies to ensure sites are safe for operatives, which has meant in many cases sites have been scaled back or entered shutdown much quicker than they would normally be, leaving valuable plant equipment that is a temptation to thieves”. Manned guarding, CCTV and mobile patrols Simon further stated, “It is essential that these assets are removed when possible or protected with adequate security measures, such as manned guarding, mobile patrol units or CCTV, to establish control over the situation and to ensure essential police resources are not being diverted during the COVID-19 relief effort.” Biosite Systems operates a nationwide support network of specially trained and Security Industry Association (SIA) licensed guards, managed by an SIA approved contractor for the construction industry. The Biosite CCTV solutions in operation link back to a dedicated control room to offer 24/7 surveillance and protection.
Dedrone, globally renowned company in drones and counter-drone technology, has appointed Aaditya Devarakonda as President and Chief Business Officer. Devarakonda will join Dedrone co-founders Joerg Lamprecht (CEO), Rene Seeber (CTO), and Ingo Seebach (COO) as a key executive overseeing global sales, marketing, business development, product, and finance. He will be based in Dedrone’s headquarters in San Francisco, CA. Aaditya (AD) Devarakonda joins Dedrone from Centerview Partners where he was a senior member of the Technology Investment Banking Group based out of Palo Alto. He brings years of experience being a trusted advisor and thought partner to CEOs, boards and management teams. His engagements span some of the most complicated and strategic transactions helping companies fund and execute growth at scale. Counter-drones technology “This is a tremendous time to join Dedrone. The counter-drone market is at an inflection point, where organizations can no longer ignore the airspace threat. Dedrone is the market leader for counter-drone technology, and the founders have assembled a phenomenal team of world-class product developers, researchers, and commercial leaders,” shares Devarakonda. “The winning combination of strong product, robust customer base, and marquee investors make Dedrone primed for success, and I look forward to amplifying the exceptional work that this company has already accomplished.” “I am thrilled to welcome AD to Dedrone,” states Joerg Lamprecht, CEO and co-founder of Dedrone. “AD comes to Dedrone having worked with us for almost a year. He has done a tremendous job in shaping the product and commercial strategy for the company and has led multiple large-scale partnerships that will fuel the next stage of our growth. He has a great combination of big picture strategic thinking and a hands-on leadership style. We are pleased to officially have AD onboard as a Dedrone team member.” Identify, track, and eliminating aerial threats Founded in 2014, Dedrone is a key counter-drone technology solutions firm that allows organizations to identify, track, and eliminate airspace threats. Dedrone’s capabilities are trusted by hundreds of customers globally, including three of the G7 countries, correctional facilities, critical infrastructure establishments, airports, and corporations, among other public and private organizations. Venky Ganesan, Partner at Menlo Ventures, and investor at Dedrone, shares, “AD is the perfect fit for Dedrone as they look to scale the company to the next level. His strategic understanding of different business models across multiple markets within software and hardware, his experience to negotiate and close large deals and ability to lead a global team are key skills that set him apart. I am excited to see Dedrone grow under AD’s well-rounded experience and leadership.”
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
By now your organization should know the drill. To keep your enterprise safe from unauthorized access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world. Protect Against Burst Attacks You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017. Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack. They recommend adopting two key solutions: 1) a behavioral DDoS protection system that utilizes machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred. Prioritise Network Infrastructure Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it? In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list. Hide Sensitive Web Pages From Search Engines Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible. Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches. Update Passwords On Your IoT Devices Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update. Use Encryption To Protect Data In Transit Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information. This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs And Autonomous Systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies being used for security and safety benefits is progressing at a rapid pace. Let’s look at some of the exhibitors in the 2019 Unmanned Security Expo: Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations. Indoor environments, which are confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response Compact Surveillance Radar (CSR) System SpotterRF provides the world’s most advanced compact surveillance radar (CSR) system for affordable wide-area, all-weather perimeter security and small force protection. Incorporated in 2009, the company attained profitability quickly and is ahead of forecasts. Dedrone has remained at the front of the issue of drone threats, integrating installations to military bases, stadiums, public events, and private individuals. The company has expanded its operations to include a new office in Washington, D.C, and has continued to upgrade its DroneTracker software. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. Airspace Security And Drone Tracker Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider. Founded in 2007 in Israel, Magos first specialized in advanced radar solutions for the military and defense markets. In 2015, Magos’ technology was declassified, allowing the company to focus on developing best-in-class systems for the commercial security market. Today, Magos radars are used in over 30 countries in critical infrastructure, data centers, electric utility sub stations, and oil refineries as well as in other commercial verticals like vineyards and car lots. Now, Magos is positioned to see increased adoption of its solutions in the U.S. Patriot One Technologies Inc. develops solutions to detect concealed weapons, utilizing novel radar technologies. Their innovative radar technology provides first responders and security personnel valuable time in active threat scenarios. The technology offers stand-off detection of concealed threats typically employed in public locations. These are just a few of the exhibitors in the Unmanned Security Expo. They represent technologies that will help to shape the future of the security marketplace.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow drones to fly autonomously, using global positioning systems (GPS), vision sensors and algorithms to constantly analyze what the drone “sees” through an on-board camera. The system can work with any camera that provides an adequate image for real-time vision algorithms. Perimeter Security At ASIS Tyco Integrated Security invited Percepto to display its technology in the large integrator’s booth at ASIS. “It was the first show where we targeted perimeter security,” says Ariel Avitan, Percepto’s Chief Commercial Officer. “Tyco took us under their wing. We had about 100 conversations at the show. After about 10 minutes everyone understands the business logic behind the solution. You have to talk to the end users to understand that your concept is validated.” Percepto is in the contractingphase with TycoIS and alsohas a number of other pilotprojects, including energycompanies in Europe TycoIS is also working with Percepto on several pilot projects to demonstrate and fine-tune the technology. Percepto is in the contracting phase with TycoIS and also has a number of other pilot projects, including energy companies in Europe. “Our challenge is robustness,” says Avitan. “The technology is trustworthy. We just need to make sure the system is. And the industry needs to identify applications where we can provide more value.” Autonomous Drone Performance Percepto’s products include a hardware base station to control the drones, and the PerceptoCore module is installed on board the drone to allow it to interface with the base station. The core is pre-loaded with multiple task applications that enable the drone to perform tasks relevant to its purpose – autonomously. The “core” can be installed on almost any size or type of drone, whatever the manufacturer. In addition, Percepto provides an interface that integrates with existing systems in the security department’s control room. Cloud management software enables remote access and management of multiple drones. The software collects, analyses and presents data, while streaming live video on an ongoing basis. Perimeter security is just one application where drones will be deployed in the near future. Having a drone stationed on-site, charged and protected by its hub, enables fast reaction to any need in the field, day or night. Additional sensors and other equipment can be added to drones to detect gas leaks, thermal energy, or smoke, and even to provide life safety capabilities. Lighted drones with voice messaging could be used to direct employees or the public to the best exit route in case of a mass evacuation. 24/7 Perimeter Security Using drones to patrol 24/7 addresses the needs of perimeter security. Adding more sensors and providing additional data to operators helps expand the system’s utility and increase return on investment (ROI), says Avitan. “These applications are a tremendous benefit for security,” he says. “We actually find that adding safety and inspection applications is a good way to increase security. When you have a drone that knows how to provide ROI, it saves tons of money. It’s always about security, but above that we want to add value and increase ROI.” In addition to perimetersecurity, drones will soonbe used to inspect thethousands of solar panelsat solar energy sites In addition to perimeter security, drones will soon be used to inspect the thousands of solar panels at solar energy sites. Drones with cameras can detect the presence of dust or other factors that lower solar-panel efficiency, or cracks or malfunction of the actual panels. Thermal imaging on board a drone can detect which panels are under-performing. Drones could also be used to provide alerts if a transformer or cabling overheats in a power plant or critical infrastructure application. Restrictions On Drones The U.S. Federal Aviation Commission is evolving its position on autonomous drones. Drones are restricted from populated areas, can only fly at certain altitudes, and must be equipped with lights if flying at night. Currently, applications require that there be an unmanned autonomous vehicle (UAV) pilot on site, maintaining “line of sight” with the drone, who can take control if needed. However, the requirement for the UAV license has been lowered to allow certification with an online course. There have also been some exemptions granted for the line-of-sight requirement (e.g., railroad inspections). “We include control mechanisms now to be compliant, and when the barriers come down, we are ready for that,” says Avitan. Many global jurisdictions are following the FAA’s lead, although some countries do not regulate drone traffic. Avitan says he expects regulators to allow drones to fly autonomously beyond line of sight in specific closed facilities in the next 12 months. Based on the pilot projects, Percepto will fine-tune the system, streamline manufacturing and launch a fully commercialized system by Q1 2017. Avitan expects to have up to 100 units deployed in 2017, and up to 1,000 units deployed in the next 18 to 24 months. Like I said: Sooner than you think.
Perusahaan Gas Negara (PGN) is a company in Indonesia for the transportation and distribution of natural gas. The total length of distribution pipelines of this company is 3,187 km, serving around 84 million customers. As the owner and operator of four transmission pipelines, PGN is responsible for guaranteeing security along the entire chain of conservation and distribution of gas and for delivering products and services in accordance with the needs of consumers. Securing gas supply lines During the transport phase, the gas is pushed through the pipelines at very high pressure. When it reaches the end-users, however, its delivery pressure must be adjusted so that it falls within an acceptable range (as detailed in the contractual delivery specifications). This is to prevent consumers from being exposed to the full transport pressure reached within the pipeline. A meter and regulator station is used to regulate the Natural Gas outlet pressure, and reduce it to an acceptable value. To this end, PGN has developed a meter and regulator station (the Master Control Station) that works via remote control, directed from the control room. This project plays an active role in the PGN's commitment to achieving Operational Excellence in process management, with the focus on optimizing safety, improving efficiency and on maximizing reliability throughout the gas supply chain operations. PTZ cameras and remote monitoring To guarantee reliability and security of the control function, it is necessary to monitor the process using specialized CCTV equipment for hazardous zones. 10 PTZ units from the MPXHD series have been chosen for the realization of this surveillance system, because of their reliability in providing perfect video footage and their compliance with the security standards for operation in hazardous areas. The PTZ units are used to directly monitor the metering and regulating operations remotely from the master control room.
OPTEX Teams up with Mobile Pro Systems to create a Rapid Security Deployment Solution for a high-end condominium builder in Extreme Weather Conditions. The solution was required for a large construction site for Cove Properties, one of Alberta, Canada’s premier luxury condo builders. Weather conditions With many developers and construction companies building throughout the year, they're forced to battle a myriad of different weather conditions including rain, sleet, snow and extreme cold. On top of this, they still face the inevitable problem of theft and vandalism. Theft of tools, machinery, new materials and scrap material cost contractors millions of dollars per year and leaves the construction companies and their sub-contractors with the effect of having to deal with their losses. The general contractors and developers feel the chain reaction as well, as they have to deal with higher insurance premiums and weeks and months of project delays. To avoid the major effects of construction site theft, Cove Properties turned to 2020 Digital Security Solutions of Alberta, Canada for help. Cove’s requirements included a mobile solution capable of wireless communication that could be moved from site to site with surveillance, motion detection, lighting and remote monitoring capabilities. In addition, it had to survive the harsh outdoor elements of Northern Canada. Powering network and surveillance solution 2020 Digital Security Solutions took all of Cove’s requirements into consideration and found the perfect solution in the PowerSentry by Mobile Pro Systems. The PowerSentry is a self-sufficient, temporary, semi-permanent or permanent surveillance solution. Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole Built as a “power platform”, it can power anything from surveillance, security, communications and/or network technologies. And with its universal mounting options, the PowerSentry can be mounted to a pole, a wall or tripod or can be easily hooked over a fence or roof parapet for superior mobility. It accepts 90-277VAC to minimize re-wiring and is equipped with a high quality Lithium-Ion battery pack as a backup power source due to loss of power or power outages. In addition, the PowerSentry has a unique remote system status and control software called Power Broker, which monitors the PowerSentry’s battery voltage, current power usage, displays active map GPS monitoring, intrusion detection reporting, warning and flood lighting control and horn/speaker control. Motion-activated floodlights To help solve the limited daylight obstacle, 2020 DSS had two 8,000 lumen LED flood lights mounted to the chassis of the PowerSentry. The LED floodlights are motion activated and have a pre-determined setting of how long they will stay on. The lights can also be turned on and off manually through the Power Broker software. “Due to the short amount of daylight during the winter months, the flood lights will help light the site in the evening hours and after hours if there is a breach in the perimeter,” said Gene Telfer, president of 2020 DSS. The perimeter and the interior of the construction site is protected by an Optex RedScan laser perimeter detection device which was connected to the PowerSentry and mounted 8’ below providing a 200’ horizontal area of detection. “We decided to mount the RedScan below the PowerSentry instead of on it because we will get a wider detection range and a firmer detection trigger,” Telfer said. Optex Redscan laser detectors With abnormal cold temperatures hitting the Northern United States and almost all of Canada, the first test was in late December into early January when normal temperatures fell to -40°F and -60°F with the wind chill. “The systems are working great and we haven’t had a system go down at all,” Telfer said. According to Telfer, Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole that made installation very quick and easy. They are using Milestone video management software that integrates with the cameras and Redscan laser detectors for visual verification and event response in one platform.
With more than 2,200 locations and 41,000 associates, Panda Express is America’s family-owned and operated Asian dining concept. Challenged with losses at the point of sale (POS) and growing false alarm penalties, the company turned to Interface Security Systems, a managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to help them dramatically decrease shrink and resolve security inadequacies. False alarms and fines Panda store managers faced continuous distractions from false alarms, receiving calls from the legacy alarm company at all hours of the night and incurring fines from local law enforcement for needless police dispatches. Interface monitoring center instantly verify any alarm from a Panda store “When an alarm went off overnight, our managers would always err on the side of caution, send police in, or go in themselves. That was dangerous in itself if there was actually a burglary happening inside the store,” says Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express. “Additionally, we were losing significant amounts of money on false alarm charges.” Suspicious transaction notification To address the false alarm challenge, Interface installed a next-generation IP Interactive Monitoring system with live video and two-way audio, which offers a virtual, guard-like level of protection in every Panda location. Operators in the Interface monitoring center instantly verify any alarm from a Panda store with live streaming video, eliminating false alarms. Forcum reports that Panda is saving over $100K per year in false alarm fees Panda had also implemented a customized, exception-based POS reporting system, which notifies Panda management whenever a suspicious transaction takes place at the register. Interface took the tool a step further by integrating it with the video surveillance and alarm systems at each of the Panda locations, allowing management to immediately connect to the video of any problematic transaction. Identify anomalies and prevent shrink The solution enables loss prevention professionals to quickly identify anomalies and prevent shrink. Top offenders from thousands of employees doing millions of transactions can easily be bubbled up to the top. The combination of business intelligence and video surveillance resulted in a massive reduction in shrink and cash shortage at the register. The business intelligence provided allows for focused tracking and improved store operations With Interface, Panda has experienced vast improvements in security for its associates, customers and assets. Forcum reports that Panda is saving over $100K per year in false alarm fees and thousands of dollars per month per store in reduced shrink at the POS. Monitoring intrusion data The business intelligence provided allows for focused tracking and improved store operations, including people development, store performance data comparison, optimized store efficiencies, monitored intrusion data, and cash tracking. Panda and Interface have successfully partnered to create a potent security and loss prevention tool in the Quick Service Restaurant space. “Interface is a partner that's been collaborating with us on our needs from day one,” says Forcum. “The company understands what we need, and then it develops solutions towards that end. It doesn’t just come up with an off-the-shelf product and expect us to purchase it. Interface has shown a real commitment to our business. We meet with them regularly to collaborate on new initiatives and on emerging issues that Panda faces. The company has truly become part of that solution voluntarily and eagerly. Other business partners do not do that. Interface is, in fact, a true part of the Panda team.” A more detailed case study and video testimonial on Panda Express can be found on the Interface website.
Vera Cadillac, a renowned automotive dealer in the Fort Lauderdale area of the US State of Florida was looking to install an advanced security system to counter the growing threat of sophisticated thieves - sophisticated enough to know how to circumvent the current security system and steal parts, tires and in some cases, complete cars. Vera’s current security system included inexpensive CCTV cameras with video motion sensors that proved ineffective in deterring theft at the dealer’s showroom. The sensors were installed on the outside of the fenced perimeter, making them susceptible to being vandalized. When the sensors were disabled, the thieves were able to penetrate the perimeter and strip cars for parts. The speed in which the thieves were stealing car parts and accessories was another tough obstacle to overcome. Tyco - Optex integrated security solution Vera chose Tyco Integrated to come up with an improved, flexible system that takes into account the many obstacles within the perimeter. This includes wildlife, vegetation and other physical obstacles. In addition, the system needed to be as vandal proof as possible. Tyco Integrated and Optex teamed up to provide a flexible, effective system of detection that would use high-mount, zone detectors as trigger devices for the American Dynamic Illustra IP400 CCTV system. SIP infrared sensors - Inovonics wireless network integration The team created a design that would easily integrate Optex’s REDWALL Wireless SIP infrared sensors into Vera’s current Inovonics wireless network (used for building automation systems). The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection. The result will capture and record any intrusion within the sensor’s zone. The intrusion event is now tracked by ADT’s Central Monitoring Station and alerts the authorities along with a Vera contact. Masking of surrounding obstacles The REDWALL SIP sensors allowed Tyco Integrated to easily adjust and account for wildlife, vegetation and other physical obstacles by simply masking those areas. Masking deletes these obstacles within the protected perimeter of the detector. Because the old system was susceptible to vandals, the team had to address this. The team installed the sensors behind the fence and over 9 feet high on the side of the building in accordance to specification. Effective intrusion detection All-in-all, the plan included 12 SIP units mounted on four buildings, which were installed in a single day. Vera Cadillac effectively maintains a secure perimeter that detects intruders from stealing auto parts and other property. In addition, the system was easily integrated into Vera’s current wireless network and is vandal proof. It provides Vera Cadillac peace-of-mind that a system is in place to prevent such incidents from happening during the night-time and can respond with quick efficiency to catch criminal activity.
Upgrading a two-wire analog intercom to a conventional IP video system typically involves messy and costly rewiring work. So what happens when there is a need to install over 500 IP systems into a single building? One company, Hikvision, has developed an innovative two-wire solution, which is already making waves at the luxurious RiverGate condominium in Singapore. “If someone rang the bell at the side entrance, it wouldn’t always ring in my apartment upstairs,” says the Chairman of the Condo Council, who lives at the RiverGate condominium in River Valley, Singapore. “Visitors often had to call me to let them in, and I would have to travel down 20 floors to the main entrance. It became incredibly frustrating.” Switching from analog to IP system The intercoms in Asia’s condos are crying out for an upgrade to IP, but the infrastructure just doesn’t support it" The resident’s story is typical of millions of residents across Asia, where high rise living is the norm. In Singapore, the first condominiums were built back in the 1960s, to tackle the challenge of high population density and soaring land costs. Today, high-rise living in Singapore is not only necessary but highly desirable, with many condominiums offering swimming pools, spas, sky-gardens and a host of other deluxe facilities at exclusive locations across the island. Nevertheless, even the most luxurious apartment blocks are wrangling with aging access control systems. Many systems only work intermittently, while all but the newest builds feature intercoms that use out-dated two-wire analog cabling. “The intercoms in Asia’s condos are crying out for an upgrade to IP, but the infrastructure just doesn’t support it,” says Daniel Han, Engineering Director at Serron Technology. Hikvision IP security systems Making the move to IP intercom systems is a logical step, as it would offer a host of benefits to Asia’s high rise residents. First of all, IP systems are video-based and can work with HD cameras, giving homeowners crystal clear images of who is at the door potentially dozens of floors below. What’s more, they also typically link to an app, so residents can see and interact with the person at the door – even when they’re not in the apartment. “Video IP systems are much more functional, more future-proof, and incredibly reliable,” adds Daniel. The problem is, most of today’s IP intercom systems typically need to replace wire for an internet connection – and that means an upgrade to the building itself. “To upgrade to an IP system across a whole condominium is a massive job,” Daniel confirms, adding “Chasing out walls and replacing wiring is disruptive, messy and a time-consuming task. In addition, the task is also expensive, and management companies would have no choice but to pass this cost on to the residents." Two Wire IP Video Intercom System Although it may seem like an impossible problem, one company – Hikvision – has provided an excellent solution. As its product name suggests, the company’s Two Wire IP Video Intercom System is purpose-built to work over existing two-wire cabling, so that two wires supply power and transmit voice, video and control signals at the same time. At the heart of the Hikvision two-wire system is the Two-Wire Video/Audio Distributor (DS-KAD706). It’s this intelligent box that makes the two-wire solution possible by consolidating power and internet connectivity, enabling it to be distributed out to the external door video stations and the indoor video units. Hikvision two-wire solution Each of the 545 apartments within RiverGate has a Hikvision Intercom Indoor station with a video screen At Singapore’s luxurious RiverGate Condominium complex, the management team was so impressed with the potential of the Hikvision two-wire solution that they have already installed it into the condominium. Each of the 545 apartments within RiverGate has a Hikvision Intercom Indoor station (DS-KH6320-WTE2) featuring a video screen, while each of the entrances to the building has a Video Intercom Door Station (DS-KD8102-V) featuring an HD camera. If someone calls an apartment via a door station downstairs, it rings the appropriate indoor screen. The resident can see the visitor and have a conversation with them, before letting them in with a simple tap of the screen. Hikvision Video Intercom Master Station (DS-KM8301) The RiverGate central management offices also have the Hikvision Video Intercom Master Station (DS-KM8301), to monitor the building perimeter and control entry. Plus the complex has installed a number of Hikvision’s Waterproof and Vandal-proof Card Readers (DS-K1104M), to ensure that only authorized individuals can move around the building. What’s more, by downloading the HikConnect app, residents can be alerted to a visitor when they’re away from the video unit, or when they’re out of the premises entirely. The app offers the same functionality as the video screen – allowing residents to see visitors, speak to them, and even choose to let them into the building. Reliable and innovative IP-based solution The benefits of the new Hikvision system are far-reaching. From a building management perspective, the ability to use the existing two-wire system has kept installation costs to a minimum. The ability to use the existing two-wire system has kept installation costs to a minimum “Hikvision’s Two Wire Video Intercom System is a state-of-the-art product, and ideal for retrofitting and modernizing large residential and office building projects. Across Asia, there are thousands of high rise buildings whose access control systems desperately need upgrading. This sleek system provides a cost-effective and elegant IP-based solution – one that’s ideal for high end residential or commercial environments – for minimal cost and disruption.” said Jacky Xie, the Project Manager at Hikvision, who is very optimistic about the potential of the company’s two-wire IP solution. High-performance video and access control system And of course, it’s had a huge impact on RiverGate’s residents. One of the residents’ of the Condominium said, “The new intercom does more than the old system. I particularly like the functionality of mobile app – I can use my phone to let visitors come in even when I don’t have access to the indoor device, like when I’m not at home or using the bathroom. It’s also such a relief to have an access control system that works reliably. I love it; it’s more convenient, it’s really easy to use, and I feel safer.”
With a history of over 20 years, the Cedr factory is one of the leading manufacturers of wooden doors, kitchen cabinets and other wood products in Russia. Today, it has a few of its own modern and automated plants with a wide range of products and innovative production approaches. For such a modern wood factory, safety is of paramount concern. Advanced video surveillance systems need to be introduced in the internal and external areas of the factory. Due to the extremely high risk of fire in a wood factory, the customer has high demands for a smart system to keep sufficient video backup as evidence. Specifically, the system needs to be capable of storing up to 30 days of videos, with copies stored on a separate network at the same time so that the videos can be safely saved under different network conditions. Mini-Bullet Network Camera With IR illumination, detailed images can be captured under low light conditions or total darkness A total of 400 IP cameras from Dahua Technology were installed inside of the factory for general monitoring, including DH-IPC-HFW1230SP, DH-IPC-HDPW1231FP-AS and DH-IPC-HFW2231TP-ZS. In this chain factory, DH-IPC-HFW1230SP was used to monitor machine operation, and DH-IPC-HDPW1231FP-AS was used to monitor corridors. These two types of cost-effective Mini-Bullet Network Camera feature 2MP resolution with a motorized 2.8mm/3.6mm fixed lens. With IR illumination, detailed images can be captured under low light conditions or total darkness. The cameras’ Smart IR technology adjusts the intensity of camera's infrared LEDs to compensate the distance of an object. Smart IR technology prevents IR LEDs from whitening out images as they come closer to the camera. excellent light sensitivity In order to ensure the safety of staff and vehicles in the factory vicinity, DH-IPC-HFW2231TP-ZS was installed outside the factory to monitor large and open scenes. This IR Megapixel Vari-focal Camera features 2MP resolution with a 2.7mm ~ 13.5mm vari-focal lens, meeting monitoring needs of different distances. For challenging ultra-low light environments, IPC-HFW2231TP-ZS powered by Dahua’s Starlight Technology offers excellent light sensitivity, capturing color details in low light conditions down to 0.006lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. ±25% input voltage tolerance These cameras are ideal choices for installation even in the most unforgiving environments In addition, these cameras allow ±25% input voltage tolerance, suitable for the most unstable conditions in outdoor applications. Its 2KV lightning rating provides effective protection against lightning for both the camera and its structure. Certified and subjected to rigorous dust and immersion tests (IP67), these cameras are ideal choices for installation even in the most unforgiving environments. In order to help the customer improve the security of video storage, three types of Dahua 4K H.265 Network Video Recorders – adopting powerful processors with up to 4K resolution for preview and playback – are used in the factory to store 10-day videos, which can provide critical details for identification. Real time monitoring On the other hand, a 48-HDD Enterprise Video Storage is used to separately store 30-day videos at the headquarters in case the factory area videos are damaged. It supports 512 channels of IP camera inputs and 1024Mbps incoming/recording bandwidth, offering an unparalleled storage performance. Moreover, DHI-DSS4004 was selected as the central server, through which all videos are integrated in one system for a unified operation and management in the headquarters’ control room. The vast factory vicinity is now equipped with Dahua video surveillance system, enabling all security checkpoints to monitor the factory in real time. At the same time, the massive video storage and backup allows the administrator to review emergency situations if necessary. The advanced solution from Dahua Technology has created a safe and smart factory for the customer, assisting them in improving their security level during production.
Round table discussion
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
Once again, ISC West has come and gone. The show continues to please exhibitors and attendees. Reviews are generally glowing and enthusiastic. For all its successes, however, there is a certain repetition from year to year – a lot of the same players, the same technology trends (not to mention the same venue every year, but who doesn’t like Vegas?) But even among the repetition, there is usually at least one element that is surprising. Perhaps it’s the unexpected elements that keep us all coming back. We asked this week’s Expert Panel Roundtable: What surprised you most at ISC West in 2017?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload