The M73, MOBOTIX’s new high-performance camera based on Artificial Intelligence (AI), is the latest in MOBOTIX’s lineup to have received the SySS IT security certificate. After completing multiple tests, SySS GmbH now attests that the entire MOBOTIX IoT camera series has a particularly high level of cyber security. In addition to the M73, the M16, representing the entire Mx6 series, also has earned the SySS certificate. This is a continuation of the MOBOTIX Cactus Concept which stand...
Lynred, a global provider of designing and manufacturing high-quality infrared technologies for aerospace, defense and commercial markets, and IRT Nanoelec, a technology research institute for microelectronics, announced that Lynred has joined the Nanoelec consortium as a partner. The objective of the 3D Integration program at Nanoelec is to provide the fiercely competitive Integrated Chip (IC) market with quick and cost-efficient access to 3D integration technologies that meet the demands for...
Hikvision, an IoT solution provider with video as its core competency, has announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Dedicated DeepinView Cameras Over the last few years, Artificial Intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performa...
Allied Universal, a renowned security and facility services company in North America, announces the availability of distance screening solutions as companies continue to launch their ‘return to workplace' initiatives. Distance screening solutions Allied Universal Technology Services experts are working with customers to design and implement the screening solutions that best fit their company's environment, requirements and existing security operations. The screening solutions include sta...
Summer is in full swing, but most Brits are taking a ‘staycation’ this year due to travel restrictions and quarantine periods enforced on air and cross-border travel in response to the coronavirus pandemic. But that doesn’t mean that people aren’t dreaming of cocktails on the beach. According to vacation booking site Travel Supermarket, Britons are filling their vacation diaries for next year, with April and May 2021 becoming the most-booked vacation months. The number o...
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of Infrared Cameras Inc. (ICI) to its network. Infrared Cameras Inc. is an innovator in the infrared products space with a line of thermal cameras as well as multi-spectral infrared cameras and complete package systems. “The COVID-19 pandemic forced an unprecedented acceleration in demand for thermal monitoring devices,” said Bill Bozeman, Chief Executive Offi...
Dahua Technology, a globally renowned video-centric provider of smart IoT solutions, has announced the launch of SafetyTemp (DHI-ASI7213X-T1), a thermal temperature monitoring station. This easy-to-deploy solution quickly measures skin temperature without the need for personal contact and provides an accurate temperature reading to help businesses and schools assess employees, customers, students and other visitors for elevated body temperature. SafetyTemp thermal temperature monitoring station Developed in response to the COVID-19 pandemic, the SafetyTemp system features a simple, portable setup that consists of a seven-inch screen and a camera with dual, 2MP, CMOS sensors. Different installation options, such as floor and desktop mounts, make SafetyTemp a versatile solution for shops, restaurants, schools, and factories that need an efficient method to assess temperatures of employees, customers, students and other visitors. This contact-free solution for monitoring temperatures uses thermal imaging technology to reduce the risk of viral transmission and deliver peace of mind. Thermal imaging technology Thermal imaging technology allows for swift, accurate, temperature readings without personal contact" “Thermal imaging technology allows for swift, accurate, temperature readings without personal contact,” remarked Damon Chou, Product Solutions Manager at Dahua Technology USA, adding “SafetyTemp offers this technology in a compact, user-friendly station that helps businesses reopen more safely and schools better monitor their student populations during the pandemic.” A subject must simply look at the camera for the system to get a temperature reading. The system will almost instantly (within 0.2 seconds) indicate whether a temperature is elevated above an operator-defined threshold. A visual display on the screen, as well as an audio alert, will let the operator know immediately when an elevated temperature has been detected. Integrated with WDR camera An additional setting will alert the operator if the system detects that a subject is not wearing a mask. The Wide Dynamic Range (WDR) camera is well-suited for high-contrast lighting environments, such as building entrances, and its infrared sensor can detect temperatures within a ±0.9°F (±0.5°C) range of accuracy from a distance of one to six feet (0.3 to 1.8 meters). “SafetyTemp’s ability to quickly scan people as they pass through an area reduces long lines and wait times for business owners and administrators who want to safeguard the health of their employees, customers or students,” Chou continued, adding “Dahua aims to support the reopening of schools and commerce with this simple yet powerful solution.”
