Following on from a very successful 2019, Cathexis EU has appointed a new Business Development Manager in South East Europe, Katerina Ryan. Katerina has over 10 years of experience in driving sales and maintaining accounts in video surveillance and IT industry and has substantial has experience with bringing new brands to the European market, developing the existing ones and managing strategic alliances. She has developed markets and worked on large infrastructure projects with such brands as Pi...
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new...
Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces the immediate availability of the EchoGuard Rapid Deployment Kit for surveilling borders, securing critical infrastructure perimeters and temporary events, and enhancing situational awareness. Echodyne’s innovative MESA™ technology and powerful software deliver the leading performance of electronically scanning array (ESA) radar in a compact, lightweight, solid-state for...
Reed Exhibitions, an event organiser, announced the launch of Unmanned Security & Safety Expo 2018, set to take place November 14 & 15 in New York City. The all-new event is focused on drones & robotics for commercial and government security and safety use-cases and drone detection/anti-drone solutions. The launch is an expansion of the success of the Unmanned Security segment at Reed Exhibitions’ flagship ISC West this past April in Las Vegas. Unmanned Security & Safety Ex...
Dedrone, a provider of airspace security and developers of the first drone detection software platform, announced their next generation software upgrade, DroneTracker 3. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. DroneTracker 3 Enhancements Automated summary reporting, enabling security personnel to instantaneously assess and analyse drone threats Enterprise-grade security...
iluminar Inc., the specialist manufacturer and supplier of infrared and white light illuminators, announced that it will join Ameristar Perimeter Security’s Perimeter InSite partnership initiative as the expert in perimeter lighting technology. Spearheaded by Ameristar, Perimeter InSite is a strategic initiative that aims to bring together industry leaders from several technology sectors to offer customers integrated perimeter security solutions that address and mitigate a variety of thre...
Altronix, the recognized leader in power and transmission solutions for the professional security industry, is showcasing the latest additions to the company’s innovative Fiber Solutions here at ASIS 2017 (booth #2823). NetWay Spectrum Series hardened PoE switches and Ethernet-to-fiber media converters accommodate single or multi-mode fiber, as well as composite cable, which combine fiber with copper to simultaneously deliver low-voltage power and data at distances beyond a mile. New additions include the single port NetWay SP1P Media Converter/Injector and the NetWay SP8A/16A 8 and 16-port Media Converters. “NetWay Spectrum capitalises on the inherent long-distance transmission capabilities of fiber.” said Alan Forman, President, Altronix Corporation. “These new additions to the NetWay Spectrum Series reaffirm our commitment to deliver power and transmission solutions that meet the needs of the market.” Remote Monitoring, Control And Reporting NetWay Spectrum includes rack mount media converters for head-end installation, as well as a wide range of indoor and outdoor models with single or multiple SFP Ports for remote deployment. All NetWay Spectrum PoE Switches feature Altronix LINQ Network Communications Technology for remote monitoring, control and reporting. The latest models added to the growing family of NetWay Spectrum solutions include: NetWay SP1P Single Port Media Converter/Injector which converts Ethernet to Fiber and provides PoE. NetWay SP8A/16A Media Converters provide 8 or 16 ports (respectively) in a compact 1U rack mount configuration for head-end installation that converts Ethernet to Fiber. To complete the fiber solution line of products, Altronix now offers Single-Mode SFP modules – P1SM10 and Multi-Mode SFP modules – P1MM. All NetWay Spectrum Series products carry a lifetime warranty and are made in the U.S.A.
DITEK’s Outdoor Surge Protector for Ethernet Cabling provides a highly effective and cost-efficient solution to protect surveillance and security devices and systems. Featured this week at ASIS 2017 (booth #701), the hardened unit model DTK-MRJPOEX features a NEMA 4X rated enclosure with weatherproof connectors for installation in harsh or outdoor environments. “When an organization experiences a multi-million-dollar loss after a lighting strike because they didn’t have the proper surge protection precautions in place, the benefits of surge protection are quite apparent,” said Jason Klein, National Sales Manager, DITEK. “The addition of our new outdoor Ethernet surge protector should be a no-brainer for organizations with external surveillance and security systems to protect their investment and ensure these critical systems stay up and running.” Multi-Stage Technology And Hybrid Design When used with STP cabling, the DTK-MRJPOEX requires no earth ground and has a field replaceable surge module. Its multi-stage technology and hybrid design provides superior protection for Ethernet devices. It is compatible with CAT5e, CAT6 and CAT6A cabling infrastructure and exceeds the IEEE Standards for PoE. Design features include shielded RJ45 connectors and liquid-tight cord grips. Other specifications include a surge current rating of 20kA/pair; and gigabit data speed with no signal degradation. At ASIS 2017, DITEK will be highlighting the vital importance of protecting security, fire and other building systems from power surges and spikes that can damage or destroy equipment and data. “Loss of security, surveillance and life/safety system operations is costly on many levels,” continued Mr. Klein. “The simple implementation of surge protectors, regardless of the source location, can ensure the continued operation of life/safety and security devices as intended.”
FLIR announces the FLIR Duo Pro R dual sensor thermal imaging and mapping system for commercial drones. Featuring a thermal sensor with radiometry, the FLIR Duo Pro R gives professional drone operators the range and image detail needed to capture actionable thermal and visible data in a single flight. The FLIR Duo Pro R ushers in a new era of imaging capability for a wide range of high-performance commercial, industrial, and public safety drone applications. Thermal And Video Camera For Drones The FLIR Duo Pro R allows operators to switch between thermal and video cameras in flight. With the option of a 336×256 or 640×512 thermal resolution sensor and a high-definition 4K color video camera, the FLIR Duo Pro R uses FLIR’s patented multispectral dynamic imaging, MSX, technology to emboss high-fidelity, visible-light details onto the thermal imagery to improve image quality. Equipped with thermal, visible, and picture-in-picture mode, the Duo Pro R records raw video and stills to two dedicated microSD cards and allows for live digital video output over micro-HDMI and analog video out for easier integration. Creating Maps And 3D Models From An Airborne Platform The FLIR Duo Pro R dual sensors create a self-contained airborne mapping package. The fully integrated GPS receiver, Inertial Measuring Unit (IMU), temperature, humidity, and altitude sensors provide an onboard source for high-fidelity, reliable geo-tagging data required to create accurate maps and 3D models from an airborne platform. “The FLIR Duo Pro R offers class-leading imaging performance and will save drone operators time and effort with the highest quality thermal and visible cameras combined in a single system,” said Jeff Frank, Senior Vice President, Global Product Strategy. “With the ability to select either a thermal or visible camera image in flight, or watch video streams of both simultaneously in picture-in-picture mode, we’re making it easier for drone operators to capture imagery and thermal data from the air.”
BitFlow, Inc. reported that a free software driver supporting National Instrument LabVIEW for the CoaXPress standard has recently become one of the most frequently downloaded products from its website, www.bitflow.com, underscoring the rapidly expanding adoption of this interface by the machine vision industry. The company also announced the immediate availability of a CXP driver for LabVIEW 2017, the latest version of the popular systems engineering software. The drivers are for use with BitFlow Aon and Cyton CoaxPress frame grabbers. First Independent Frame Grabber Supporting LabVIEW "BitFlow has a long history of spearheading the development of third party drivers optimized for easier access to the full functionality of our frame grabbers, along with much faster image acquisition, and minimal CPU usage," explained Donal Waide, Director of Sales for BitFlow. "We first offered a NI LabVIEW driver in 2009 for our Camera Link frame grabbers. In 2011, we expanded that to include support for our CoaXPress frame grabbers." Waide continued, "In essence, BitFlow was one of the first independent frame grabber companies to offer support for LabVIEW. This is very typical of the company who offered a 3rd party driver for Halcon back in 1997. Development of third party drivers represents our continuous commitment to adding value to our CXP customer relationships and to help in the acceleration of the CXP standard throughout the scientific, military and industrial vision markets." Strategic Collaborations And Compatibility One of the many game-changing advantages of BitFlow drivers is that they support all of the company's current product families. As a result, only one driver is required for any given application regardless of which BitFlow frame grabber is being deployed. Strategic collaboration between BitFlow and software developers has resulted in a massive library of third-party drivers. BitFlow plug-and-play drivers seamlessly integrate its frame grabbers within virtually any application environment, eliminating the need for new coding, while helping to achieve more stable systems. Aside from LabVIEW, BitFlow offers dedicated drivers for AB Software ImageWarp, Cognex Vision Pro, MVTec HALCON, Mathworks MATLAB, NorPix StreamPix, IO Industries Streams, Adaptive Vision Studio and Stemmer Imaging Common Vision Blox.
As part of the recently arranged agreement between Genetec and MOBOTIX, various MOBOTIX camera lines will be officially supported in the new Security Center 5.6. Along with the extensive support of the MxPEG codec, many other unique MOBOTIX functions are available, such as virtual PTZ, various image settings, events from MxAnalytics, video motion, digital inputs and outputs as well as audio inputs and outputs. The first successful example is the application of MOBOTIX and Genetec by SecureWatch24, one of the largest security companies on the east coast of the United States. SecureWatch24 offers a complete around-the-clock security concept for companies and properties. Crucial to this concept are the robust construction and video analysis of MOBOTIX cameras. Improved Security Systems According to Gene Dellagio, CTO of SecureWatch24, “We are excited about the possibilities offered by integrating MOBOTIX cameras into the Genetec platform. Without a doubt, when it comes to cameras, MOBOTIX gives us one of the most intelligent and forward-looking devices on the security market. At the same time, with Genetec software we are using one of the most comprehensive and flexible VMS systems available.” He also states, “Precision and reliability of events are extremely important for SecureWatch24 and the customer solutions we develop independently. The event logic from MOBOTIX is able to reduce the number of false alarms, while the robust platform from Genetec significantly accelerates the research process and improves reaction times for actual security risks.”
Antaira Technologies is a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNX-2602G-SFP series. Industrial-Grade Equipment For Harsh Environments The LNX-2602G-SFP series is industrial-grade equipment that is Ethernet ready to fulfill various markets’ edge-level networking applications in harsh environments, such as, manufacturing automation, security surveillance, power/utility, water wastewater treatment plants, oil/gas/mining, and transportation. This switch is also perfect for setting up a dedicated network for optimizing VoIP and video application. LNX-2602G-SFP Features Antaira’s LNX-2602G-SFP is the latest industrial Gigabit unmanaged Ethernet switch series that offers 24 full Gigabit Ethernet ports and two gigabit combo ports featuring SFP fiber slots for long distance connectivity or two 10/100/1000 twisted pair ports. This product series has an IP40 rated metal casing design that can be mounted in a 19” rack. The device utilizes an input voltage of 90 to 264 VAC with an overload current and reverse polarity prevention, as well as high EFT surge and ESD protection. Each unit is built to withstand industrial networking hazards like shock, drop, vibration, Electromagnetic Interference (EMI) and temperature extremes. Wide operating temperature version options include a standard (-10 to 70°C) model or an extended (-40 to 75°C) model. The units conform to the following dimensions of 17.3 inches/440mm (W) x 7.9 inches/200mm (D) x 1.7 inches/44mm (H) and a unit weight of 6.2 pounds.
Utility security staff have a responsibility to ensure they can identify risks associated with security threats Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the assumption that when they get out of bed each morning and flip on the lights, the room will illuminate, the coffee pot will come to life and their mobile phone will have been fully charged. After all, we live in a modern First World society, where we have come to depend on timely and efficient power at our fingertips. In reality, that reliable electricity that we all enjoy has many people working around the clock to ensure its reliability, resiliency and security. Today’s grid operators are inundated with natural and man-made threats. As utilities tackle the monster of the moment, which is the evolving cybersecurity threat, we must not take our eyes off the more primitive threat. Security Threats To US Grid Electricity is perhaps the most vital of the critical infrastructures and key resources that support our society. The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long?term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Currently, the most significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists During emergencies, NERC supports industry actions to respond, mitigate and restore the BPS to normal operation by facilitating effective information sharing and communication with and between NERC registered entities, government agencies and the media. This information is not focused on operational decision making; but instead provides utilities data, best practices and mitigation strategies to help recover from crisis. Obviously as a regulatory body, NERC must stay out of emergency response until the utility has best mitigated the threat or reliability issue. Currently, the most significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks specifically targeting the grid are rare, but an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target”, could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. An attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target”, could inflict significant damage Critical Infrastructure Protection Critical infrastructure protection is a cyclical process incorporating prevention, detection, mitigation, response and recovery. The key to this protection is the identification of credible threats, which will assist energy companies in assessing risks and potential vulnerabilities (weaknesses) of their facilities. Once a threat has been thoroughly analyzed, it is then possible to institute preventative measures to deter, detect and delay an attack. Of course, critical infrastructure protection planning must always include mitigation, response and recovery actions in the event an attacker is successful. While the security of the grid is a shared responsibility between the government and the private sector, the primary responsibility rests with utility owners and operators. Utility security staff have a responsibility to ensure they are able to receive and act upon criminal intelligence and be prepared to identify risks and vulnerabilities associated with security threats. Any protection program that is developed must be as efficient and cost-effective as possible, as budgets are limited and ratepayers are sensitive to wasteful spending. Effective security programs rely on risk management principles and associated tools to establish priorities, allocate budget dollars and harden infrastructure sites. Physical security protection encompasses defensive mechanisms to prevent, deter and detect physical threats of various kinds. Specifically, these measures are undertaken to protect personnel, equipment and property against anticipated threats. Properly conceived and implemented security policies, programs and technologies are essential to ensure a facility’s resistance to threats while meeting demand, reliability and performance objectives. Unfortunately, many do not realize the amount of reports, guidelines, standards and assessments that have been developed for use Electricity Industry Physical Security Standards Significant progress has been made in the electricity industry surrounding the issue of security. Unfortunately, many do not realize the amount of reports, guidelines, standards and assessments that have been developed for use. The industry has gone through multiple iterations of mandatory Critical Infrastructure Protection (CIP) Standards that focus on security protections. The CIP Standards, while not perfect, may be an example for other sectors to immolate. These standards are a minimum baseline for compliance and utilities should not assume that because they have a good compliance program they are somehow immune from attack. In addition, many electric utilities undergo a sector-wide Grid Security Exercise (GridEx) every two years to hone their skills and provide updates to their security practices and policies. This is in addition to annual exercises mandated by the cyber standards. It is fair to say that the industry has been very responsive to the evolving security threat and the mandatory requirements found within CIP compliance. As a result of the 2013 California substation attack that destroyed $15 million dollars in infrastructure, industry now has a physical security standard. This standard was created to protect the most critical transmission substations and control centers in North America. While protections vary, many utilities have upgraded their security measures to include concrete or non-scalable perimeters, robust access control, cameras, lighting and armed guards. It is highly likely that we will one day see similar standards put in place to better protect non-nuclear generation facilities, but only time will tell. Many utilities have upgraded security measures to include concrete perimeters, robust access control, cameras, lighting and armed guards The piece that the industry continues to struggle with is information sharing and the ability to quickly obtain actionable threat intelligence; an issue which has been combatted head-on through the sharing of security information amongst utility partners. Large utilities with the manpower and resources to address this initiative are changing the security model from reactive to proactive. If you understand your adversary’s tactics, intent, and capabilities, you can develop strategies to combat their attacks and better plan for future threats. Better, more proactive security, can be achieved through information sharing agreements and partnerships with other utilities, regulatory agencies and intelligence partners. Many utilities do not have the dedicated resources to dissect and aggregate this data and are thus unable to react appropriately, or wind up drawing inaccurate conclusions. As a result, the electricity sector is demanding more access to actionable intelligence and threat streams. With this added intelligence, utilities can better pinpoint threats to specific systems and focus efforts on system recovery and restoration. This will undoubtedly drive better, more informed responses to security incidents. The FBI, DHS and the DOE have made considerable strides in improving information sharing, and giving classified access to intelligence products Improving Information Sharing Over the past few years, the FBI, DHS and the DOE have made considerable strides in improving information sharing and giving classified access to intelligence products such as bulletins, alerts and secret level briefings. These products have been used to mitigate threats, reduce risk and update internal security policies. Additionally, this data flow has enhanced communications between security teams, management and board members by providing authoritative threat warnings. This ultimately drives better investment strategies by more directly connecting security priorities with business risk management priorities. Unfortunately, utilities still see risks in sharing information with federal partners. Recently, the Washington Post released an article with a salacious headline falsely suggesting that the grid was hacked via Russian malware. Even after correcting the story, the question remains: who leaked the information to the Washington Post? Utilities all over the country were witnessing an information sharing failure. We must assume that at some point in the future a North American utility will suffer from a planned and coordinated attack against electrical infrastructure. Have we looked at credible threats closely enough and did we prepare our people to respond, recover and communicate? As an industry, we will be judged and hard questions will be asked about how seriously we considered the threats and what we did to mitigate future attacks. Success will be determined by how quickly we are able to respond and the swiftness of system recovery. There is no doubt that security is an “all hands” approach by everyone involved.
The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas The greatest trend in history will continue to change the world, and the physical security market. It’s called Moore’s Law. In accordance with Moore’s Law, our electronics have consistently doubled in speed, halved in size, or halved in price every two years for decades already. This trend means that our electronics, communications networks, data networks, and digital world evolve at a faster pace than anything else in the world, making a huge impact on the security market as well as hundreds of others. To put the power of the law into perspective, just imagine if Moore’s Law applied to our world beyond electronics and networks. Imagine the year 2025 – just 10 years from today. Imagine flying to China in less than 30 minutes. Imagine driving all the way across Texas on a single gallon of gasoline. Imagine paying just $3 for nearly $100 worth of groceries. What a wonderful world that would be! Future Technology But to achieve these outcomes, flight speeds would need to double every two years, fuel efficiency would need to double every two years, and food prices would need to be cut in half every two years. These are aggressive trends to pursue. Ten more years at those rates, and in 2035 you would be flying to China in less than 60 seconds, driving around the entire planet on a single gallon of gasoline, and paying just about 10 cents for the groceries that cost you $100 today. But now let’s snap back to reality, because those trends are ridiculous. Nothing can improve that quickly (except our electronics and computer networks). Security devices have shifted from analog to digital, and are therefore poised to accelerate in their evolution as well. Do we truly realize where this trend can take us and how fast it can take us there? Are we ready to embrace these changes? Does upper management see them coming? I’m reminded of a scene from the classic comedy The Blues Brothers in which Jake and Elwood (a.k.a. the Blues Brothers) return to Elwood’s apartment. A loud train rolls past the window. Security devices have shifted from analog to digital, and are therefore poised to accelerate in their evolution as well Jake: How often does the train go by? Elwood: So often that you won't even notice it. Trains continue to noisily whiz past Elwood’s tiny apartment. The sound of the trains is overbearing at first. However, about one minute later and we – the viewers – have grown accustomed to the sound. Jake apparently does as well, because he falls asleep even as the trains continue to roar past. Perhaps Elwood is onto something… Personal Experience Can the greatest trend in history go under-appreciated simply because it is so consistent? Back in the mid 1990’s, my parents bought a big beige family computer. That beige box was an exciting part of my childhood, and was a large part of why I went on to study electrical engineering. The computer had a whopping 8 GB of storage and cost thousands of dollars. It is now 20 years later, and I’m walking around with a much more powerful computer in my pocket. My smartphone cost me a small fraction of what my parents paid for that big beige box, it has much better software, it has a much faster internet connection, and I can take it anywhere with ease. Truly miraculous if you think about it, and even more miraculous if you think about where we might be in another 20 years. While I don’t expect to be flying to China in less than 60 seconds by 2035, I absolutely do expect our computers to be over 1000 times as powerful, 1000 times as small, 1/1000th the cost, or some combination thereof. Some Bold Predictions Now that you are hopefully in the proper mindset, here are three bold predictions for the future of surveillance: Ultra High Definition: Despite all of the wonderful surveillance technology we have today, surveillance systems are very limited when viewing wide open areas at a long range. Their resolution and analytics don’t come close to the capabilities of the human eye and the human mind, respectively. This will change as digital camera resolutions skyrocket alongside computing power. The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas at resolutions hundreds of times greater than modern cameras. Our borders, waterways, parks, streets, and so many other areas will become visible 24x7x365. Sensors Everywhere: 8 GB of storage used to fill up a big beige desktop box. Now we can get 128 GB in something the size of a fingernail. Sensors are getting smaller too. Police officers are being outfitted with body cameras, most people carry one with them in their smartphone, and most storefronts have cameras. GoPro is creating a culture of documenting our most interesting moments, or just documenting everything. Meanwhile, electronic sensors are being placed all over our cars, houses, industrial facilities, motors, pumps, ships, and seemingly anywhere and everywhere else. Size reductions may someday enable micro-electromechanical systems (MEMS) to power devices purely from vibrations and temperature gradients. Smaller and more affordable sensors may mean faster refresh cycles in security deployments. The Screen: Perhaps you’ve noticed the children at restaurants fixated on their smartphones and tablets. Teenagers often sit in groups at their tables in silence, eyes aimed at their devices. I’ve even gathered with my friends to watch a sports game, only to look up at some point and realize that everyone is staring at their phone screen. Adults walk the streets and hallways buried in their devices. We are so often connected to our screen, checking the latest updates, reading an article, or communicating with someone far away. We work at our computer monitors during the day and then go home to watch TV or read on our tablets, or both. At some point we will collectively spend more time looking at “the screen” that we do looking at the real world around us. What does this mean for security? Simply that the integrated software interface is the centerpiece of a security system’s success. The integrator must work hard behind the scenes to bring a streamlined and unified software interface to their client, because any other solution will obsolete. Smart phones, smart watches, smart cars, smart buildings, smart drones, smart everything – all becoming internetworked These are just predictions. I do not have a crystal ball, and something even more disruptive may very well come along and derail all of them; but right now these seem to be inevitable trends that will occur over the next 10 to 20 years. Reshaping The World Moore’s Law has reshaped the world, and it will continue to reshape the world. Smart phones, smart watches, smart cars, smart buildings, smart drones, smart everything – all becoming internetworked. Digital currency is taking hold, artificial intelligence is taking off, and data usage rates are skyrocketing. All of this combined has tremendous implications from both a physical security and a cybersecurity standpoint. There will be new creative tools to safeguard the world, and new creative tools to disrupt the world. As security professionals, it is our job to ensure that the client’s business can be conducted safely, reliably, and conveniently. Technology will continue to accelerate into the future, and this will likely bring about radical socioeconomic changes. There will always be challenges, but we are fortunate to live in these modern times. I encourage us all to take some time to look forward and wonder what is coming up on the horizon. Some will see amazing opportunities. Some may shrug this whole article off and ask, “How often does meaningful innovation really happen?” My response to those people: So often that you won’t even notice it. Or will you?
The fundamental value of data is widely apparent in modern society, and its loss may have significant consequences Video data is critical to today’s enterprise. The latest video storage systems must offer dependable operation that doesn’t risk loss of that critical data. DDN - When Performance Matters “Not only is bandwidth very important, but functionality cannot be lost when a storage system is having a bad day,” says Jeff Adams, director of sales, surveillance solutions, for DDN (DataDirects Network) Storage solutions. That importance is reflected in DDN’s motto: “When performance matters.” “If you pull a drive out of a running DDN system, the system monitoring tools will show you that the video data destined for those particular drives is actually being captured or journaled – not lost forever as with competing storage solutions,” says Adams. “When the drives come back online, the journaled data is written in a partial rebuild state as normal operations continue. This dramatically increases overall system performance, reliability and dependability in comparison to competing storage solutions that need to perform full rebuilds from parity each time a drive fails.” DDN systems are architected to continue delivering maximum performance even in adverse conditions, Adams adds. With DDN, entire drive enclosures can go offline while remaining operational with zero data loss. Importance Of Data Recovery Service The storage industry must work to communicate the available options in a way that clearly demonstrates how they fulfill the vast and specific needs of surveillance storage A critical area that can be overlooked in video storage relates to the reliability and rescue capability of storage drives, according to Seagate Technology. The fundamental value of data is widely apparent in modern society, and its loss may have significant consequences; this is particularly true in an area where the maintenance of data is often strictly regulated. “It is crucial, then, that end-users take steps to ensure that the storage solution in their surveillance system is covered by a data recovery service,” says Henk Van Den Berg, Seagate’s European sales director. To ensure that such opportunities are exploited, the storage industry must work to communicate the available options in a way that clearly demonstrates how they fulfill the vast and specific needs of surveillance storage, he says. Intelligent Video Recorders Dependability relates not only at the system level, but at the internal component level as well, says Jeff Burgess, president and CEO of BCDVideo. The integrator should not only expect, but demand, a scalable, stable solution that can be remotely managed, comes pre-imaged, ready-to-rack, and fully covered, he says – “and a manufacturer who’s got his back.” The technology capabilities of today’s intelligent Video Recorders (IVR) have turned the storage unit from a JBOD (just a Box of Disks) to a complete management and notification center. In addition to capturing and redirecting the video streams, the system can alert the administrator on system fluctuations based on thresholds set by the administrator. This includes both those within the system – CPU temperature, cooling fans, and memory usage – as well as active peripherals attached to the network, such as network switch ports, camera activity, client viewing stations and video streams. “We relate to all those insurance commercials promising a lower rate within 15 minutes,” says Burgess. “Notice how they never tout the quality of their service, just the fact that they can save you money in 15 minutes. But is that why you buy insurance? Don’t you really want it for if/when something happens? In that regard, what do you do when something catastrophic happens and you need to find that frame sequence, or restore and view the video from a certain date, yet you can’t because the data is corrupt or simply not there? Bet you wish you had those 15 minutes back.”
We don’t usually report on financial news here, but a recent financial move by up-and-coming industry leader Hikvision warrants attention. Specifically, Hikvision in Hangzhou, China, has secured a $3.1 billion line of credit from the government-owned China Development Bank. Companies use a variety of financing tools to provide the currency they need to fuel growth, so in that regard, Hikvision’s move is to be expected. Given their ambitious growth timeline, both in China and throughout the world, it’s no surprise that they would be creating mechanisms to finance that growth. The surprise here is the size of the move. To put $3.1 billion into perspective, consider that Canon paid $2.8 billion when they bought Axis, and that transaction generated tons of interest in the industry and, arguably, shook up the whole market. Obviously, with $3.1 billion of credit at their disposal, Hikvision is well equipped to shake up the industry, too. For fast-growing Hikvision, $3.1 billion is an amount greater than its reported sales revenue of $2.78 billion in 2014. “The company is focused on global growth,” says Alex Asnovich, Head of Marketing at Hikvision USA. “Talking about North America, we are opening our new Hikvision USA headquarters in the Los Angeles area in the summer of 2016. We have our new logistics facilities in Miami to support North and South Americas. We recently opened our Hikvision Canada headquarters office in Montreal and started our own bilingual English and French Canadian tech support center on the East Coast.” Hikvision’s R&D Operations R&D is also a big part of the picture. I saw the scale of Hikvision’s R&D operations first-hand on my China visit earlier this year. The company has more than 5,400 engineers, including more than 2,000 software engineers. I also saw the construction site for a new 28-floor facility, adjacent to Hikvision’s other two high-rises in Hangzhou. When the new tower opens in 2018, a large part of it will be devoted to research and development. Hikvision has said its research focuses on such topics as perceptive technology, intelligent analysis, Big Data and cloud storage. “We also plan to build up our R&D resources in North America,” says Asnovich. “Globally, our new European facilities are opening in 2016 in a new building the company owns, and we are also opening new branches and facilities on other continents.” Hikvision is looking to expand into other market segments such as drones Growing a business costs money, and growing a large business this much takes a lot of money. Hikvision reportedly plans to use $1.6 billion of the credit line inside China, and $1.5 billion outside China, including the important U.S. market. Expansion Into Different Markets Hikvision is looking beyond security, too, and the line of credit will help to finance expansion into market segments such as robotics, industrial machine vision, and drones. There was a hint of what’s to come at the China Public Security Expo in October in Shenzhen, where attendees crowded around a demonstration of a Hikvision drone (available now in the Chinese market). Could an acquisition be in Hikvision’s future? “The line of credit we recently received could prepare us in advance of an M&A opportunity, if and when a good prospect arises,” Asnovich comments. Possible Hikvision acquisitions in the United States have long been a topic of cocktail hour rumors and speculation in the security market. “It is certainly a large amount of money for the security environment,” says Asnovich. “However, it’s not atypical for many other industries. This is not the first time for Hikvision to receive a substantial line of credit.” For example, the company recently was also extended lines of credit for 5 billion Chinese Yuan (around $0.77 billion USD) from international financial organizations such as Deutsche Bank, Citibank, HSBC, and others. Needless to say, Hikvision’s future ambitions in the security market, and others, are well financed. If the amount of available funds reflects the scope and nature of that expansion, we might expect some dramatic moves from Hikvision in 2016.
I love Wikipedia, not just because I use it every day, but also because it reflects the value that can be created when a large community works together. When each member of a community contributes a small part, the result is monumental. I saw an estimate somewhere that it would take a million pages to print out Wikipedia. Is there an opportunity to leverage video in the same way; that is, to tie together the capabilities of millions to create a central repository that could be useful? Consider the proliferation we’re seeing of smart phones that – we keep getting reminded – have higher resolution than many of the professional video surveillance cameras our industry provides. Consider that these smart phones can provide better quality video every day because of new features that accommodate low light and other challenges. The Boston bombing investigation highlighted the value of smart phone video when police filtered through video captured by bystanders in search of the bombers. But why should we leave crowdsourcing the capture of video to mere chance? Why can’t we create a system that can provide access to smart phone video of a specified area in an emergency? As the saying goes, there should be an app for that. Smart phone users who voluntarily download the app would be able to provide video instantly to a centralizedrepository whenever they are prompted to do so (via the app). Because of GPS systems in phones, the system could know who is in a specific area at a given time and could send a “need video coverage” message to any smart phone users in the area. The user would then know to deploy the powerful video camera in his or her pocket (and could even be directed what to view.) Citizens could be encouraged to download the app in the interest of good citizenship and Homeland security. Access to instant video of hundreds of smart phone cameras in an area where an event is under way would be immensely valuable to police and emergency responders Access to instant video of hundreds of smart phone cameras in an area where an event is under way would be immensely valuable to police and emergency responders in assessing the situation and directing limited resources in a timely manner. After an event, video recorded (automatically?) at the central repository would provide a forensic tool. The smart phone users would merely be fulfilling their role as good citizens. Like Neighborhood Watch to the millionth power. (All participation and capture of video would be voluntary, so privacy wouldn’t generally be a concern.) It’s not that far-fetched an idea, is it? The benefits of apps that encourage citizens to do good deeds have already been demonstrated. For example, the city of Boston has a map-based Web app that allows individuals, businesses and community organizations to “Adopt-a-Hydrant,” in effect to volunteer on an ongoing basis to shovel the snow away from a specific fire hydrant to avoid delaying fire fighters who would need the hydrants in an emergency. It’s the same idea – calling on community volunteers to fulfill a service that would be time- and resource-consuming if handled centrally, but is perfectly manageable if everyone does a part. As good as our professional video systems are getting, and even considering how many are being deployed, a big drawback will always be camera coverage. Having a powerful video camera in the hands of almost every ordinary citizen it too good a resource to ignore, and technology exists to enable that value to be harnessed. In our industry, IP video systems could provide the ability to tie into the centralized source of smart phone video, and could even prompt users to deploy their cameras as needed, in effect expanding the camera count of their systems exponentially. There was a news story out of San Jose last week about the creation of a video surveillance camera registry that would provide voluntary access to the city’s private surveillance cameras as an additional tool in crime prevention. Same idea, but there are many more smart phone cameras than private surveillance cameras. And Wikipedia shows us how the Internet can combine a vast number of individual data points into a useful whole. Could a similar approach work for smart phone video feeds? Just wondering.
You can depend on the National Rifle Association (NRA) to enter the conversation after almost any high-profile violent incident, and such was the case recently after a 22-year-old college student went on a deadly rampage outside the main campus of the University of California, Santa Barbara. Thirteen were injured and six young adults lost their lives, including the perpetrator. After the tragedy, “NRA News Commentator” Dom Raso took issue with what he called “inaccuracy of the media, especially regarding their reports of mass shootings.” Specifically, Raso objects to the media’s use of the word “shooting,” rather than the more general term “murderer.” His contention is that “shooter” focuses excessive attention on how a crime was committed, rather than the crime itself. “All of a sudden, instead of focusing on the real common link between all acts of evil, the evil person who did it, we are subconsciously told to think about the tool they used instead,” he says. “Evil is the problem, the tool is irrelevant and stories designed to make you think anything other than the truth are propaganda.” How many marketers avoid the term “video analytics” because of bad connotations from early failures of the technology? I thought his argument was a little thin until I realized that the University of California perpetrator used both a gun and a knife in his crime – he stabbed three victims before shooting the others. However, he was almost universally referred to as a “shooter” but not as a “stabber” or “knife-wielding maniac,” or whatever the equivalent knife-related noun would be. It’s not that any of the reports were incorrect, just a matter of emphasis. I wouldn’t exactly call it propaganda, but it reminds us of the importance of how we use words in our market as well as in the world at large. Something as simple as using the term “security officer” instead of “security guard” can suggest a higher stature or greater importance of the job being done. Why do retailers use a polite euphemism like “shrinkage” to mean “theft” (in its various forms)? Terms like “surveillance” can absorb negative connotations, suggesting “Big Brother” or the NSA. You see word choice reflecting market trends, too. How many marketers avoid the term “video analytics” because of bad connotations from early failures of the technology? Some apparently think the term “PSIM” carries an implication of being expensive or two specialized. That’s how you come up with companies saying things like, “It does everything a PSIM does, but it isn’t a PSIM.” (PSIM is an acronym for physical security information management.) As an editor, I am aware of the power of words. I take Mr. Raso’s point, although I disagree that the intent is propaganda. Most journalists would choose “shooter” over “murderer” or “perpetrator” simply because it is more specific. Sadly, most of us hear the words so often nowadays we hardly stop to think about them. Maybe we should. Bottom line: Our words can reveal our biases, so we should choose them carefully.
Traditionally, many stores have used an assortment of tags and labels on a diverse range of merchandise, most of which were designed for an entirely different set of products. As a result, many apparel retailers have recognized that in some instances merchandise and textiles are being damaged. Checkpoint Systems, renowned supplier of source-to-shopper solutions, has therefore developed an innovative new anti-theft solution to meet their specific requirements – Mini NeedleLok. Mini NeedleLok Anti-Theft Solution Designed to protect all types of garments, including very thin fabric, the one-piece solution deters thieves while preventing damage that would usually occur on application of pinned security tags. While other products on the market feature a hinged mechanism which can snag and rip textiles, Mini NeedleLok uses a needle in place of a separate pin, which separates the fibers rather than breaking through them. This allows store assistants to gently spread fabric threads on application to avoid leaving a visible hole after removal. In order to reduce time spent on in-store tagging labor, the Mini NeedleLok mechanical design allows quick and easy application, while the solution’s wide opening also allows freedom of placement anywhere on the garment. Minimum Product Damage Risk The Mini NeedleLok speeds up the self-checkout process The Mini NeedleLok also speeds up the self-checkout process. It can be removed quickly and efficiently at the point-of-sale, thanks to its single-piece design and wide opening, enabling store associates to assist with other enquiries, improving the in-store customer experience. It also eliminates the risk of damage to the merchandise, or injury to the customer, as the needle is never exposed. Not only that, with 70% of purchase decisions made at the shelf, Mini NeedleLok has been designed with display in mind. Its sleek look and smart black color ensures it doesn’t impede on the garment’s aesthetics in order to help turn a browser to a buyer. For those retailers wishing to take their visual merchandising a step further, the solution can also be customized, from adding a logo to a bespoke colorway that matches the company’s branding. Anti-Theft Retail Solution Irene Fernandez, Product Management Europe at Checkpoint Systems, commented: “We’re more customer focused than we have ever been in our history, which is demonstrated through the diverse range of solutions that we now offer retailers across a variety of markets. With the Mini NeedleLok, we took our existing technologies and created a product that fits our apparel customers’ requirements - an effective anti-theft solution that protects merchandise, with the added benefit of being customizable. This is ideal for fashion brands where aesthetic is crucial to their identity.”
Shrewsbury Town Football Club have defied the odds at the start of the 2017-18 football campaign by being well and truly amongst the pace setters with a quarter of the season already gone. No doubt there many reasons for the turnaround in fortunes from what was a dramatic end to last season with the Town finishing near the bottom to being on the crest of a wave this season. One of them could be down to the complete refurbishment of the Club’s Sundorne training facility on the outskirts of the town. The Football Club have invested heavily in ensuring that the quality of the training pitches is equal to the match day playing surface at the Montgomery Waters Meadow stadium. The players, coaching and fitness staff are also benefiting from the computer-based analyzing equipment and on-site catering facilities within the complex. Security System Installation Needless to say the new training complex required a security system to protect the Club’s investment. One level of security was to install a CCTV system to monitor the site. Shrewsbury Town’s chief executive Brian Caldwell approached one of the Club’s main sponsors Pro-Vision Distribution for assistance. Being a national distributor of CCTV, Access Control and Public Address equipment, Pro-Vision were ideally placed to advise the Club. Following a site visit from local installation company K.J Electronics Systems Ltd, who specialize in CCTV, perimeter protection and intruder alarms the new surveillance equipment was installed. Based on the Samsung Wisenet brand, the agreed specification included 4 x vandal-resistant, true day/night dome cameras, a high definition external bullet camera and a pan/tilt/zoom camera with all recorded data stored on a network video recorder. New Training Facility Secured The true day/night specification ensures that all cameras are able to view images 24/7 irrespective of the amount of natural daylight present and the recorder can accommodate any additional cameras that may be required in due course. Any alarm activation event is sent to a central monitoring station via a secured connection. The Town’s latest asset – their new training facility - now has awarding-winning security equipment to protect the Club’s investment.
Raytec VARIO2 illuminators have been installed in the greater Kruger National Park in South Africa to capture amazing footage of some rather large and wild animals. Raytec illuminators have been used in some of the most challenging and exciting environments globally, everywhere from the Arctic Circle to the jungles of Borneo, and when specialist wildlife film makers WildEarth were looking for a solution for their live night time filming needs they turned to Raytec for support. In the film and TV industry where picture quality is everything, outstanding illumination was essential for producing the best images. WildEarth deployed state of the art 4K cameras to capture high definition images of elephants, lions and leopards. But when it comes to filming at night, ethics plays the most important role in how the images are captured. Using visible white-light would disturb or temporarily blind the animals, or even affect the outcome of their hunts. Therefore, powerful infra-red lighting was chosen which would have no negative effect on the wildlife, but would help the cameras perform over long distances in the dead of night. Choosing VARIO2 i8-3 Highly recommended by other wildlife journalists, WildEarth looked to Raytec infra-red lighting as a powerful yet invisible solution which would allow the cameras to generate outstanding black and white images at night. They chose the ‘VARIO2 i8-3’ which delivers distances up to 600m+ with 5 different angle options that can be changed on site – giving them the flexibility to adapt the illumination at each location. With VARIO holographic lensing, the illuminators produce a highly even spread of light, which allowed WildEarth to capture consistent images of the animals anywhere in the scene with no bright or dark spots. “We’ve been so impressed by the Raytec IR lighting” comments Jeandre Gerding, Head of Camera Operations for WildEarth. “Not only have the illuminators allowed us to film incredible footage in zero light conditions, but the fact that they are low voltage means that we can conveniently power them via battery from our mobile camera vehicles”. Guaranteed Lighting Power The IR needed to guarantee exactly how much light it would deliver on scene because higher megapixel cameras generally require more light to generate the resolutions they are capable of, and the film crew wanted to guarantee perfect pictures of the animals. Raytec scientifically measure the performance of all their illuminators, and guarantee a recommended 0.35 μW/cm2 of lighting power at the maximum distance of all of their infra-red illuminators – reassuring WildEarth that they would achieve suitably high-quality images every time. All Raytec illuminators are highly robust and can withstand the most extreme temperatures and humidity. IP66 rated, they require zero maintenance and deliver a reliable 10-year life out in the field – perfect for any demanding environment.
The CrimeEye-RD-2 is lightweight, providing easy portability, installation, and superior imaging Total Recall Corporation, a Convergint Technologies Company, has been chosen to work with the City of Chattanooga and the Chattanooga Police Department to make their city a safer place. Total Recall will provide them with a citywide safety solution that includes 15 of its outdoor CrimeEye-RD-2 rapid deployment portable video systems, the latest in its CrimeEye line of digital video solutions. Creating A Secure Environment “Total Recall Corporation and Convergint Technologies are very pleased that the Chattanooga Police Department has selected CrimeEye as the platform for their citywide safety solution,” said Jordan Heilweil, President of Total Recall Corporation. “CrimeEye will allow CPD to respect the privacy of its citizens while also creating a more secure environment.” The Chattanooga Police Department (CPD) has begun installing CrimeEye-RD-2 video units on 15 power poles throughout Chattanooga. The CrimeEye-RD-2 uses Axis Communications dome network cameras—managed by Genetec Omnicast, an IP video management system—to stream HD-quality video within just minutes of installation. All of this video data will be viewed live at CPD’s new Real-Time Intelligence Center. The CrimeEye-RD-2 is lightweight and self-contained, and it provides easy portability, simplified installation, superior imaging, and intelligent electronics. The unit requires virtually no tools to set up and can be deployed by one person on almost any type of pole with the included mounting hardware. Chattanooga, which is the fourth-largest city in Tennessee and has more than 175,000 residents, is one of several municipalities throughout the United States to choose Total Recall Corporation’s CrimeEye solutions. “The Chattanooga Police Department is now part of an exclusive group of CrimeEye users that includes the Department of Homeland Security, the Statue of Liberty, and some of the biggest police departments in the United States,” said Rebecca Law, Business Development Manager, Convergint Technologies. “We are honored to be working with Chief Fletcher and the men and women of the Chattanooga Police Department.” "CrimeEye promotes crime reduction, community safety and continues building relationships with our community" Promoting Crime Prevention “CrimeEye promotes crime reduction, community safety, continues building relationships with our community, assists in solving all types of crimes, and aids prosecutors in putting criminals in jail,” said Chattanooga Police Chief Fred Fletcher. AXIS Communications and Genetec Inc. are long-time Total Recall Corporation technology partners that have successfully collaborated on many CrimeEye deployments, including providing video coverage for the Statue of Liberty, the national Concert for Valor, and for the Passaic Valley Sewerage Commission, one of the largest wastewater treatment plants in the United States. “Safety is one of the key responsibilities of every city around the globe. We’re pleased that our cameras are part of the CrimeEye deployment in Chattanooga” said Mark McCormack, National Sales Manager, National Accounts, Axis Communications, Inc. “The collaboration between Axis Communications, Total Recall, and the Chattanooga Police Department has been successful in making Chattanooga a smarter and safer city for all.”, said Bob Carter, Business Development Manager for Smarter and Safer Cities, Genetec Inc. “We look forward to serving the City of Chattanooga and the Chattanooga Police Department through our partnership with Convergint Technologies, coupling our industry-leading video software solutions for law enforcement with Total Recall’s innovative CrimeEye outdoor video solutions,” added Carter.
IDIS’ integrated surveillance infrastructure provides comprehensive cover at the school’s estate Situated on a World Heritage site within the Precincts of Canterbury Cathedral, The King’s School, Canterbury is England’s oldest school, dating from 597AD. As a co-educational independent school, it offers a 21st-century education within an illustrious historic setting to more than 820 students aged 13-18, including boarders and day pupils. The school estate includes an exceptionally diverse mix of old and new architecture, ranging from medieval Grade 1 listed buildings to brand new premises. Unlike many schools, which typically occupy a single site that can be enclosed with relative ease, the King’s estate includes around 220 separate buildings. They are dispersed across a wide area, many within the public Cathedral grounds and others isolated further afield. Amenities include day and boarding houses, teaching facilities, a music school, recreational center, sports facilities and staff accommodation. The school also runs security at the affiliated Junior King’s Canterbury, attended by pupils aged 3-13, on an 80-acre estate four miles away. Upgrading Safety Policies And Incident Management As at any school, student safety at The King’s School is of paramount importance. In 2015 the management team undertook a comprehensive review of all aspects of security, from safety policies to major incident planning. At the time security was dependent on disparate analog CCTV systems plus a diverse range of hardware and software from multiple vendors. The school instead wanted a converged surveillance infrastructure unifying systems from a single manufacturer to ensure seamless capability across all sites. However, there were significant challenges, including logistical, engineering and regulatory restrictions on fitting new wiring and equipment within the historic buildings, some with very thick stone walls. Stringent Department of Education (DoE) controls on surveillance in schools also had to be observed. And, of course, the solution had to be cost-effective, ensure ease of use and require low maintenance. It also needed to deliver the flexibility and scalability to support all future plans in line with ongoing school development. "Sunstone Systems and IDIS were extremely creative in overcoming our challenges and the solution exceeded expectations" HD Surveillance Security integration experts Sunstone Systems designed and delivered a customized surveillance solution built around a core base platform with IDIS equipment and software. Once complete, the solution will comprise a mix of 120 cameras from the IDIS fixed range, including dome cameras, network video recorders and all the associated software required to deliver an integrated surveillance infrastructure. Combining unobtrusive IDIS IP cameras with IDIS software ensured that high-quality images could be achieved by running HD TVI over existing coaxial cables, significantly reducing the need for extensive rewiring. This in turn eliminated the need for extensive engineering work in old buildings, helping to contain costs while meeting Historic England’s requirements. IDIS software overcame many key challenges, for example, by enabling digital enhancements, digital zoom and privacy masking to enable compliance with DoE requirements while providing comprehensive cover in the most sensitive areas of the estate. Improved Reporting And Low Maintenance The system has been very well received. It is proving easy to use by staff, involves less time and administration, delivers improved reporting and requires minimal maintenance. Excellent HD image quality ensures easy access to indisputable evidence of any incident. At the recreation center, for example, 23 new IDIS motion-detection cameras enable staff to quickly play back any events that require attention. “Safeguarding students is our top priority so we need surveillance we can trust implicitly. Sunstone Systems and IDIS were extremely creative in overcoming our challenges and the solution exceeded expectations. It does everything we wanted and more to protect students, the school and our reputation for responsible stewardship. What’s more, it provides all the flexibility we will need to meet our security requirements as they continue to evolve,” commented Lee Connelly, Security Manager at The King’s School.
The IRIS Cam system integration with Genetec Clearance allows efficient video evidence collection & management Point Blank Enterprises, a manufacturer of soft body armor and related protective solutions, announced that it has been awarded a five-year contract by the North Miami City Council to provide the North Miami Police Department with IRIS Cam body worn cameras, together with a collaborative case management system from Genetec Inc., a leading provider of open-architecture security and public safety solutions. PBE and Genetec will offer the city of North Miami Police Department an integrated system that combines 120 IRIS Cam body-worn cameras and Genetec Clearance, a case management system designed to accelerate investigations by enabling different organizations to collect, manage and share video evidence. IRIS Cam Body Worn Camera The IRIS Cam is designed to meet the growing demand for law enforcement agencies to provide a visual and audio record of officers’ interactions with the public and help agencies improve evidence collection and enhance officer accountability. Built in a ruggedized enclosure, the IRIS cam provides ultra-high definition recording with a 140° FOV, for getting even closer to the action. Additionally, the IRIS Cam ensures not a moment is missed with 30 seconds of pre-recording. Genetec Clearance Case Management System The Genetec Clearance case management system is designed to speed up investigations by enabling different organizations to collect, manage and share video evidence, and other relevant case information. It allows police officers, investigators and security managers to gather digital evidence from the IRIS Cam and other sources—such as cell phone footage from bystanders and witnesses and store surveillance video—and easily store, manage, review and share it from a single application. Efficient Video Evidence Capturing The integration of the IRIS Cam system with Genetec Clearance allows for quick and simple uploads, saving officers time at the end of their shift. Post-incident tagging can also be added to the recording, to help with further classification of the event and to aid in locating the file for future searches or investigations. With built-in video redaction, Genetec Clearance protects the privacy of bystanders by allowing identifiable information to be masked, if video must be shared with 3rd parties or when fulfilling public record requests. All user actions initiated within the system, whether internal or external, are automatically tracked to ensure the chain of custody of the evidence is maintained at all times. Streamlined Video Evidence Management “The IRIS Cam system and Genetec Clearance will help the city of North Miami Police Department achieve a streamlined and highly effective process of capturing, managing and administrating video evidence, which will ultimately save the city time and resources in managing cases over the long term,” stated Paulo Motoki, Chief Operating Officer, Point Blank Enterprises. “With over 40 years of trusted service to law enforcement agencies around the world, we are proud to provide a unique hardware/software turnkey solution that will help strengthen accountability and transparency. This will result in more constructive encounters between the police and members of the community,” added Motoki.
Round table discussion
Return on Investment (ROI) is crucial for any security installation. Most people consider what return on investment they are getting when making a purchasing decision. Usually, customers will select the option which provides them with the greatest ROI. But how can ROI be measured? Individuals involved at different points of the security buying chain will have different ideas of how to measure ROI. Here are a few thoughts from our Expert Panel. As you will see, ROI is more of a subjective matter, depending on several different variables.
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload