Remote video surveillance
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of...
ISS – Intelligent Security Systems, global provider of intelligent VMS and native analytics globally, has been awarded a coveted Security System Approval Certificate from Dubai’s Security Industry Regulatory Agency (SIRA) for the company’s innovative SecurOSä Video Management System (VMS), SecurOS Auto License Plate Recognition (LPR/ANPR) analytics and unique SecurOS Motus 452 Camera for use in law enforcement applications. The combined VMS, analytics and camera solution d...
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced the unveiling of its newly redesigned smart home security system – the ADT Command Panel & Control Platform (ADT Command) – as well as a suite of smart security and home automation products at the Consumer Electronic Show (CES). This year’s theme, “Real Protection,” will highlight the products ADT offers to ensure...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communic...
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's p...
ISS, Intelligent Security Systems, global provider of intelligent VMS and analytics, is showcasing two highly specialized analytics solutions for vehicle surveillance and law enforcement applications at ISC East 2018 (booth #527). Natively developed and designed to seamlessly integrate with ISS’ SecurOS v10 platform, SecurOS UVSS (Under Vehicle Surveillance System) combines advanced software and hardware for remote under-vehicle surveillance. Furthermore, the ISS SecurOS Motus is an IP-cam...
Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations. IX2 IP Intercom And Security Solution “With no server or license fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt Taylor, Managing Director of Aiphone UK Ltd. “Utilizing its ability to connect directly to a network, all these functions can be implemented between remote locations over large areas.” “However, what elevates IX2 above other traditional and IP intercom systems currently available for large scale installations, is the ease at which it can be integrated with third-party systems. As a result, we are able to provide a totally integrated intercom and security solution, including access control, IP network cameras and video management software (VMS), such as Avigilon, ExacqVision and Milestone, as well as Lenel Onguard access control management software out of the box and without the need to buy any licenses.” Scalable Solution Offering Video Entry Security IX2 has the capacity to provide communication with a practically infinite number of intercom stations IX2 has the capacity to provide communication with a practically infinite number of intercom stations. Video entry security, internal communication, emergency stations and multicast paging are all able to be implemented between remote locations over large areas and distances, making the IX2 system an ideal solution for education campuses, as well as any other type of application involving multiple locations such as airports, railway stations and parking facilities. Key features of IX2 include: No wiring-distance limitations: LAN and VPN connections enable implementation over extensive areas and between remote locations. Peer-to-peer configuration results in space savings, reduced installation time and lower cost. Simply connect the units to Power over Ethernet (PoE) switches. No need for a dedicated server, with the additional benefit of eliminating the risk of system downtime due to server malfunction. 7-inch handset with a touchscreen which can be used in domestic and commercial environments. Hands free touch screen monitors. Picture in picture video can show the door station camera and an overhead camera simultaneously. Video intercom between master monitors. Newly designed IX panels which comply with DDA regulations, e.g. offer clear visual guidance and a blue halo button. Audio and video SIP Integration with Cisco IP phone systems. ONVIF compatibility provides the option for images captured by call panel cameras to be integrated with a video surveillance system. SD card slots on panels and monitors enable video and audio data to be recorded and backed-up. Call log facility on each handset provides data trails. IX2 is also equipped with some advanced functionality rarely found in other IP Intercom POE systems. These include: Call Queuing Up to 20 calls can be queued and prioritised on an IX-MV7 master station When multiple calls are made to the same monitor station, the IX2 system places the calls in a queue which is displayed on the LCD screen. On the calling end, users are given notification that their calls are in the queue. Up to 20 calls can be queued and prioritized on an IX-MV7 master station. The importance of each call, e.g. normal, priority or urgent, can be indicated by the display of respective red, amber or green colors on the master station. Higher priority calls are moved automatically to the top of the list. Call Transfers Calls and conversations within the IX2 system can be transferred to up to 10 other IX-MV7 monitor stations. The transfers can be done manually or through a variety of system settings. With Delay Transfer, for example, the system automatically transfers calls which are not answered within a pre-set time. An Absent Transfer feature immediately calls another IX-MV7 master station when someone is away from their desk, while Scheduled Transfer automatically transfers calls to another IX-MV7 master station during pre-determined times, e.g. out of hours.
Having returned from Security Essen, Traka’s International Sales Director, Martin Woodhouse, reflects on the show and why it was so important to attend for the industry leader in innovative key and equipment management systems. Q: How was the show? Martin Woodhouse: Security Essen was great in allowing us as a global brand, and part of the ASSA ABLOY Group, to demonstrate how we are listening to our customers (new and existing) and responding with latest advances in intelligent solutions for keys, lockers, software and dedicated products. Q: Why did you think it was important to attend? Martin: Security Essen is an established exhibition for the European market but even more important for the German one. It continues to lead the way as an important global event for the world security market to come together, to tackle the latest security challenges and share new and innovative ideas. This year, particularly, concerns were cited about the impact of Brexit and its influence on the market, together with more intricate security issues such as cybersecurity and data protection. It was really important for Traka to attend, not only to display its latest solutions and services but also to be part of these important conversations, so that together as an industry, we can pull together and have the solutions and answers ready. Q: Did you pick up on any particular trends at the show? One of the main themes of the show was the focus on smart security and integration Martin: One of the main themes of the show was the focus on smart security and integration. We are increasingly living in a far more connected and online environment, where the speed of data and the cause and effect on how to manage situations is becoming faster and simpler to instantly analyze a situation, with the necessary reports required available. From a security and data perspective, both on and offline, clients expect more, they do more research and they know what they are trying to achieve. They want to choose a partner that can provide integrated, all-encompassing bespoke solutions and achieve compliance as standard. It’s something Traka certainly has focused on to deliver bespoke solutions, integrated to suit a specific customer environment. Q: Was there a specific focus for Traka at Security Essen? Martin: For Traka, Security Essen was an opportunity to demonstrate how we can help businesses operate to minimize operational costs, increase productivity and ensure the efficient use of company assets. We demonstrated how our latest solutions can make sure every part of an organization is protected, right through to critical data facilities, an increasingly integral part of any security remit in today’s world. And due to the open nature of Security Essen, it was the perfect opportunity for Traka to discuss bespoke customer requirements across a number of different vertical sectors; from education to healthcare, hospitality to transport. Finally, Security Essen was the right international platform to present our proven integrated solutions. We wanted visitors to see for themselves how easy, intuitive and comprehensive our systems are, and with full audit capabilities, how they can present an all-encompassing safe and secure solution with tangible ROI benefits. Q: Could you tell us more about the products displayed at Security Essen? Our latest Traka Web central software management was at the heart of our display as an enterprise class web-based administration software platform Martin: At Security Essen, the range of products and services on show was focused on our core capability to secure, manage and audit the use of almost any physical asset, including: premises, devices, secure areas, data centers, equipment, machinery and vehicles. Our latest Traka Web central software management was at the heart of our display as an enterprise class web-based administration software platform, enabling complete management of Traka Touch key and locker systems from any device, even remotely. We presented live demonstrations of our integrated solutions, including our popular Rack Manager, which offers electronically controlled access to every server rack door in a data centre, with the ability to scale up to suit evolving infrastructure environments. We displayed Traka’s new V-Touch compact key management system, designed to offer controlled access management for critical keys at locations where space is limited and up to 5 keys need to be managed. Q: Could you tell us more about your integration capability? Martin: At Security Essen, we were lucky enough to be able to be able to demonstrate on our stand, Traka’s integration capability with Lenel and Nedap. We are extremely proud of our track record of integrating with third party systems with such leading companies. We believe it goes a long way to ease the burden of administration for our customers and present unique opportunities for controlling critical processes. Traka International and ASSA ABLOY exhibit solutions at Security Essen The Traka integration ‘engine’ ultimately allows for real-time, two-way communication with access control platforms, HR databases, time and attendance, and many other user systems. And there are a host of further benefits: The Traka integration ‘engine’ ultimately allows for real-time, two-way communication with access control platforms User profiles and access permissions can be easily populated and managed on an existing database. Automatically enrol users and define security settings based on employee status or department assignment Custom workflows can be tailored to the needs of an organization to generate actions, notifications or access restrictions based on the status of important assets ensure valuable assets and keys don’t leave site. Q: What are your aims on an International basis for Traka? Martin: Traka was the manufacturer of one of the first electronic key management systems – and we are now considered as world leaders in innovative technology for sophisticated, intelligent key and equipment management solutions to manage and control access to important assets. Even in such an industry leading position, recognized on a global basis, in the UK and in over 40 countries worldwide, we are far from complacent. We continue to evolve our solutions and professional services and continue to not only meet but exceed the requirements of our customers. This is not only from a product perspective, but also our service capability to offer advice right from initial design and specification stages to installation, project completion, handover and ongoing maintenance, across every sector. Naturally, we want to grow and evolve into more countries and increase our network of certified channel partners; but we can only do this if we continue to listen to the demands of the different market needs. Q: And what about Traka in the UK? We believe the transition to more intelligent systems, such as Traka solutions, will be more aligned with everyday life Martin: It’s surprising how many business and commercial owners still rely on manual processes and paper recording, for key and equipment management and control. Our aim is to prove how simple measures can make a difference. It’s not only the security of a business’ assets but also to reduce the cost to an organization through accidental damage, theft, personal injury and downtime. It also helps enforce business processes and ensure health and safety compliance. Ultimately, it’s a mindset. We believe the transition to more intelligent systems, such as Traka solutions, will be more aligned with everyday life. Q: How important is it to be part of ASSA ABLOY Group? Martin: Being part of the global leader in door opening solutions is a massive advantage for Traka. ASSA ABLOY’s products and solutions serve just about every conceivable application around the globe. The real credit to the group is its ability to understand Traka is a bit unique within ASSA ABLOY, because we provide different types of solutions to its traditional core. So, we’ve continued on as a separate business both in the UK and on a global basis, and only integrating where it makes absolute sense into the larger organization. An example of this is the integration between Traka and ASSA ABLOY’s advanced security CLIQ Web Manager software solution. The result is a key management process that is proven to significantly reduce maintenance costs and save administration times. Overall, it’s been impressive with the people and the technology within the company that we are able to tap into as and when required. The ASSA ABLOY solutions brand is one we are proud to be associated; a one-stop shop for all door and hardware opening needs. The ASSA ABLOY brand will continue to grow as a leader in opening solutions and access solutions. Q: What’s next for Traka? One of the key aspects we are focusing on is the move to present solutions dedicated to each market segments from small to global companies Martin: Traka is never one to stand still. We will continue to evolve as a company and invest in research and development. One of the key aspects we are focusing on is the move to present solutions dedicated to each market segments from small to global companies. By example, most recently in the UK, we have seen success in the launch of lockers specifically designed to store body worn camera technology, primarily for the likes of prison and emergency services but also in schools and community buildings. Not only did this require a solution to ensure the equipment is safely secured, but also that it is charged and instantly ready to use whilst in storage. At the same time any solution needed to help organizations, who had invested significantly in the technology, operate a ‘pool’ system rather than having to invest in a device per member of staff. This is just one example, with a very specific product requirement that Traka was able to work closely with the sector to understand the issues and create a solution. It demonstrates a commitment to design, in how our products operate and evolve to meet market needs, both in the UK and across international markets.
A dependable Internet connection is virtually every industry’s sustenance and without it, business dies. Yet many don’t realize how frequently the worst occurs, or how dramatically it could impact their livelihood. According to industry research, network downtime can cost small and midsize businesses (SMBs) anywhere from $5,600 per minute, to between $8,600 and $74,000 an hour. Whether it’s business continuity for users in retail/point-of-sale (POS), construction, banking, insurance, restaurants and hospitality, or its primary connectivity for end users in utilities, transportation, security, municipalities, kiosks, ATMs and digital signage, in addition to the financial drain, IT failures have far-reaching repercussions that can result in permanent client loss, missed deadlines, devalued brands and more. Fleet Management And Asset Tracking SensLynx Seamless Failover automatically rescues lost primary wired or broadband connections to maintain business continuity Though many backup options exist, most are complex or costly, and almost none provide a complete and easy to set up solution. SensLynx, widely known for its popular fleet and asset tracking program, painstakingly designed its new suite of seamless IoT solutions to fill this void. Their integrated plug-and-play bundle comes with everything needed to prevent interruption including software, hardware and connectivity, plus fully managed services and monitoring built-in through their cloud manager services, all wrapped up in one low monthly rate. SensLynx Seamless Failover automatically rescues lost primary wired or broadband connections to maintain business continuity. SensLynx Seamless LTE almost instantly deploys primary connectivity to new or temporary (pop-up) locations, while also functioning as a backup or secondary connection. Its applications encompass trade shows, oil and gas remote monitoring, in-vehicle, mobile or portable uses, disaster recovery and every other primary connectivity category. Both solutions are feature rich and ready-to-go, but it’s the SensLynx Seamless SD-WAN technology that’s truly changing the connectivity game. SensLynx Seamless SD-WAN Technology Initially, SensLynx Seamless IoT Solutions will focus on cellular carriers, master agents, telecom VARs and managed service providers (MSPs) We all need reliable IT connections, but we all want faster speeds and broader throughput. SensLynx Seamless SD-WAN delivers both. This solution is capable of combining multiple wireless or wired networks (e.g. cable, DSL, and broadband), into one seamless and super-quick connection that’s unbreakable. Even if one goes down, the others will continue. That means customers benefit from ‘always on’ connectivity and increased productivity to boot. Traditionally, SD-WAN technology of this caliber is too cost prohibitive for SMBs, but with SensLynx’s introduction of Seamless SD-WAN, what was once unattainable is now accessible. Rob Garry, SensLynx Co-Founder and CEO said, “I’ve worked with the most prominent wireless communications companies in the world and founded two IoT/M2M corporations in the last 20 years but, until now, I’ve never been more confident in the potential success of our new solutions.” Initially, SensLynx Seamless IoT Solutions will focus on cellular carriers, master agents, telecom VARs and managed service providers (MSPs). However, being partner-centric, SensLynx is already in development on a synergistic Channel Partner/Reseller Program to support indirect sales avenues. “By simplifying IoT and providing SMBs with bundled, affordable solutions, worry-free wireless failover and primary connectivity, SensLynx is fulfilling its vision of bettering businesses with cost savings and efficiencies,” said Tom Maguire, COO and CMO of SensLynx.
Opening up new possibilities for competitive video surveillance deployments in retail, restaurant and small business applications, IDIS has launched a compact range of robust, high performance cameras and recorders. The IDIS Compact Solutions series is designed for rapid installations and both single and multi-site roll outs, allowing for the mixing and matching of analog and IP technologies, making upgrades and system extensions more affordable than ever. IDIS Compact Solutions The new line includes a choice of network and HD-TVI cameras and recorders, all of which are easy to install through one-click network configuration. A highly competitive price point comes without any compromise on IDIS’s signature reliability and performance, while hardened network security protocols provide complete reassurance against hacking risks. The new Compact Solutions line features 4-channel compact recorders that can be conveniently desktop or wall mounted, and for end-users and operators - including branch managers, small business owners and security personnel – the line combines high performance features with simple operation and a choice of client software. The IDIS Compact Solutions range is hard-wearing, making it particularly durable and perfectly suited for busy environments where reliable capture of high definition video images is important. IDIS Dome And Bullet PoE Cameras IDIS’s DC-D4212R dome and DC-E4212WR bullet PoE cameras are perfect for confined spaces yet deliver full-HD performance IDIS’s DC-D4212R dome and DC-E4212WR bullet PoE cameras are perfect for confined spaces yet deliver full-HD performance in live view and playback (including on remote devices such as smartphones) and come with motion detection, tamper alarms, zoned privacy masking, day and night ICR and IR LED up to 20m. A choice of four and eight channel IP or HD-TVI recorders allows fast and trouble-free installation and lets installers take advantage of existing coax cabling. The IP recorders also benefit from H.264 live view which eliminates the need to upgrade hardware peripherals. For highest performance streaming capacity, H.265 and IDIS Intelligent Codec compression deliver bandwidth savings of up to 90 percent, ensuring smoother real-time viewing and full evidence retention. “The new IDIS Compact Solutions line continues our longstanding tradition of market-responsive offerings, designed and developed in house to meet the real-world needs of our industry partners and end-users. This new line of fills an important need in the market, for high value, high performance technology from proven market leaders able to reliably meet highly specific requirements in vertical spaces, such as retail, and smaller business operations,” noted Keith Drummond, Senior Director, IDIS America. IDIS Total Solution As with all IDIS products the Compact Solutions range is backed by industry-lauded technical support and service, including the company’s global technical support operation, co-located with IDIS America’s regional headquarters near Dallas, Texas. The new IDIS Compact Solutions line is the latest offering in the powerful and award-winning IDIS Total Solution—an end-to-end, single sourced offering that delivers unrivaled plug-and-play simplicity (combined with highest-quality performance, compatibility, now featuring the longest recorder warranty in the industry), with a low total cost of ownership.
Eyecloud Cam, smart home security camera, is now available via a Kickstarter campaign. Aimed at keeping house, family and belongings safe, Eyecloud Cam ensures affordable security with a single Eyecloud Cam costing less than $100. Eyecloud Cam Home Security Camera Eyecloud Cam is a home security camera that constantly monitors the safety of the family and home by putting one of the most advanced computer vision AI technology right inside the camera. After positively identifying a threat, Eyecloud Cam sends out a notification with a description of the event, with unprecedented accuracy as to why it has chosen to send out this alarm. To make a Smart Home even more safe, Eyecloud is working on making the Eyecloud Cam fully compatible with Amazon Alexa. Computer Vision AI Technology Eyecloud Cam is completely cordless and requires no base station to operate The Eyecloud Cam is stylish, yet compact and discrete. Put the easy-to-mount Eyecloud Cam at the precise location to facilitate 24-hour detection and surveillance. An Eyecloud Cam at the front door can monitor visitors, inside the home, the Eyecloud Cam can warn of intruders, watch over pets and children, or could help provide early warning of safety incidents. To ensure the safety of property, put an Eyecloud Cam in the backyard or watch over the garage. With its long six-month battery life, onboard AI, and 8GB of local storage, Eyecloud Cam ensures all-round residential, family, and property security, even while power and internet access are unavailable. Eyecloud Cam is completely cordless and requires no base station to operate. Configurable For Alert Situations The cam's smart technology can tell the difference between intruders, visitors, acquaintances, or kids playing in the backyard, and sends alerts only when it detects unusual events. For privacy reasons, the Eyecloud Cam will send a text notification warning to all the connected users, who can then open the app to find out the real reason for the alert. The Eyecloud Cam is completely configurable for alert situations, from snapshots or videos, the owner is in complete control.
Cobalt Robotics, a manufacturer of intelligent security robots used to autonomously patrol indoor facilities, will unveil its new leak and spill detection sensing capabilities as part of the Global Security Exchange, one of the largest tradeshows and conferences to showcase the latest security technologies. At last year’s event, previously called the ASIS Annual Seminar and Exhibits, Cobalt Robotics was the recipient of the 2017 Judges Choice Award, the highest honor available as part of the ASIS Accolades Award program. The Judges Choice Award recognises the most innovative product of the year. Leak and Spill Detection Sensing Technology With its new leak and spill detection sensing technology, Cobalt robots can be programmed to detect a leak or spill within a predefined area With its new leak and spill detection sensing technology, Cobalt robots can be programmed to detect a leak or spill within a predefined area. Once detected, the security robot can then send the appropriate notification to a robot Specialist. Cobalt robots are equipped with powerful sensors, including day-night cameras, thermal sensors, motion sensors and badge readers, which helps it to detect anomalies and other risks that might not be detected by the human eye. “Security robots provide corporate security directors with a powerful tool that amplifies their resources and allows real-time alerts to the right security personnel about an event, such as an open door, a spill, or an unauthorized individual in the building after hours,” said Dr. Travis Deyle, CEO and co-founder of Cobalt Robotics. “Security professionals are finding that security robots are a valuable addition to their security toolbox, enabling them to integrate technologies and leverage the benefits of machine learning technology.” Security Robots Cobalt Robotics was founded in 2016. Since then robots designed and developed by the technology start-up have been deployed by several well-known companies, including Yelp, Credit Karma and Slack. The company has also raised $16.5 million in venture capital funding through partners such as Sequoia Capital, Bloomberg Beta, Storm Ventures and Founders Fund. GSX will be held at the Las Vegas Convention Center from Sept. 24-27th in Las Vegas. More than 20,000 security professionals, which includes corporate security directors from Fortune 500 companies, universities, healthcare facilities, and financial institutions from around the globe, are expected to attend the event. Cobalt Robotics will be exhibiting at GSX at booth 353 and be featured in the D3 Xperience – Drones, Droids, Defense located at Booth 5602.
By now your organization should know the drill. To keep your enterprise safe from unauthorized access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world. Protect Against Burst Attacks You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017. Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack. They recommend adopting two key solutions: 1) a behavioral DDoS protection system that utilizes machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred. Prioritise Network Infrastructure Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it? In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list. Hide Sensitive Web Pages From Search Engines Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible. Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches. Update Passwords On Your IoT Devices Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update. Use Encryption To Protect Data In Transit Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information. This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall video footage. Active Archive Strategy These challenges are thrusting storage tiers to the forefront of system design. Storage tiers in video surveillance had previously meant simply using a separate archive or attaching add-on capacity directly to network video recorders. Many of the new storage options designed for video surveillance are pulling together different storage tiers into a single storage architecture Many of the new storage options designed for video surveillance are pulling together different storage tiers (and in some cases storage media) into a single storage architecture, such as an active archive solution. This balance can be achieved with an active archive strategy that automates migration of data between different storage types, to ensure the data is on the correct storage type at the correct time to meet performance and retention requirements without blowing the budget. This approach also ensures ease of access while automatically moving content from more expensive tiers of storage to more cost-effective long-term tiers of storage. This allows for greater efficiencies in how recorded footage is treated throughout its lifecycle. In some cases, it includes moving data from edge devices to centralized storage, and then to the public cloud. Scalable Video Storage Solutions As storage demands have increased, video management vendors have turned to storage specialists for solutions that can accommodate large numbers of high-resolution video files, metadata associated with the footage for easy searching, along with much needed scalable solutions. In terms of video management software, this means the integration of video content from different storage types, tiers and physical locations is required, and which considers the performance profile of each storage type. With an active archive solution, video content is searchable and accessible directly by the end users regardless of where it is stored. Deploying an active archive solution enables surveillance users to reduce the complexity and costs of managing data for long term retention As seen in many product categories, camera and storage vendors continue to provide extremely competitive offerings. But, storage-specific solutions for video surveillance have lagged behind the roadmaps for video equipment and, as more and more cameras have entered the market, less attention has been placed on video storage capacities. Tiered Storage Strategy The surveillance industry has evolved considerably from the days of the 8mm video recorder; however, enterprise storage solutions will be forced to evolve further to cope with changing storage retention requirements. Video storage is quickly becoming one of the most expensive parts in a surveillance solution, but there is hope. Deploying an active archive solution will enable surveillance users to reduce the complexity and costs of managing from terabytes to petabytes of data for long term retention. By finding a storage solution that delivers the ability to implement a tiered storage strategy, users can adhere to regulation requirements to retain video footage and meet their safety and security objectives, while also significantly reducing storage costs and operational expenses.
The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server which manages the access control system. The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020, according to a new report. Market research company Technavio says the market for security as a service will grow by a compound annual growth rate of 12.7% a year during the period 2016-2020. Currently, according to its new report ‘Global Security as a Service Market 2016-2020’, the Americas is by far the largest region showing 2016 revenues at $595 million; with Asia-Pacific at $142 million; and Europe, Middle East and Africa at $185 million. “The increasing need for high-level data and identity security in corporate firms, coupled with an increasing amount of critical and confidential data, is compelling large enterprises and SMEs to implement ACaaS,” explains Technavio analyst Amrita Choudhury. “The increased use of mobile devices for professional and personal use makes the devices vulnerable to attacks. Enterprises are adopting ACaaS for greater control over access to applications and sensitive information from remote locations.” Fighting Retail Shrinkage With VSaaS Choudhury says the market is split into three end-user segments – commercial, government, and residential. The commercial sector is the largest, accounting for around 56% of the market. Within this sector, retail firms are the biggest users of security as a service, as many already have in place video surveillance, electronic article surveillance and radio frequency identification systems. Increasing retail shrinkage will encourage more retailers to adopt effective strategies such as the installation of advanced surveillance systems to enhance their security Retail shrinkage in the US rose from around 1.27% of sales in 2013-2014 to over 1.96% of sales during 2014-2015. Shoplifting was the biggest cause of retail shrinkage in most countries in 2015. Since users in the retail sector need to have significant space for video storage and tamper-proof or tamper-evident systems, it is not surprising that they are major potential users of security as a service. Increasing retail shrinkage will encourage more retailers to adopt effective strategies such as the installation of advanced surveillance systems to enhance their security solutions. These are increasingly using high resolution cameras which are bandwidth hungry and more expensive than conventional surveillance cameras. Similarly, the financial sector is a big user of security systems such as surveillance in banks and at ATMs.US To Dominate International Markets In the United States, the increasing demand for real-time identification of threats and transmitting information to law enforcement officials is driving the adoption of advanced security systems in the region. Analysts estimate that the Americas will account for more than 64% of the total revenue share of the market by 2020 and will also dominate the market throughout the forecast period. “From criminal activity to predictive analytics and marketing, organizations in the public as well as the private sector are benefitting from video surveillance,” says Choudhury. “The accuracy of the video surveillance technology has completely changed the way criminal cases are being tried. End-users are becoming aware about the benefits of video surveillance that provide a good amount of information to help manage, monitor and resolve some of the critical situations.” Suppliers of video products and solutions are also upbeat about video surveillance as a service. “The two main advantages of VSaaS for the customer are function and finance,” says Xander van Baarsen, Marketing Manager for Panasonic Cloud Management Service Europe. “VSaaS comes with low start-up costs and low recurring costs, making it easy to start and easy to scale. Because of constant development, the customer is never out of date: every month comes with new features, bug fixes and application updates.” One brake on the rapid growth of video surveillance as a service is the cost of providing a hosted video service Measured Growth For VSaaS But despite the optimism, van Baarsen sounds a note of caution. “VSaaS hasn't yet shown a rapid growth but it has been proven to have both functional [and] financial advantages compared to traditional systems. In the coming years, we expect to see growth for VSaaS in the SME and SOHO markets. With upcoming features like improved, user-friendly software and cameras that connect not only over Wi-Fi but also via mobile networks, we predict the VSaaS market will grow beyond the traditional [user markets].” Panasonic offers several VSaaS products, such as Cameramanager, a cloud-based surveillance solution which comes with desktop and mobile applications, as well as a range of indoor and outdoor cameras. The Cameramanager video stream is available as an API, so it can be integrated into range of solutions. In addition, the recently launched Nubo – claimed to be the world’s first monitoring camera that connects over 4G – opens the market to areas which may be isolated or outside Wi-Fi locations. Meanwhile Bosch Security Systems, which offers a range of remote video services for central monitoring stations, says with its cloud-based monitoring services, central monitoring stations can prevent damage, verify intruder alarms, increase the safety of employees and support business processes – all remotely. "VSaaS hasn't yet shown rapidgrowth but has been proven tohave both functional andfinancial advantages comparedto traditional systems" “The central monitoring station does not have to invest in an expensive video platform to do remote video monitoring,” says Bosch’s Head of Cloud-based Services Michael Gürtner, “and due to the seamless integration of our solution in the existing alarm automation platform, the CMS can operate the video services very efficiently. Customers benefit from less hardware costs and less installation time compared with traditional on-site surveillance, since no DVR and no VPN is needed. The camera connects directly and securely to the cloud and can be configured remotely.” Barriers To Expansion So are there any barriers to the rapid deployment of security as a service around the world? While the security systems market is becoming increasingly global, expanding business across Europe is still problematic, due to the “complex and restrictive nature of security product certification” in these countries, according to Technavio’s Amrita Choudhury. “Manufacturers are facing uncertainty regarding the standards against which the security solutions should be developed,tested, and certified.” Another brake on the rapid growth of video surveillance as a service is the cost of providing a hosted video service. Another is the nature of broadband connections – many are asymmetric, meaning that the upload speed is often much lower than the download speed. India is one of the fastest growing markets in the region, with Indian organizations using on average around 250 cameras per installation. The surveillance market in India is expected to grow at a rapid pace because of the country's focus on developing smart cities and the increasing need for better security and safety. “The primary reason for the growth of the region's market is the emergence of many SMEs, which are rapidly adopting video surveillance devices. The region is also predicted to adopt new technologies such as cloud-based services.” Save Save
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow drones to fly autonomously, using global positioning systems (GPS), vision sensors and algorithms to constantly analyze what the drone “sees” through an on-board camera. The system can work with any camera that provides an adequate image for real-time vision algorithms. Perimeter Security At ASIS Tyco Integrated Security invited Percepto to display its technology in the large integrator’s booth at ASIS. “It was the first show where we targeted perimeter security,” says Ariel Avitan, Percepto’s Chief Commercial Officer. “Tyco took us under their wing. We had about 100 conversations at the show. After about 10 minutes everyone understands the business logic behind the solution. You have to talk to the end users to understand that your concept is validated.” Percepto is in the contractingphase with TycoIS and alsohas a number of other pilotprojects, including energycompanies in Europe TycoIS is also working with Percepto on several pilot projects to demonstrate and fine-tune the technology. Percepto is in the contracting phase with TycoIS and also has a number of other pilot projects, including energy companies in Europe. “Our challenge is robustness,” says Avitan. “The technology is trustworthy. We just need to make sure the system is. And the industry needs to identify applications where we can provide more value.” Autonomous Drone Performance Percepto’s products include a hardware base station to control the drones, and the PerceptoCore module is installed on board the drone to allow it to interface with the base station. The core is pre-loaded with multiple task applications that enable the drone to perform tasks relevant to its purpose – autonomously. The “core” can be installed on almost any size or type of drone, whatever the manufacturer. In addition, Percepto provides an interface that integrates with existing systems in the security department’s control room. Cloud management software enables remote access and management of multiple drones. The software collects, analyses and presents data, while streaming live video on an ongoing basis. Perimeter security is just one application where drones will be deployed in the near future. Having a drone stationed on-site, charged and protected by its hub, enables fast reaction to any need in the field, day or night. Additional sensors and other equipment can be added to drones to detect gas leaks, thermal energy, or smoke, and even to provide life safety capabilities. Lighted drones with voice messaging could be used to direct employees or the public to the best exit route in case of a mass evacuation. 24/7 Perimeter Security Using drones to patrol 24/7 addresses the needs of perimeter security. Adding more sensors and providing additional data to operators helps expand the system’s utility and increase return on investment (ROI), says Avitan. “These applications are a tremendous benefit for security,” he says. “We actually find that adding safety and inspection applications is a good way to increase security. When you have a drone that knows how to provide ROI, it saves tons of money. It’s always about security, but above that we want to add value and increase ROI.” In addition to perimetersecurity, drones will soonbe used to inspect thethousands of solar panelsat solar energy sites In addition to perimeter security, drones will soon be used to inspect the thousands of solar panels at solar energy sites. Drones with cameras can detect the presence of dust or other factors that lower solar-panel efficiency, or cracks or malfunction of the actual panels. Thermal imaging on board a drone can detect which panels are under-performing. Drones could also be used to provide alerts if a transformer or cabling overheats in a power plant or critical infrastructure application. Restrictions On Drones The U.S. Federal Aviation Commission is evolving its position on autonomous drones. Drones are restricted from populated areas, can only fly at certain altitudes, and must be equipped with lights if flying at night. Currently, applications require that there be an unmanned autonomous vehicle (UAV) pilot on site, maintaining “line of sight” with the drone, who can take control if needed. However, the requirement for the UAV license has been lowered to allow certification with an online course. There have also been some exemptions granted for the line-of-sight requirement (e.g., railroad inspections). “We include control mechanisms now to be compliant, and when the barriers come down, we are ready for that,” says Avitan. Many global jurisdictions are following the FAA’s lead, although some countries do not regulate drone traffic. Avitan says he expects regulators to allow drones to fly autonomously beyond line of sight in specific closed facilities in the next 12 months. Based on the pilot projects, Percepto will fine-tune the system, streamline manufacturing and launch a fully commercialized system by Q1 2017. Avitan expects to have up to 100 units deployed in 2017, and up to 1,000 units deployed in the next 18 to 24 months. Like I said: Sooner than you think.
Located southeast of Los Angeles, California, the City of Whittier hosts a water pumping utility installation that provides water to the businesses and residents of the surrounding Gateway Cities Region. In recent years, the installation routinely suffered attacks by vandals and looters, resulting in regular defacement with graffiti and the theft of copper components from pumping stations. This caused interruptions in service to businesses and residents across the surrounding cities. To ensure the security of the water installation and avoid public health and safety concerns, the City of Whittier turned to a virtual guarding solution from iNet Security LLC. iNet Security leveraged comprehensive monitoring from the Surveillance Acquisition Response Center (SARC), powered in part by IDIS technology, for a high-performance video surveillance solution that has already shown powerful results. Enhancing Multi-Site Security And Safety The City of Whittier turned to a virtual guarding solution from iNet Security LLC With the health and safety of the City of Whittier and its surrounding region potentially at risk, it was essential that any security solution deployed by the city be dependable, effective, and capable of low-maintenance 24/7 monitoring. The system also required ease of remote use as the installation is located in a remote wildlife preservation area far from the city center. Any surveillance solution had to: Secure multiple locations within a remote wilderness location Manage authorized access to installation premises Maximize security of the installation with encryption speeds capable of constant live monitoring Provide compatibility and integrate seamlessly with SARC virtual guarding systems Enable the coordination of live responses to security events Feature intuitive software that is easy for users to operate and master. Representatives of the City of Whittier reviewed systems from several manufacturers before they determined that the virtual guarding solution from iNet Security, powered in part by IDIS, would best meet their requirements. DirectCX Technology And Center VMS The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology SARC and the City of Whittier leveraged technology from the high-performance and cost-effective IDIS DirectCX solution and IDIS Center video management software (VMS) to meet their remote monitoring needs. The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology. IDIS incorporated its expertize in image processing to provide unrivaled HD recording performance at an affordable price point for the responsibly cost-conscious City of Whittier. Designed for simplicity, convenience, and performance, the DirectCX technology and the powerful, full-featured IDIS Center VMS incorporated by iNet Security have proved to be optimal components of the comprehensive solution, meeting the challenges faced by the City of Whittier. IDIS HD-TVI DVR The most powerful IDIS HD-TVI DVR, the TR-4116 16 Channel Full HD Recorder, offers: Support for HD-TVI, 960H, and analog cameras Up to 480ips Full HD recording Full HD display with HDMI and VGA output Support for CVBS spot monitor Long distance transmission over coaxial cable Support for HD-TVI camera OSD control over coaxial cable Expansion up to 32TB using 4 SATA interfaces and 1 eSATA storage interface One click network configuration using IDIS For Every Network (FEN) service Dependable Security Environment IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations In partnership with iNet Security and SARC, IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations. Within the first week of installation, a group of vandals was caught attempting to fault the installation fence and was successfully deterred remotely using SARC’s remote “voice-down” protocol. In a dramatic security and safety success, the system was used to coordinate a fast and effective response to two isolated fires as well as a dangerous wildfire that threatened both the utility and surrounding wildlife. SARC operatives utilized IDIS technology, in part, to accurately and quickly guide first-responders through the remote wilderness to the site of the fires, minimizing damage and risk to the surrounding areas. Thanks to the power and performance provided by the iNet Security solution, including IDIS DirectCX technology, the City of Whittier is benefiting from: Low total cost of ownership Unparalleled ease of use through the IDIS Center VMS Complete dependability of system components Lower system maintenance requirements A scalable solution to allow for expansion to additional installation sites
March Networks, a global provider of video security and video-based business intelligence, is pleased to announce that one of Qatar’s top banks is deploying the company’s business intelligence software and integrated analytics to improve customer service and operations. The customer is one of six Qatari financial institutions currently using March Networks systems for advanced video surveillance and fraud prevention. The bank is already using an end-to-end March Networks video recording and management solution in all of its Qatari retail banking branches, hundreds of ATMs, and multiple corporate facilities. It is expanding that solution with Searchlight for Banking software to deliver an enhanced customer experience and strengthen its fraud investigation capabilities. Detecting Suspicious Transactions The software helps banks evaluate and improve customer service using dwell time, queue length and people counting analyticsMarch Networks Searchlight for Banking combines surveillance video with ATM/teller transaction data and analytics to deliver powerful fraud-fighting tools, such as the ability to rapidly detect suspicious transactions and potential cases of ATM skimming. The software also helps banks evaluate and improve customer service using dwell time, queue length and people counting analytics. The bank started using March Networks several years ago to ensure compliance with CCTV legislation first introduced by the Qatari Ministry of Interior (MOI) in 2011. The law mandates that all banks equip their locations with IP video surveillance, record at a minimum 3-megapixel resolution and 20 frames per second, and ensure 120 days of video storage. The bank, which was using an analog video surveillance system at the time, needed an enterprise-class video solution that could meet the MOI regulation. It was also looking for a solution that offered remote video management, system health monitoring, and the ability to scale easily to accommodate future growth. Command Enterprise Video Management Software March Networks products have proven highly reliable and are able to meet the parameters set by the Qatar Ministry of Interior regulations"When the project went to tender, only the March Networks solution performed to all of the bank’s criteria, said its group safety and security manager. “With the March Networks system, we are able to fully comply with the law. The usability and health monitoring features of the Command Enterprise video management software are also excellent, enabling us to investigate and resolve potential system issues before they become critical.” According to ISC Group Gulf, a systems integrator in Qatar with a specialized focus and expertise in the banking sector, the March Networks solution is the best choice for banks in the region. “March Networks products have proven highly reliable and are able to meet – and often exceed – the parameters set by the Qatar Ministry of Interior regulations, as our organization has seen in our work with most of the country’s major financial brands,” said Cristian Ivan Nicolae, Project Manager, ISC Group Gulf. CCTV Products For Banking Environments We are fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks"“In addition, March Networks offers the sole CCTV products in Qatar purpose-built for banking environments, which means you are getting a secure, highly-professional solution that is easy to scale in complexity.” “We are proud of our long-standing partnership with this Qatari bank. It is a leader in the use of innovative video technologies, and clearly understands the value intelligent video offers to its organization,” said Trevor Sinden, Director, Middle East and Africa Sales, March Networks. “We are also fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks.” March Networks will showcase its security and business intelligence solution for banks, as well as its complete enterprise video portfolio, in Stand S1-J42 at Intersec 2019, January 20-22 in Dubai, UAE.
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-Site CCTV Surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Center, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Center, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defense Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defense. High-Definition Video Security To Secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfill the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedized Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ Camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analog and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analog systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP Video Streaming Networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminum and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical Relationship With 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centers via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-Speed Fiber-Optic Connectivity High-speed fiber-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting And Deterring Power Thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch Video Security And Intrusion Detection Systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
A total of 2,700 Sony network security cameras are the dependable choice to watch over passengers’ safety for Catalonia’s biggest transport operator. Public transit operator Transports Metropolitans de Barcelona (TMB) runs one of Europe’s most technologically advanced and accessible metro system that comprises nine lines and 150 stations. TMB’s metro and local bus lines carry over 550 million citizens, commuters and travellers annually across the Catalan capital and surrounding areas, making safety and operational efficiency high priority topics. Round-The-Clock Reliability In recent years, TMB elected to update its analog infrastructure, replacing older cameras and extending coverage to create a metro-wide IP video surveillance system. Sony cameras has made them an optimal choice for the recent upgrade to monitor train tracks, station platforms and other public areas The relationship between TMB and Sony dates back more than fifteen years, when the operator installed its first 150 Sony cameras at several metropolitan bus depots to protect perimeters, parking areas, workshops and office spaces. The proven reliability of Sony cameras has made them an optimal choice for the recent upgrade to monitor train tracks, station platforms and other public areas where reliable 24/7 performance is essential. As well as round-the-clock reliability, Sony cameras provide excellent HD image resolution, which was another key requirement for the project. Support for open protocols, including the widely used ONVIF standard, simplifies integration with other security and monitoring systems. Reduced Operating Costs By standardising on a small number of camera models, TMB has further benefited from simplified maintenance and reduced operating costs. To date, TMB has installed a total of 2,700 Sony IP network cameras across its transportation network with more than 700 of them being Sony SNC-EB630 box-type models. A custom housing protects the cameras from dust, dirt and physical tampering while allowing easy cleaning of the front lens window. The SNC-EB630 offers excellent Full HD image quality with wide dynamic range, even in dim or harshly-lit environments where other cameras often struggle to see clearly. Built-in image stabilisation assures crisp images, even when the camera is being shaken by mechanical vibration from nearby trains. Effective Visual Deterrent Picture quality and sensitivity are major assets when monitoring the movement of passengers in congested station areas The SNC-EB630 also scores in station areas where harsh fluorescent lighting can be strongly reflected by platform surfaces, making identification of people and objects difficult. Here, Sony’s View-DR technology boosts the cameras’ dynamic range to accommodate a wide range of light levels in the same scene. The cameras’ widespread presence serves as an effective visual deterrent, and as a useful tool to clearly identify and resolve incidents involving passengers and staff. What’s more, picture quality and sensitivity are major assets when monitoring the movement of passengers in congested station areas, or directing station staff and first-responders to help passengers requiring assistance in the event of accidents or personal injury. Increase In The Security “Apart from superb picture quality, a key factor for us in choosing Sony cameras is their dependability” says Victor Ribera, Responsible of Telecommunication Systems in the Technology Area at Transports Metropolitans de Barcelona. "Remote surveillance is extremely important for us. We have evolved from a complete decentralized surveillance system started at our garages and workshops to a fully centralized system – based on security control centers for the operation and management of all security cameras. Image quality has improved exponentially in a short time. Together with the functions incorporated into the cameras themselves, this has resulted in an increase in the security offered to our passengers.”
Living in the era of global village, everything is rapid change. To keep up with the pace, the large-scale enterprises need to take every movement of branches in control, ensuring every policy has delivered well. HQ-Branch management, including central control, alarm synchronization, data retention and protection is becoming a great important challenge to enterprises nowadays. Without integrating lots of systems and management tools, Surveon HQ-Branch security solutions provide VMS with easy remote deployment, advanced VA for alerts and post events search, storage with large capacities for 365-day recording, and local /remote replication through NAS or ISCSI, supporting headquarters (HQ) to easily manage all branches. Surveon Control Center And Enterprise NVRs Surveon Control Center provides enterprises with an easy remote deploymentUnlimited number of cameras, users, NVRs, and monitors are supported in one domain architecture, Surveon Control Center (SCC), which provides enterprises with an easy remote deployment. Its monitor wall can be set up with any combination of camera views, making HQ can be easier awarded every branch's movements. Surveon NVR embedded 12 Video Analytics which can identify and initiate alerts for various user-defined events, offering effective monitoring, detections, alerts, and responses to events for enterprises. For example, intrusion detection can prevent uninvited people from entering the sensitive areas. Moreover, the advanced Post VA Search provides enterprises an efficient tool to quickly identify useful information and relative footage from hundreds of hours of video recording, reducing the time and efforts of HQ security manager, making HQ-branch surveillance system more efficient. Data Retention And Storage Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recordingThe data retention of recorded videos and the system which can support hundreds of camera records are of great importance to the planning of enterprise surveillance. Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recording, fulfilling the long-time storage requirements from enterprises. Surveon NVR supports remote replication through NAS or ISCSI. Enterprise can keep 1st copy in local branch and 2nd copy in remote HQ. If the source data fails due to system malfunctions or disasters, enterprise can leverage the remote copy to restart services in a few minutes. Software Integration Agribank, the largest commercial bank in Vietnam, and House Green, a home improvement retail chain in Taiwan, has adopted Surveon HQ-branch solutions. “Different from PC-based NVR solutions, Surveon adopts a system design fully customized for surveillance applications. This offers higher value for SIs, including advanced levels of integration and stability.” said the Sales Director of Surveon partner in Vietnam.