Pelco by Schneider Electric, the trusted global provider of end-to-end video security solutions, will be exhibiting products, solutions, and services for several market segment applications at ISC West 2019, held in Las Vegas from April 10-12. Pelco is shaping the future with leading technologies such as Cloud Services, Automatic License Plate Recognition, 4K imaging capability, and advanced deep learning-based analytics. Pelco will showcase VideoXpert Video Management System (VMS) platform enh...
Visitors to The Security Event will be among the first to see live demonstrations of some of the latest products to be launched by Tyco, the security division of Johnson Controls. A wide range of access control, intrusion and video products from the American Dynamics, Exacq, Illustra, Bentel, CEM Systems, DSC, Kantech, Software House and Visonic brands, which are supplied under the Tyco umbrella, will be on show on stand SE102. These include: Access Control Credential iotega, an all-in-one sm...
Dahua Technology, global video-centric smart IoT solution and service provider, has unveiled its H.265 Mobile Video Recorder series. Specific products that were launched include the Dahua MXVR1004, MXVR4104, MNVR4104, and MNVR4208. Upgraded in performance while retaining the same price, all the new Dahua Mobile Video Recorder products adopt H.265 technology, offering a cost-efficient choice for mobile solution. H.265 Mobile Video Recorder Series Featuring cutting-edge H.265 video compression,...
Casino operators are looking intensively for solutions to transform the multitude of process data into useful business intelligence information. With its 'Smart Casino Solutions', Dallmeier is pursuing a unique approach in which the manufacturer's video technology is linked to AI systems. At G2E Asia from 21.05.2019 - 23.05.2019, Stand A301, Dallmeier will present solutions for the three main casino areas of gaming, surveillance and marketing. Many casino operators are still struggling with und...
ISC West, the largest converged security event in the U.S., introduces the lineup for its 2019 education sessions, in collaboration with premier sponsor the Security Industry Association (SIA). In partnership with SIA, ISC West will be making educational sessions available during its 2019 ISC West show taking place April 9-12, 2019 at the Sands Expo in Las Vegas, Nevada, with SIA Education@ISC kicking off the day prior to the exhibition on April 9. The comprehensive program includes 85+ accredi...
Connected Technologies LLC has released GeoView, a new feature that adds the power of Google Maps to the award-winning Connect ONE cloud-hosted security management platform. GeoView allows users to see status for all locations instantly in a wide-area satellite map and drill down into each location for real-time alarm, health and system monitoring and control. With GeoView, dealers can offer different levels of managed services while the end-user easily interacts with the solution, making for a...
Employees from Hikvision USA Inc., a provider of security hardware equipment and software solutions, worked with non-profit Mission 500 to assemble 250 backpacks with school supplies for students who attend East Hartford, Conn.-area Title 1 schools. Members of Hikvision’s Northeast regional team volunteered at Mission 500 partner World Vision’s Teacher Resource Center in East Hartford, Conn. The resource center warehouses donated learning and classroom supplies that are provided to teachers at qualifying Title 1 schools. Title 1 schools have large concentrations of low-income families. Backpack supplies were purchased with donated funds from Hikvision. Helping Under-Served Children “It was a rewarding experience to work together with the Hikvision team during the holiday season to help under-served children in the East Hartford community. This year is the Mission 500 10th Anniversary, and we are excited by the expanded participation of organizations like Hikvision that are committed to stepping out in creative ways to touch lives by increasing their corporate social responsibility impact,” said Tom Nolan, director of strategic partnerships for Mission 500. We discovered that backpacks filled with school supplies were much needed in the community, and would have the greatest impact on the kids" “Hikvision's Northeast regional team wanted to invest our time in giving back to the communities we work in. Through Mission 500, we discovered that backpacks filled with school supplies were much needed in the community, and would have the greatest impact on the kids in East Hartford,” said Andre Greco, director of sales for Hikvision. Participation In Volunteer Events Seven Hikvision team members met at the Teacher Resource Center and spent the day building care kit backpacks and writing encouraging messages to students to be included in the backpacks, and also helped to unpack and sort donated goods from large retailers, he added. Mission 500 is a non-profit organization that works with the security industry to serve the needs of children and communities in crisis. An active partner of Mission 500, during 2018, Hikvision employees participated in several volunteer events, including the third annual Mission 500 February Hockey Classic in Toronto, the Security 5K/2K at ISC West in April, and the November Puerto Rico service trip where Hikvision employees helped victims of Hurricane Maria rebuild their homes.
Senstar, a global provider of video management and perimeter intrusion detection solutions (PIDS), is pleased to announce the release of Symphony 7.2, the latest version of its intelligent video management software (VMS). The award winning Senstar Symphony delivers an all-in-one solution for video management, video analytics, PIDS integration, and alarm management for deployments of all sizes. Key Highlights: Securely share video clips with 3rd parties with integrated cloud video upload feature Revamped Alarm Console allows for better event management with simplified workflow Seamlessly navigate from camera to camera with Visual Tracking Links PostgreSQL database support Streamlining User Experience “The latest version of Symphony further streamlines the user experience by reducing task effort in common scenarios such as video export and alarm management," said Justin Schorn, Vice President of Product Management at Senstar. "With Symphony 7.2, we continue to build on our success as one of the industry’s most trusted and reliable video management software providers." Senstar Symphony 7.2 is available worldwide in Arabic, Chinese (Simplified), English, French, German, Portuguese, Spanish and Turkish. Senstar hardware appliances such as the R-Series can be upgraded to the latest version with a valid maintenance agreement.
At ISC West, in booth # 26061, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence will unveil a new version of Security Center, the company’s open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. With customisable live dashboards, enhanced privacy protection features, a brand-new map-driven mobile app, and new functionalities that help users actively monitor the health of their system and ensure compliance with cybersecurity best practices, version 5.8 will ensure that users can optimize their physical security environment while benefiting from greater visibility into their operations. Valuable Contributing Sensor Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system Security Center 5.8 will enable users to create custom dashboards that will display real-time data, such as video feeds, alarms, reports and charts in a way that is meaningful to them and their specific job function (security, operations, IT etc.). Users can set up their dashboards using simple point-and-click tools, and instantly combine data from the entire Genetec portfolio (video, access control, ALPR, etc.) in one screen to gain a new perspective on the evolution of events and key metrics across their operations. Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system when they are on the move and allow them to turn their smartphone into a valuable contributing sensor to their security system. Map-Oriented Interface In addition to recording incidents, accessing nearby video, access control, and ALPR devices as well as sharing video from their phones to Security Center, the new mobile app will let operators share their location with colleagues in the operations center, send in-app messages and share live and recorded video through an intuitive map-oriented interface. Key features will include: Video (live and recorded playback, PTZ controls, bookmarking, time- and event-based reports) Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information. Physical Security Devices With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes System administrators are acutely aware of the critical nature of security systems, but often lack the tools to assess the potential exposure of their software, operating systems and physical security devices. Security Center 5.8 will introduce a new Security Score feature to track each system’s compliance with hardening guidelines, firmware availability and updates, password strength, as well as several other dimensions of cybersecurity. Available through the built-in System Health dashboard, the Security Score will measure individual cybersecurity processes and verify that they are followed by the system. This will enable users to get a better understanding of the cyber security risks they face and enable them to take the necessary steps to harden their system. With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes, loss of image quality or tampering, and alert administrators immediately. This allows them to get ahead of problems and take the necessary corrective action immediately, rather than wait to find out there is a problem when they need footage and it is not available.
Simon Barnes, Business Development Manager – Airports EMEA at Genetec commented on the news that Police believe a current or former employee was behind the Gatwick drone incident on December 19th, 2018: “Today’s drone-related suspension of flights at Dublin airport, and the news that an insider threat was maybe responsible for the chaos that ensued at Gatwick just before Christmas shows the range of threats the industry now has to navigate. We know from speaking to airports across the world that two of the most pressing challenges they face is how they secure their perimeters (as intruders become increasingly sophisticated) and identifying ‘Friend from Foe’ as operational needs must be maintained.” Technology To Address Drone Detection “When it specifically comes to drone detection, the short-term temptation can be to introduce a dedicated new technology to address this specific threat. However, the last thing a functioning airport needs is an independent system that isn’t unified with all of the other security measures in place such as PIDs, security cameras and access control." “Only when the data from all of these inputs is visualised in one place can an airport begin to make sense of its environment and enable a fast and efficient response to evolving challenges such as the insider threat and malicious drone activities. We fully expect airports to respond to this changing landscape, to help ensure a more comprehensive response.”
Ojo Technology, one of the fastest growing security integrators in Northern California, has named Shailesh Prasad as its new vice president of operations and promoted Jeffrey Gutierrez to general manager for its growing Central Valley office. Prasad will work from the company headquarters in Fremont serving as vice president of operations and overseeing day-to-day operations as well as strategic planning and goal-setting. Gutierrez will lead the company’s rapidly expanding office in Stockton, California, responsible for operations, planning and sales. Expanding Company’s Presence The personnel changes and additions are a result of the company’s continued strong growth, according to Angie Wong, president and founder of Ojo Technology. “Shailesh and Jeff have strong systems and security backgrounds,” she said. “We are looking to them to be part of the management team that will help us continue to expand throughout the region.” Ojo Technology already has a great name in transportation, municipal and campus security" Previously, Prasad was a senior executive and engineer for Hayward-based HSQ Technology where he led integrated systems projects for organizations including BART, eBART, Sound Transit and the San Francisco International Airport. He has an extensive background in working with a variety of industries including light-rail, waste water management and airports. “Ojo Technology already has a great name in transportation, municipal and campus security,” said Prasad. “I’m looking forward to using my past experience to strengthen those markets and reach beyond them.” Experienced Security Integration Professional Gutierrez has been with the company for more than three years as director of sales. He is an experienced security integration professional. Prior to joining Ojo Technology, he was a senior account executive for Johnson Controls and has also worked with Siemens, Tyco and ADT. “We are seeing tremendous growth potential in California’s Central Valley, working with some of the top organizations in the region,” said Gutierrez. “I’m looking forward to using my years of experience to continue to expand our presence in the area.”
OnSSI announces the launch of Ocularis 5.7, the latest release of the company’s industry leading Video Management System (VMS) solution. Key featured enhancements of Ocularis 5.7 include a new Recorded Video Backup function that allows recorded video to be saved to a secondary location on the system at no extra cost. Additionally, the new Mirrored Recordings feature, available in Ocularis 5.7 Ultimate, allows the simultaneous recording of all cameras on two recording servers, ensuring that recorded video is never lost from failure of the primary recording server. Ocularis 5.7 includes numerous enhancements to improve user access and scheduling, along with more robust cyber security protection. New Data Protection Capabilities Additional enhancements in Oculars 5.7 provide users with greater speed of operations and convenience"“In addition to the superior VMS performance provided by Ocularis, this latest version delivers new data protection capabilities to ensure that critical video and information is always accessible,” said Ken LaMarca, VP of Sales & Marketing, OnSSI. “Additional enhancements in Oculars 5.7 provide users with greater speed of operations and convenience, further elevating their user experience and surveillance capabilities.” The new Recorded Video Backup and Mirrored Recordings features are just two of the enhancements offered in Ocularis 5.7. New updates to Ocularis allow system administrators to better control when users can access the system, including the ability to schedule when users can log in, as well as restricting user access during off hours. Ocularis 5.7 also employs enhanced TLS 1.2 encryption for stronger system security against cyber-attacks. Smooth Video Streaming Additional new features in Ocularis Client include: a new Export Alarm Recordings Only function for faster video export; a smooth video streaming option to improve performance when connecting to remote sites with an inconsistent network connection; faster log in times on large systems; added Smart Camera Drivers for Vanderbilt, Eclipse, Uniview and Sony Generation X imaging solutions; and two-way audio support expanded to include Bosch cameras.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymizing retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organization is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimize both their security strategies and their business operations.” - Mark Perkins, Boon Edam
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Application of artificial intelligence (AI) and deep learning in the physical security market runs a gamut from cloud computing to edge computing. A variety of hardware solutions enable AI to be deployed at any level of a system from the cloud to edge devices such as security cameras. Smarter AI-Powered Applications A distributed structure can incorporate cloud computing and edge computing. It extends the Artificial Intelligence (AI) algorithm from the cloud, to an edge network of on-premises video recorders and servers, and further to edge devices like the security cameras. The three-layer architecture all supports the goal to build a new class of AI-powered applications, being even smarter and faster. A combination of in-camera video analytics and deep learning capabilities in the cloud can improve video analyticsA combination of in-camera video analytics and deep learning capabilities in the cloud can improve video analytics. Cameras can be equipped with basic video analytics, and they are tied into a cloud infrastructure that provides additional deep learning algorithms. The cameras provide computer vision pre-processing, with the bulk of detailed analysis happening in a neural network in the cloud. Data capture form to appear here! The software-as-a-service (SaaS, or cloud) model gives companies the resources to improve deep learning. Systems are more accurate and can scale better and faster, using a larger data set from multiple customers accessing the cloud-based system. One customer benefits from another customer, and all the knowledge is aggregated together. Distribution Of Data From Edge To Cloud Cloud computing allows users with various computing capabilities to store and process data either in a privately-owned cloud or on a third-party server located in a data center. However, with the computing business becoming more and more versatile and complicated, the demand for data processing performance is even higher. In the process of data transition to the cloud, cloud computing consumes tremendous network resources and time, which all result in network congestion and low reliability. Distribution of data throughout a system, from the edge to the cloud, relieves pressure at any one point Distribution of data throughout a system, from the edge to the cloud, relieves pressure at any one point. With AI algorithms woven into edge devices, only selected information such as an individual or a vehicle in a video image will be extracted and sent which significantly enhances the transition efficiency and reduces the network bandwidth, while still sustaining high quality and accuracy. The Cloud Adds AI Capabilities The cloud provides additional data computing capabilities required for AI and deep learning applications. A single Amazon Web Services data center has between 50,000 and 80,000 servers. All told, observers estimate Amazon Web Services may have between 3 million and 5 million servers. The other major cloud services — Google, Microsoft, VMware, Citrix and others — add additional millions of servers. Amazon Web Services offers a broad and deep set of machine learning and AI services for a business AWS (Amazon Web Services) offers a broad and deep set of machine learning and AI services for a business. In effect, the service puts machine learning in the hands of any developer, enabling them to build, train and deploy machine learning models. On behalf of customers, AWS is focused on solving some of the toughest challenges that hold back machine learning from being in the hands of every developer. Capabilities are built on a comprehensive cloud platform optimized for machine learning with high-performance and no compromises on security and analytics. Advantages Of Edge Systems Deep learning and neural network computing are everywhere. They are now widely available in on-premises computers, in systems embedded in edge devices, and even in the cloud. The edge is particularly important in the video surveillance market, enabling systems to function despite any bandwidth or latency issues that would limit the effectiveness of a central server-based system. Edge-based functionality also limits concerns about the privacy of information and eliminates dependence on the availability of 3G connectivity. Edge computing makes it possible to ensure data is more private, rather than having it reside in a private or public cloud Artificial intelligence (AI) is a very computational-intensive process, and doing that processing at the edge avoids the need to do it centrally, whether in the cloud or in an on-premises computer. In the case of video cameras, in particular, there isn’t enough bandwidth to transfer video data across a network infrastructure to be processed. Half the populated world has Internet speeds of less than 8 mbps, which can’t possibly handle the level of data required for new intelligence applications. Latency is another advantage of intelligence residing at the edge. Applications increasingly require little to no latency (less than 200 milliseconds), and transferring data to be processed elsewhere takes time. Edge computing also makes it possible to ensure data is more private, rather than having it reside in a private or public cloud or on premises. Higher computing ability and efficiency of embedded systems at the edge are paving the way for physical security devices with intelligence far beyond what the industry now has to work with.
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect Anomalous Data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make Critical Decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple Camera Streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion Detection Scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
AI Is currently a buzzword in the physical security industry, and it is also a force that has the potential to transform the industry. Following are the basics of AI (and the related term “deep learning") in part one of our AI series. Artificial intelligence (AI) is the broad computing category referring to intelligence that is displayed by a machine, as opposed to a living creature. Informally, AI refers to machines that mimic the cognitive functions we associate with living creatures, such as learning and problem-solving. Trends Driving Growth In AI Three trends in the computer industry are driving rapid growth in artificial intelligence. The trends are: Data capture form to appear here! Video surveillance data makes up 60 percent of Big Data, and the amount is rising 20 percent annually Emergence of computer hardware capable of solving complex calculations, specifically graphics processing units (GPUs, which use “parallel processing” instead of “serial processing” used by familiar central processing units [CPUs]). Multiple computations are carried out simultaneously, in parallel rather than in a series. It’s a more scalable approach: Large problems are divided into lots of smaller problems that can be solved at the same time. Development of programming approaches to “train” systems more effectively, specifically neural networks, which work in conjunction with the parallel processing of GPUs. A neural network is a computing system made up of numerous simple, highly interconnected processing elements, typically organized in layers, with each layer made up of interconnected nodes. As each layer computes a result, that result determines the input for the next layer. There may be more than a hundred layers, which enables processing of large amounts of data into complex classifications. A proliferation of sensors (including video cameras) that produce a large enough mass of data to enable systems to be “trained” effectively (a.k.a., “Big Data”). The proliferation of “Big Data” ensures there is plenty of data for training. Video surveillance data makes up 60 percent of Big Data, and the amount is rising 20 percent annually. This proliferation of data feeds artificial intelligence and increases capabilities for a range of systems. Training Of An AI-Powered System In a neural network operating on a GPU, learning rules modify the weights (importance) of connections; each layer has a different “weighting” that reflects on what was learned at the previous layer. When presented with a data pattern (such as a video image), the neural network analyzes what the pattern might be. Deep learning involves use of large amounts of data from which the system can “learn” in a neural network Training involves determining how far the initial answer is from the actual one and making appropriate adjustment in the connection weights. In highly simplified terms, that’s how the system “learns.” There are multiple stages of classification, almost like filters, with each guiding the path to a correct analysis. Deep learning is part of a broader family of machine learning methods and the concept that is most relevant to the video market. Deep learning involves use of large amounts of data (for example, video images) from which the system can “learn” in a neural network. Deep Learning In Video Surveillance Systems By being exposed to many instances of data, deep learning systems discern patterns and begin to generalizeThe interconnected processing elements of a neural network, working in parallel on a graphics processing unit (GPU) to solve a problem, are designed to mimic the human brain and its billions of interconnected neurons. This aspect of artificial intelligence, known as deep learning, is the basis for a new family of video surveillance systems offering superior performance to historic systems. This approach is poised to transform the effectiveness of video surveillance systems. Historically, computers have been programmed using video analytics algorithms. In contrast, deep learning systems are “trained.” If you want to identify a cat, you provide lots of images of cats, data which the system breaks down into smaller components and looks for commonalities. It then “learns” the common characteristics among the examples. To maximize training, the more data a system is presented, the more refined it becomes – i.e., the more it “learns.” By being exposed to many instances of data, deep learning systems discern patterns and begin to generalize. From Training To Inference Deep learning can achieve super-human pattern recognition accuracy, resist interference, and classify and recognize thousands of featuresWhile a computer programmer might spend months writing instructions to tell a computer what a car looks like, a neural network can “learn” by being exposed to many examples – no additional programming involved. But training a neural network is also time-consuming; it might take hours or days to complete. Training is also computationally intensive. However, once a neural network has been trained, it can be used to “infer,” for example, to decide whether a new image is a cat. Inference is less computationally intensive, which enables deployment of trained systems on devices such as network video recorders (NVRs) or even in video cameras at the network edge. Deep learning can achieve super-human pattern recognition accuracy, resist interference, and classify and recognize thousands of features. Those qualities make it especially useful for video analytics applications. See part two here.
Sony 4K security cameras act as ‘intelligent eyes’ at EDGE Olympic, one of Amsterdam’s most technologically advanced sustainable buildings. The rugged minidome cameras give a clear picture of the flow of workers and visitors into and around the premises. In addition, their excellent low-light sensitivity is an asset for the reinforcement of security at entrances and car parking areas. Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras EDGE Olympic is an exciting landmark in sustainability. Opened in May 2018, the building constructed by EDGE offers over 11,000m2 of innovative co-working space close to Amsterdam’s Olympic Stadium. Providing a creative and energy-efficient workspace for commercial tenants, the building’s design is focused on a sophisticated digital infrastructure that connects people, devices, sensors and information via a secure cloud platform. Sony SNC VM772R 4K Minidome Cameras Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras installed by Netherlands security specialist, Lancker Wolters. The cameras are integrated with Genetec’s video management system to create a comprehensive video security and monitoring solution. Ruggedly built for all-weather outdoor operation around the clock, the SNC VM772R camera features a large, highly sensitive 1.0-type back-illuminated Exmor R CMOS image sensor. Offering four times higher resolution than Full HD, the camera is capable of capturing smooth, crisply detailed 4K video in conditions of near darkness. This allows people and objects to be seen clearly in a wide range of lighting conditions – and thus helps to ensure round-the-clock safety and security of employees, co-workers and visitors to the building. Video Data In Building Operations Optimization In the future, it is expected that video data will also be used to optimise building operations In the future, it is expected that video data will also be used to optimize building operations. For example, intelligent analysis of traffic patterns could enable more efficient room bookings and use of resources such as heating, lighting and cleaning services. Further, SNC-VM772R cameras monitor the EDGE Olympic car park, scanning the registration license plates of vehicles and checking the number against a database to admit authorized staff and visitors only, while automatically raising the barrier to let vehicles exit. This also allows instant confirmation whether a particular employee is present in the building: this overview can be beneficial, for example, in the event of an emergency evacuation. Sony 4K Surveillance Cameras "The initial price of a particular camera doesn’t matter" comments Erik Ubels, CTO, EDGE Technologies. "It’s the usability over its lifetime that makes it a better investment. That's why we chose Sony 4K cameras for this landmark building and other properties that we’re planning in the near future."
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the cut-throat high street environment. Best-Selling Products They resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise How do we know if our marketing strategy is working? What is the conversion rate of purchases? What are the ‘hot areas’ of the store, and do these actually represent best-selling products? Originally, with no access to significant information, they relied on experience and conversation with staff. But there was no way to verify these findings. They also needed to be able to get this information remotely – i.e. management in their HQ in Warsaw wanted to be able to see the situation in the other four stores without having to visit them separately. Sometimes, they resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise. Tailor-Made Solution Miniso turned to Hikvision AI products, with a solution built by Polish reseller Volta, including people counting cameras, fisheye cameras and NVRs. These were all coordinated using the HikCentral software platform. A people counting camera in each store counts people passing by, while another counts people entering and leaving. With this tailor-made solution management could calculate how many people were passing by to see a purchasing conversion rate. This also helps them to know whether marketing strategy is working. They can analyze the information further to see whether the rate of people entering the store is dropping, and whether that relates to the number of those passing outside. Miniso’s management can then look into the causes of these numbers, along with sales figures, to form a picture. For example, whether there is an external factor affecting shoppers either to pass by, or to enter. Video Management Platform The professional video management platform allows managers to access the information from different offices and mobile applications anywhere Because Miniso have the same technology set up in all the stores in Poland, they can compare different locations. This also comes in useful when it’s time to negotiate rent with shopping malls. Using ceiling installation of several fisheye cameras, the system can generate heat maps. This helps managers to see where ‘hot areas’ are, helping them to allocate products in the optimal place for promotion. Hot areas can also be compared with sales figures to provide further insights into shopping patterns. All the information provided by the system is coordinated, and business information on both layout and original image can be overlaid in Miniso’s HQ in Warsaw. The professional video management platform allows managers to access the information from different offices and mobile applications anywhere. This makes life a lot easier for the operations team as they need to check the situation in all stores. Fiercely Competitive Environment It also means that everything can be viewed simultaneously, so they can identify trends throughout the network of stores. Byron Zeng, Vice President of Miniso Poland, says: “The high accuracy of conversion rate the solutions provides really solves a number of our management issues. We can now easily see what’s going on in the other stores, including heat mapping, which makes management of the whole networks so much more efficient.” This is a great example of how AI surveillance products can change the landscape of business decision-making. In a fiercely competitive environment, like a shopping mall or high street, shopping trend data can help a retailer to survive. In fact, this worked so well for Miniso, they decided to use the solution in their stores across the whole of Europe – potentially about 200 stores in the next year.
Jumbo Ten Brink Food introduced the face server into their store environment in March 2017 after discovering that almost 80% of shoplifting took place via large shopping bags. Since then, Jumbo has installed 80 Panasonic cameras in-store, helping them to win the award. Previously recognized by the National Institute of Standards Technology (NIST) as the most accurate on the market, Panasonic’s face server uses deep learning technology which maximizes the performance of the core engine to achieve accurate and reliable recognition. The technology identifies faces that are ordinarily difficult to recognize with conventional techniques, such as those taken from an angle of up to 45 degrees to the left or right or 30 degrees up or down. It also maintains a 90% accuracy rate when detecting faces that are partially hidden by sunglasses or face masks. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old Enhanced Security Protection If people are caught stealing, their image remains on the database. The face server provides a real-time processing capacity of up to 20 cameras per server and can execute high-speed searches of up to 30,000 registered reference faces. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old. “The moment that a known shoplifter attempts to re-enter the store, an internal alarm is triggered, and we can take the best suitable action,” explains Edwin ten Brink, founder of Jumbo Ten Brink Food stores. “Thanks to the Panasonic face matching server, Jumbo has been proclaimed the safest store in the Netherlands." Karen Sangha, Panasonic’s Security Solutions Regional Marketing Manager says, “We are pleased to see that our customers are winning awards as a result of implementing our technology. We firmly believe that our face server is industry-leading and Jumbo Ten Brink Food’s success is testament to that.”
On December 11 to 16, 2018, the 14th FINA World Swimming Championships was held at the Olympic and International Expo Center in Hangzhou, China. Nearly 1,000 world swimming stars from 178 countries and regions competed here, creating a new glory with breaking 9 world records and 22 event records. The Chinese team won three gold medals, five silver medals and five bronze medals with the total medal number ranking the third in the world. The World Swimming Championships is one of the world's highest-level international swimming events. It is also the highest-standard individual international sporting event ever held in Hangzhou. For an international sporting event of this scale, the safety and security of the venues are of paramount importance. Security Monitoring Equipment As an important guarantee force for the security of the World Swimming Championships, Dahua Technology ensured the event’s safety with the host spirit and a great sense of responsibility. Dahua Technology once again shouldered the mission of guarding international events after successfully guaranteeing the G20 Hangzhou Summit. Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions In the periphery and outside of the venue, important entrances and exits, various passages and commanding points in the venues and security commanding headquarters, Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions, assisted the security department to establish security command headquarters, refined the security deployment of the venues and realized the full coverage of security monitoring from the periphery to the stadium and from the bottom to the commanding heights, facilitating the safe and smooth host of the 2018 Hangzhou FINA World Swimming Championships. Intelligence Equipment At the venue of the 2018 Hangzhou FINA World Swimming Championships - the surrounding area and interior of the Hangzhou Olympic and International Expo Center, Dahua Technology has teamed up to deploy a number of professional intelligent HD PTZ cameras, fiber cameras, bullet cameras, domes, transmission and other intelligence equipment, covering all areas within the venue, which helped the security department to control all corners inside and outside the stadium in real time so that to ensure the safety of the venue and the event. Dahua Technology combined the requirements of ‘first-class venue facilities, first-class organization guarantee, first-class opening and closing ceremonies, and first-class city image’ in the Championships, focused on key links and built a set of intelligent security video management system with the support of advanced technology platform. Integrated Control System It integrated control system, storage and management, and enjoyed the advantages of simple deployment and operation, flexible combination, excellent performance, and a high level of security and stability. It turned the cameras inside and outside the stadium into ‘smart brains’ to guarantee the safety of every corner of the Championships, meeting the high-level security needs of the event. Dahua Technology set the command and dispatch of the security department as the core At the security command headquarters of the site, Dahua Technology set the command and dispatch of the security department as the core, with high-definition tiled LCD screens as the display carriers and brought more intuitive and flexible display and control to the security management of the venues before and after the event to ensure the real-time handling, efficient command and visual control of the entire venues, thus winning the praise of the security department leaders. Display Control Equipment On the evening of December 16, the 2018 FINA Annual Awards Ceremony was held at the Hangzhou International Expo Center. As a ceremony of the most authoritative awards, with the largest scale and the greatest number of world-class swimming athletes in the global water sports field, Dahua Technology assisted the security units to reuse a large number of equipment around the venue, including intelligent cameras, storage, management platforms and display control equipment, making sure the ceremony was successfully being held. As an essential force in the escort 2018 World Swimming Championships, Dahua Technology actively devoted to the security work. Stationed professional and technical personnel were responsible for on-site equipment support, achieving zero failure of the equipment, successfully completion of the tasks, and winning the praise of the security department leaders.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announces that the South Grand Community Improvement District (CID) in St. Louis, Missouri is using the Genetec Stratocast cloud-based video monitoring system to deter license plate theft in its parking lot and provide video access to the local police department to help reinforce security. License Plate Theft One of the services offered by the South Grand CID is free parking. At any time of the day, drivers can park in a central parking lot to visit businesses or residents. While this lot has always been convenient and safe, license plate theft was troubling nearby areas. Video recordings are sent over a wireless network which connects to the South Grand CID main office To deter license plate theft in their own community, the South Grand CID board decided to add video surveillance to the lot. Currently, three cameras monitor the entire 90-space parking lot. Video recordings are sent over a wireless network which connects to the South Grand CID main office, just a few blocks away from the lot. With this cloud-based video monitoring system, Rachel Witt, Executive Director at South Grand CID, can quickly and easily view video from anywhere, at any time. Cloud Video System “Using the cloud video system, I am able to find and view the video in seconds. I can narrow down my search based on dates and time and watch the event unfold with all camera feeds up on the monitor. It’s really that simple,” commented Witt. Only two weeks after installing the Stratocast video monitoring system, a visitor reported that their license plates had been stolen. “The visitor provided a description of the car, and a timeframe in which the incident likely happened. Using the Stratocast system, I was able to find and view the video in seconds. I could clearly see the suspect enter the lot, remove the plates and leave in his own car. Since the police are very busy here, I was able to bookmark the video recording and then notify them that the video was ready,” said Witt. View Video Recordings Stratocast has made it easy for the South Grand CID to give video access to local police so that when a crime is reported in the district, officers can immediately begin to conduct investigations without leaving their desks. While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required. This is enabled by the Genetec Federation feature, which gives an organization access to manage multiple independent Genetec systems as one. A memorandum of understanding was signed so each parties’ responsibilities are clear. Better Sense Of Safety “Instead of driving over and picking up a DVD, officers can directly access video from our cameras to see what happened. Not only does it help speed up investigations, it saves officers’ valuable time,” continued Witt. The installation of Stratocast is not only helping to reduce license plate theft but it is also helping residents and visitors feel safer than ever. “Business owners, residents, and visitors have a better sense of safety when they know cameras are up. But they also need to know that we’re equipped to respond quickly to any disturbance. And that’s what Stratocast helps us achieve. With the addition of Stratocast, we’re able to show everyone that we have strengthened the security in our community,” concluded Witt.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
Round table discussion
Cybersecurity continues to be a major theme in the physical security industry, but effective cybersecurity comes at a cost. Higher cost is contrary to another major trend in the market: lower product pricing, which some have characterized as a ‘race to the bottom’. Chinese manufacturers, whose products tend to have lower prices, have been the target of cybersecurity concerns and even a government ban. So what is the overall impact of cybersecurity on pricing trends in video products? We asked this week’s Expert Panel Roundtable: Are cybersecurity concerns slowing down the ‘race to the bottom’ (i.e., the dominance of lower-cost cameras)?
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level versions offered by software companies with the intent of the customer upgrading later to a paid version. For more insights, we asked this week's Expert Panel Roundtable: What is the value of “free” video management systems (VMSs) and how can a customer decide whether “free” is the right price for them?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?