Cybersecurity is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions; however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cybersecurity. Explosion-proof rated cameras Customers are currently overwhelmed by the perpetual advertisement of products related to cybersecurity. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cybersecurity. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. For software, similar requirements exist but there is less clarity than with their counterparts The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist: in general, it is possible to universally define safety requirements for installation in special environments, such as a drilling rig, a marine vessel or along a railroad. For software, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Video management software Furthermore, a device's firmware and video management software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever-changing conditions. Other aspects of security, such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements, such as gases or dusts, and deducting the product requirements. Video surveillance equipment During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. Several certification options are currently available on the market, and these can be placed in two main groups The result of the lack of certainty that characterises software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap, by pursuing certifications and stamps or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Cybersecurity certification Several certification options are currently available on the market, and these can be placed in two main groups: System certification Product certification As the name suggests, system certification addresses cybersecurity at a system level. This group includes ISO27001, NIST SP 800-53° ISA/IEC62443-3 for example. In these frameworks, risks related to information management are evaluated across every aspect of the organization: information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Video surveillance system Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organization willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/IEC 15408, also known as Common Criteria. It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Cyber secure surveillance Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products: developing safe products for all possible tasks - mechanical, electrical, electromagnetic and software - according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. New security feature Software architecture must be flexible enough to guarantee integration into very different products Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalog. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. Accomplish video acquisition For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Secure video surveillance Every night, the validation tools embedded into the continuous integration process automatically test each product to verify that no regression was unconsciously added while the company proceed with software development. Every time Videotec adds a new feature in response to a suggestion for improvement by the company's customers or identification of an issue, it also updates the testing tools to increase the reliability of the company's products. Videotec has yet to definitively choose a certification scheme for the DeLux technology Videotec believes that its products, and the continual updating of these, actively contribute to maintaining the safe operation of secure video surveillance system, helping IT departments and system administrators by keeping their systems balanced and by not requiring excessive mitigating actions or protections due to future issues. At Videotec, they call this cyber-sustainability. System-level security requirements At the time of writing this white paper, Videotec has yet to definitively choose a certification scheme for the DeLux technology. Several options are being evaluated, as the company search for a solution that will create value for the company’s customers without sacrificing the addition of new features on all products that make up the DeLux technology range. Although Videotec is still exploring the best certification scheme for its software, this does not prevent the company from having a clear and active development path for the cybersecurity in their products. At Videotec, the following five principles are the basis for implementing cybersecurity in products: Hardened software architecture to minimize the attack surface of the cameras Constant updates and availability of new features, even on old products Removal of predefined credentials in the products, to strongly indicate to customers that, as a minimum, a new username and password combination must be defined by the user during installation according to the system-level security requirements Contribution to the ONVIF Security Service specification, to push the industry shifting from usernames and password to X.509 certificates Clear communication to customers, by avoiding fake marketing claims Security service specifications Videotec had an active role in the development of the ONVIF Profile Q specifications. Among other activities, it contributed to driving the standard towards the removal of predefined credentials. The security market must teach installers and users that using pre-defined usernames and passwords is equivalent to not having credentials at all. Videotec is proposing extensions to the ONVIF Security Service specifications Defining the factory-default state of Profile Q compliant devices, where no authentication is required, is the strongest reminder a vendor can provide to its customers. Similarly, with regard to the commitment for the ONVIF Profile Q, Videotec is proposing extensions to the ONVIF Security Service specifications that will include the widespread the adoption of X.509 certificates to replace the usage of credentials. Video surveillance market Moving towards this new way of handling authentication between devices and VMSs will not only impact devices, but it will require a leap forward for the whole video surveillance market. Beyond implementing the functionality in its devices, Videotec is already planning the actions that will be necessary to make its customers effective at selling, installing and maintaining video surveillance systems based on this technology. Last, but not least, trustworthy communication to customers is a key value for Videotec. For this reason, Videotec will never exploit the unintuitive requirements of system certifications of international privacy rules to send wrong messages to the market. As an example, Videotec added to all its IP products an instruction about performing a safe installation according to the General Data Protection Regulation (GDPR), similarly to the instructions given for mechanical, electrical of environmental safety. IP-based device In the last ten years, the video surveillance industry has vigorously shifted from analog to IP products These instructions are meant to teach customers and stimulate their attention to aspects related to cybersecurity. As such, instructions will never be turned into unreliable market claims, such as claims for conformance to the GPDR or any other rule. Cyber threats started menacing video surveillance systems from the day the first IP-based device was put into the market. At that time, the number of digital systems was low and video surveillance was not as pervasive as it is today. In the last ten years, the video surveillance industry has vigorously shifted from analog to IP products and, at the same time, it has witnessed a constant growth in market demand. As a result, digital video surveillance systems are everywhere nowadays and attract attention not only from professionals but also from malicious users. Risk assessment analytics Keeping these systems safe from cyber-threats is an activity that cannot be performed just by performing a risk assessment analytics during the commissioning phase - maintenance and recovery plans must be operative during the whole lifespan of the systems. These activities have a cost; also managing the effects of a system violation has a cost. Integrators and users must find the correct balance, to minimize expenses while keeping video surveillance systems updated and secure. In order to make reduction of expenses related to maintenance and recovery plans easier, Videotec bases the development of its products on the concept of cyber-sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle and assist integrators and customers keeping their systems protected.
Videotec has always been committed to researching and developing optimum solutions for outdoor surveillance and protection of critical infrastructures and other complex environments. The company proposes a new integrated solution that responds to issues relating to the monitoring of poorly illuminated large perimeter areas, as it is in the airport external zones. The combined system consists of the ULISSE2 IP PTZ with the SONY SNC-VB770 ultra-high sensitivity IP camera with Full Frame 35mm CMOS sensor and SELP28135G motorized zoom lens. ONVIF profile-S protocol The camera and lens can be easily installed in the PTZ thanks to the adaptor that has been specially designed by Videotec (UPTBKITVB770). The implementation of the communication protocol between ULISSE2 and SNC-VB770 allows the easy remote control of all the functions of the camera and lens via the ONVIF Profile-S protocol. The resulting integrated system provides exceptionally detailed 4K/30fps color video, even at night The resulting integrated system provides exceptionally detailed 4K/30fps color video, even at night or in extreme lighting environments (less than 0.004 lux). The operator can get highly detailed color images of specific areas, as well as an overview of the whole environment being monitored, even with a poor lighting source when it is a challenge for the human eye to see the object. PTS solution for monitoring perimeters The images, full of useful information, are sharp and perfectly in focus thanks to the high-speed electronic shutter that means the operator can clearly distinguish letters, numbers and facial expressions in almost pitch-black conditions. The thermoregulation and forced-air demisting functions mean the camera is always running at optimum temperature and that no condensation forms. Bringing together Videotec’s robust ULISSE2 PTZ and Sony’s ultra low-light color camera is quick and simple and represents the most powerful and high-performing 4K/30fps PTS solution for monitoring perimeters and large outdoor areas on the market. Some high-profile critical infrastructures have already implemented this solution.
Aicuda Technology, a globally renowned supplier of versatile video surveillance and Smart TV solutions catering to customers from enterprise to entry level, has announced the execution of a strategic distribution agreement with CloudWalker Streaming Technologies Pvt. Ltd. (CloudWalker), one of the premier value added product distributors in India. Body worn and thermal cameras CloudWalker Streaming Technologies Pvt. Ltd. will promote Aicuda Technology’s Airyn portfolio of smart edge devices like body worn cameras and thermal cameras to its network of channel partners located throughout India. “Aicuda Technology is a young and innovative product manufacturer firm with a highly versatile solutions portfolio and a very impressive network of partnerships”, said Jagdish Rajpurohit, Founder and Chief Executive Officer of CloudWalker Streaming Technologies Pvt. Ltd. Airyn smart edge device CloudWalker is a true solution company and we belief that technology is the key in integrating products" Mr. Rajpurohit adds, “CloudWalker Streaming Technologies Pvt. Ltd. is a true solution company and we belief that technology is the key in integrating products and processes into solutions. With the addition of AICUDA Technology’s Airyn smart edge devices, we can provide some of the most innovative solutions to the market today. We don’t just supply boxes, but we also supply complete solutions to our channel partners.” John van den Elzen, Managing Director of Aicuda Technology said, “CloudWalker has a strong expertise and know-how for solution sales in verticals and we are very excited about the new partnership.” Aicuda Technology – CloudWalker partnership John further stated, “CloudWalker Streaming Technologies Pvt. Ltd.’s dedication and value added approach in the market perfectly fits in our strategy to accelerate the growth in the Indian market. Deploying Aicuda Technology’s Airyn smart edge devices with CloudWalker’s high professional services will dramatically expand the company’s ability to address the demands of commercial accounts.”
SpotterRF, a company that specializes in designing Compact Surveillance Radar systems for highly critical sites, announces the integration of their Radar technology with the ULISSE COMPACT HD range of PTZ cameras manufactured by Videotec, creator of professional video surveillance cameras. In this integrated solution, the radar helps the camera to always look in the right direction by tracking potential threats in the vicinity. This greatly increases the value of the cameras by creating a fully automated system that enhances situational awareness and prevents incidents before they happen in large critical areas. Perimeter security Using cutting-edge radar technology, SpotterRF can pinpoint the GPS location of unwanted intrusions around the property and potential threats beyond the perimeter. In a perfectly synchronized operation and without human intervention, the radars rapidly and continuously send these exact coordinates to the connected Videotec PTZ cameras. The response is immediate and they can be programmed to zoom in for greater detail, capture sharp Full HD images of the target and send them in real time to the operator’s monitor. The system promptly sends alerts to operators of an alarm, and due to the near-zero false alarm rate of the radars, this occurs only when there is actually something of interest happening on the site. PTZ camera for surveillance The Videotec ULISSE COMPACT HD PTZ camera offers excellent visual surveillance capability coupled with high functional and mechanical performance in outdoor areas. With its wide field of vision and fast positioning, it is capable of capturing great quality Full HD images in the most adverse environments. The combined system from SpotterRF and Videotec has been proven in many real-world deployments worldwide, such as electrical substations, military zones, and other large sensible areas.
The new Wisenet PoE extender cameras from Hanwha Techwin are designed to save integrators and end users time and money, when there is a requirement to install two cameras within 80 meters of each other. For retrofit applications where an additional camera is needed, system integrators need to simply substitute an existing Wisenet camera with a PoE Extender camera, and then re-install it at the new camera location, with both devices being able to share the same cable run. PoE Extender cameras With the ability to support all PoE cameras within the entire Wisenet range, the new 2 and 5 megapixel PoE Extender indoor and outdoor dome cameras provide an equally cost effective solution for new installations as they reduce the number of network ports and switches, as well as the amount of cabling, required. Installation ease is matched by a considerably reduction in the cost of the time that system integrators would normally have to spend on site to install a new camera. System integrators also have the option to connect other PoE enabled devices to the Wisenet PoE extender cameras, such as a supplementary lighting unit, I/O controller or PIR sensor. Built-in IR LEDs and Digital Image Stabilisation The 4 new dome cameras all have built-in IR LEDs that illuminate objects up to 50 meters from the camera The 4 new dome cameras all have built-in IR LEDs that illuminate objects up to 50 meters from the camera and feature Digital Image Stabilization (DIS) which helps ensure the capture of sharp, stable images by reducing motion blur which is caused by wind or vibration. All are equipped with Wide Dynamic Range (WDR) technology, with the 2 megapixel models performing at up to 150dB and the 5 megapixel models at up to 120dB, to produce clear images from scenes containing a challenging mix of bright and dark areas, which normally results in overexposed or underexposed images. User-friendly installation Part of the Wisenet X Plus series, the PoE Extender cameras offer a number of other practical features that further minimizes the time installers have to spend on site, including magnets which lock sensor modules into the dome housing. A waterproof gland, through which a network cable can be inserted with the aid of an RJ45 plastic push-through device, negates the need to re-make a cable end. Prior to installation, technicians from the convenience of their workshop should be able to configure IP network settings without the need to remove a camera module from its packaging. Advanced audio and video analytics The new cameras come supplied with a diverse range of license-free specialist analytics such as directional detection, virtual line, enter/exit, appear/disappear and loitering detection. In addition, an audio analysis function is able to recognize critical sounds, such as explosions, screams and broken glass, and then immediately generates an alert to enable emergency services to react quickly and effectively to any incident. In a retail environment, for example, this functionality could be used to alert security personnel that a customer is behaving aggressively to a sales colleague. Retail Insight business Intelligence solution Processing power of the chipset at the heart of the new cameras enables them to support edge-based people counting The processing power of the chipset at the heart of the new cameras enables them to support edge-based people counting, heat maps and que management applications. The new cameras offer retailers, art galleries, museums and other business establishments which are open to the public, the opportunity to gain a greater understanding of customer behavior and improve productivity accordingly, with the option to display the captured data on the centralized dashboard of the Wisenet Retail Insight (v2.0) business intelligence solution. Additional key features of the Wisenet PoE extender cameras include the following: PoE Out: Maximum 12.95W at 80 meters using CAT5/5E cable. Hallway View which provides a highly effective way to monitor narrow vertical areas such as shopping aisles and corridors, and extended tilt range of up to 90 degrees to ensure wide area coverage when the cameras are installed in locations which have low ceiling heights. WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression, according to movement in the image. When WiseStream II is combined with H.265 compression, bandwidth efficiency is improved by up to 99% compared to current H.264 technology. Shock-detection technology which, via built-in gyro sensors, detects unusual physical shocks and generates alerts to enable operators to quickly respond to any incidents. Audio playback on event. Up to five pre-recorded warning messages can be stored on-board a PoE extender camera and these can be programmed to automatically play when pre-defined events occur. The new Wisenet PoE extender cameras are as follows: Wisenet XNV-6081RE 2 megapixel outdoor dome with 2.8-12mm varifocal lens Wisenet XND-6081REV 2 megapixel indoor dome with 2.8-12mm varifocal lens Wisenet XNV-8081RE 5 megapixel outdoor dome with 3.6-9.4mm varifocal lens Wisenet XND-8081REV 5 megapixel indoor dome with 3.6-9.4mm varifocal lens Cost-effective video integration solution “At a time when many businesses will be striving to recover from the economic consequences of COVID-19 and might therefore have a reduced security budget, we are very pleased to be able to introduce a highly cost effective way to add a camera or another PoE enabled device to an existing system, or install a new two camera video surveillance solution,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. He adds, “As well as their value proposition to end-users, these new cameras will undoubtably make life much easier for system integrators by minimizing the time they have to spend on site.”
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire detection and precise shooter location Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detectionShotSpotter SecureCampus solution is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defense for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. audio solutions for perimeter security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognizing duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial intelligence to detect weapons A gunshot detector recognizes firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritize responses from police and emergency personnel. Detecting audio levels and alerting operators Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measuresThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
FLIR PT Series cameras were used in a surveillance project to detect and monitor illegal fishing and poaching activities along the Spanish Galician coast. The FLIR thermal imaging cameras combined with maritime video analytics from Gradiant were ideal for spotting illegal vessels on a 24/7 basis and at a long range. The vastness of the Galician coastline and the multitude of fishing and farming activities call for a more automated surveillance approach. Fishing, shellfish harvesting, and marine aquaculture - mainly mussel farming in inshore waters are important economic activities in Galicia (northwest of Spain). Local public authorities strictly control these activities to prevent exploitation, fish stock depletion and resulting economical losses. They are fighting a constant battle against this unfair and illegal competition that affects thousands of professionals who make a living from the fishing and seafood industry. Challenges of coastal monitoring Illegal fishing and poaching has an enormous impact on the environment and food safety Illegal fishing and poaching of seafood resources also has an enormous impact on the environment and food safety; especially during periods of toxic algal bloom (red tides), when fishing conditions are hazardous for public health. The detection of unauthorized fishing and shellfish harvesting is of paramount importance for the Galician authorities. However, monitoring and protecting all of Galicia’s inshore and offshore fisheries, shellfish harvesting areas, and marine aquaculture farms is a challenging task. Galicia has 1,200 km of coastline. Its protection involves the surveillance of activity in 122 ports, including around 5,000 fishing boats, 400 beaches dedicated to shellfish harvesting, and 47 mussel aquaculture farms, with a total of more than 3,000 bateas (floating mussel farms). Long-range thermal imaging Moreover, most illegal activity takes place at night, making it extra difficult for law enforcers to detect any type of vessel. The Galician climate does not help either. With an average of 128 days per year of rain, visibility conditions are usually not ideal for surveillance operations. Manned surveillance patrols can only do so much; they are hindered by the climate and visibility conditions, making it impossible (from a practical and financial standpoint) for coast guards to cover the entire Galician coastline. In 2017, the Galician Coast Guard started a project to test video surveillance of the coastline based on thermal imaging cameras. The pilot included the use of FLIR’s PT Series multi-sensor camera, combined with maritime video analytics software from Gradiant (Pontevedra, Spain). Multi-sensor installation FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications The multi-sensor installation was extensively tested on two different locations along the Galician coast. One set-up was used to monitor illegal vessels on coastal waters at short/medium range, while another set-up was used for long-range monitoring. The PT Series thermal cameras allowed the Galician Coast Guard to monitor the required area over a long range on a 24/7 basis, even at night and in adverse weather conditions. In addition, the FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications. This software is specifically adapted for monitoring coastal environments and allowed the coast guard to detect, track and geo-localise people and vessels, including small wooden and plastic boats. Visible-light camera The software enabled the thermal cameras to detect objects and people despite adverse maritime conditions, such as high waves, low contrast due to low light, fog and rain, reflections on the sea surface, camera vibrations, and the presence of distractors, such as birds and vessel wakes. The FLIR PT Series is a high-performance multi-sensor pan/tilt security camera, incorporating an uncooled thermal camera with sensitivity of <35mK and a visible-light camera with 36x optical zoom. While the thermal camera is used to detect threats over a long range based on their heat signatures, the visible-light camera can be used for verification and identification. Long-range surveillance The requirements for this long-range application were extremely challenging for any thermal camera" “FLIR is the reference for long-range surveillance applications with thermal imaging,” says José Antonio Rodríguez, Head of Video Analytics at Gradiant. “The thermal performance of the camera and the fact that this technology is easy to set up makes it ideal for this type of application. In addition, FLIR supported us from the start for lens selection, calibration of the system and much more.” “The requirements for this long-range application were extremely challenging for any thermal camera,” says Nikitas Koutsourais, Product Marketing Manager at FLIR Systems. “Thanks to the FLIR PT Series’ unique thermal sensitivity of less than 35mK, we could provide the best image performance in the market.” IP video streaming Two different configurations were used in this application. The long-range surveillance station used a FLIR PT-606 camera, and was able to detect a rubber inflatable boat at 4,000m. Despite its narrow field of view, this camera allowed for wide coverage thanks to the high-precision pan/tilt unit. The camera was able to sweep a wide field of view span in a pre-programmed sequence of pan/tilt presets. The port surveillance station used a PT-625, offering a good compromise between detection range and field of view with a single pan/tilt preset. The integration of the video analytics software with the camera was easy thanks to IP video streaming and the camera’s ONVIF compliant interfaces for pan/tilt control. Long-range surveillance typically requires the use of lenses with a narrow field of view, which is a problem when you want to monitor wide areas. Coastal protection applications The FLIR thermal cameras provided the Galician coastguard with increased situational awareness However, the video analytics from Gradiant was able to take advantage of the Preset Sequencing mode of the FLIR PT Series. This allowed the coastguard to cover a wide field of view with a single camera and to perform video analysis on each pan/tilt preset. The FLIR thermal cameras provided the Galician coastguard with increased situational awareness and allowed them to respond much quicker to illegal fishing activities. The pilot project was performed in a realistic surveillance environment along the Galician coast and generated very positive results. The combination of a multi-sensor system with Gradiant’s maritime video analytics proved to be effective to deal with the intricate Galician coast lines and a lack of open view. In addition, this technology combination is a cost-effective alternative, making automated surveillance applications accessible for fish farm companies worldwide. Extremely rugged systems Finally, the PT-Series are extremely rugged systems, which makes them ideal for coastal surveillance, especially in an extremely humid environment such as the Atlantic coast of Spain. The system’s vital core is well protected against dust and water ingress, and complies with IP66 requirements.
When overseeing the installation of video surveillance in a refinery, it is necessary to understand that there are a number of complex issues that must be resolved. The infrastructure is, generally, very large and presents a series of extremely dangerous environments and processes that must be closely monitored in order to ensure that the numerous manufacturing operations taking place are carried out safely. Monitor large complex One of the customers in Mexico has asked for a system that enables them to monitor these complex operations in real time, so that precautionary action can be taken, if necessary. The system has to show the work that PEMEX staff and all suppliers within the processes area are undertaking in order to avoid risky situations and ensure that all jobs are performed in accordance with safety standards. In addition, the system needs to be able to show various parts of infrastructure, such as instruments, valves, pipes, etc. and detect any malfunctioning production equipment. In some places, production processes must be monitored as they occur in zones made hazardous by the presence of flammable substances. The customer’s top priority is being certain that the installed cameras themselves are not a possible ignition source for flammable products in the surrounding areas. Explosion-proof PTZ IP cameras The integrator REX ENTERPRISE S.A. de C.V. carried out two projects with these characteristics in Mexico: one in Coatzacoalcos, Veracruz and the other in Poza Rica, Veracruz. In Poza Rica, Milestone software manages the system’s 51 devices, including IP cameras for internal monitoring, analog cameras from a previous system and 22 explosion-proof PTZ IP cameras. Milestone has been chosen due to its ability to integrate a number of alarm systems, analytic systems, etc. in the future, as it wasn’t possible to fund and use the complete system at the time of installation. ONVIF protocol Videotec's explosion-proof PTZ cameras were selected for their unlimited lifespan, with three-year warranty, their corrosion-resistant construction and their conformation with all the applicable standards for explosion-proof devices. The integration of Videotec products and Milestone is guaranteed by the ONVIF protocol. ONVIF is a worldwide industry standard that offers standardized interfaces and promotes effective interoperability of physical safety products.
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilizing indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
Sussex Police have purchased a fleet of redeployable CCTV cameras from Revader Security, primarily for use on lampposts and urban infrastructure. The Transit-lite mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure vital video evidence for prosecution. Cost-Effective solution Using the Revader EasyFit bracket system, police operators are able to regularly re-position each camera to respond to the movement of crime hotspots, antisocial behavior, vandalism and other street crime around the locality. As the units can be installed in virtually any location within minutes, only minimal planning is required. Revader Security proposed a cost-effective solution of coupling an auxiliary camera to a Transit-lite unit In this instance, Revader Security proposed a cost-effective solution of coupling an auxiliary camera to a Transit-lite unit to provide twice the visibility and coverage. The Transit-lite unit contains the recording and transmission technology and acts as a server to the auxiliary camera. It also has the capacity to host other specialist cameras, such as those for number plate recognition (ANPR). Live and recorded footage is quickly and easily retrieved over the 4G mobile network. Redeployable camera solutions A member of Sussex Police’s Divisional Operations Team commented: “We have been really impressed by the Revader cameras, which are straightforward to install, easy to use, and have provided us with some very high quality CCTV evidence”. Stuart Caldecourt, Managing Director of Revader Security commented: “The use of another PTZ camera on the same Transit-Lite unit has provided our customer with a significant operational advantage at an only marginal increase in cost, representing excellent value for money”. Revader Security offers a wide a range of mobile CCTV and redeployable camera solutions for all applications, including those with low or zero power. The company continues to support Police and a variety of clients in the public and private sector.
In 2014, when Siete24 began working with the bank, it was operating 800 branches, 27 offices and 3200 ATMs, all requiring round-the-clock protection. Their security infrastructure included more than 90,000 sensors, 15,000 surveillance cameras, 3,000 DVRs and 1,500 access points. To manage this expansive enterprise the bank was operating five independent systems, using legacy software and was heavily reliant on the knowledge of its operators. Julio highlights the scale of the challenge: “In 2014 the bank was receiving two-million alerts per month, which was far more than it could effectively handle.” With the bank planning major expansion, they needed a solution that would not only deliver immediate benefits but have the ability to scale significantly. The solution that met this need was the enterprise incident management system - Qognify Situator from Qognify. Reduction in false alarms The fact that Situator was already tried, tested and proven in the banking sector was an important consideration in selecting the system. Having been in use by Millennium BCP in Portugal since 2011, Situator was able to reduce false alarms from more than 20,000 to 1,200 per annum. Since Siete24 began its work with the bank six years ago, the scope of the project has grown. The number of sites being monitored has doubled and the volume of sensors has increased by 50%. “Today, Situator is handling up to 18 million alerts per month, of which 71,200 are verified and 109 confirmed as incident, each managed using best practice procedures we have defined in the system,” explains Julio. “Despite this dramatic increase in the size of the project, our average response time to critical events has fallen from five minutes in 2016 to just 50-seconds in 2020. We have found that the more alerts we process the more efficient and effective we become.” Qognify Situator has created a positive impact on operational performance, that the bank has recently extended its contract with Siete24 for a further three-years. Julio concludes: “The bank requires that we have 99.9% availability, and we are financially accountable for any losses. Situator has enabled us to not only meet our service level obligations, but has given the bank far more than it anticipated.”
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announced that home décor retailer, Kirkland’s, has chosen Hanwha security cameras to improve security and business operations across hundreds of stores in the US. Protecting assets and people is always a top priority for Kirkland’s. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture, and more. When they evaluated their security solutions, they determined they needed to upgrade the analog video surveillance systems in use at their existing locations and plan for new stores. Saraya Charlton, Kirkland’s Loss Prevention Investigator, said the analog video surveillance cameras they had in place were acceptable, but they desired cameras with wider coverage and better resolution. Minimizing bandwidth usage The amount of time it took to investigate incidents for loss prevention and personal injury claims also frustrated the department. Each time they were called to investigate an incident – vandalism, theft, employee misconduct, a slip and fall, or a cut from broken merchandise – each individual store had to extract the footage from the analog DVR at that location and send it to loss prevention at Kirkland’s headquarters. Charlton said Kirkland’s sought an IP-based solution that could be accessed remotely that would make the loss prevention investigation process more efficient and would provide additional benefits. Management wanted a camera that provided a clear picture, while minimizing bandwidth usage and had analytics capability. Video Management Software As new stores are built by this growing retailer, they will also include the Hanwha-Salient security solution Working with several systems integrators, Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient Enterprise Video Management Software (VMS). The first phase of the security upgrade included the deployment of 1,800 Hanwha Wisenet X series XNV-6011 2 megapixel HD dome cameras and Wisenet Lite vandal-resistant dome cameras at 200 Kirkland’s locations, as well as the distribution center and the e-commerce building. As new stores are built by this growing retailer, they will also include the Hanwha-Salient security solution. They expect to have a full migration to IP at all locations by 2021. Each Kirkland’s location is outfitted with approximately eight cameras that are positioned to capture the entrance, the sales floor and the back of house operations. Charlton said Hanwha’s cameras provide the most comprehensive view of the store possible. Horizontal field of view “The wide-angle capability – as well as the quality of the camera – is really what sold us on Hanwha,” said Charlton. “We are getting the best views possible and they are allowing us to see the entire sales floor which is exactly what we wanted and needed.” Hanwha’s Wisenet X series of cameras is a perfect fit for the retail environment. The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less. Charlton said the Hanwha cameras are particularly useful at store entrances because, thanks to the WDR feature, video images are not affected by the bright sunlight that often shines through the windows and they can still see faces clearly. Loss prevention investigation The Hanwha-Salient solution has improved Kirkland’s loss prevention investigation efficiency And because many of Hanwha’s cameras offer license-free analytics, Kirkland’s will begin exploring that capability in the future to gain information on people counting, heat mapping, and dwell time. The Hanwha-Salient solution has improved Kirkland’s loss prevention investigation efficiency The Hanwha-Salient solution has improved Kirkland’s loss prevention investigation efficiency since the team is able to pull recorded video from any camera via the Salient VMS rather than wait for information to be extracted from an analog DVR. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot and resolve any camera issues remotely first rather than unnecessarily sending out a service technician. In addition to offering quality images, improved field of view, and more efficient operations, the Hanwha solution has also helped Kirkland’s conserve valuable bandwidth with Hanwha WiseStream II compression technology, said Charlton. Efficiently manage bandwidth WiseStream II dynamically controls encoding, balancing quality and compression according to the movement of the image. Combined with H.265 compression, bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. “We share our video surveillance and security bandwidth with our Point of Sale system and we don’t ever want to take away from the bandwidth of POS transactions or impact the speed at which they go through,” said Charlton. “Hanwha’s WiseStream compression technology fits our business model and along with Salient helps preserve and efficiently manage bandwidth. It’s really helpful to have a camera that’s smart enough to be able to tweak and regulate itself.”
Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Surveillance cameras: Manufacturers & Suppliers
- Hanwha Techwin Surveillance cameras
- LILIN Surveillance cameras
- Bosch Surveillance cameras
- Visionhitech Surveillance cameras
- Dahua Technology Surveillance cameras
- Pelco Surveillance cameras
- Hikvision Surveillance cameras
- eneo Surveillance cameras
- Panasonic Surveillance cameras
- Arecont Vision Surveillance cameras
- Messoa Surveillance cameras
- Vicon Surveillance cameras
- Sony Surveillance cameras
- Honeywell Security Surveillance cameras
- Axis Communications Surveillance cameras
- Dedicated Micros Surveillance cameras
- VIVOTEK Surveillance cameras
- Videcon Surveillance cameras
- Vanderbilt Surveillance cameras
- FLIR Systems Surveillance cameras
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload