Pulse Secure, the provider of software-defined Secure Access solutions, announced that Pulse Secure was recognized among Representative Vendors within Gartner’s Market Guide for Zero Trust Network Access (ZTNA). Pulse SDP provides direct device-to-application trusted connectivity only after successful user, device and security state verification. The solution offers enterprises the only dual-mode VPN and SDP architecture that yields single-pane-of-glass management with unified policy admi...
June brings a new vcore software release. Vaiom has continued to focus on features that bring more value to the user’s organization and their security team. With the 2.2 release, they introduce the ability for anyone to develop access control integrations with the vcore video management system, as well as privacy masking to vcam devices. The new generic access control API allows Vaion, access control vendors, or third parties to develop a proxy that facilitates the integration between the...
The world has changed with the COVID-19 pandemic. There are many new challenges and regulations. MOBOTIX’s intelligent video technology can support companies, institutions, public as well as private facilities during the crisis and in the restart after the lockdown. MOBOTIX has bundled the available "back-on-track video technology solutions" for its partners and customers to help get them up and running quickly and effectively. This makes it easier for industries and sectors such as retai...
Abloy UK has unveiled plans to hold its first ever virtual exhibition, Keyvolution, which will take place online on 8 July. With many exhibitions being postponed or canceled in 2020, this initiative has been organized to meet the demand for online advice and information on security. It also aims to help visitors resolve current security issues and plan for future needs to ensure their building’s occupants and assets remain safe and secure. The digital event will showcase innovative new pr...
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announced a line of 4K AI cameras. Part of the Wisenet P series, the new AI-based cameras capture pristine images at up to 4K resolution while including powerful, in-camera deep learning algorithms for advanced object detection, classification and error-free analytics. Utilizing object recognition versus motion detection all but eliminates false alarms while also providing valuable business and operations in...
Cybersecurity is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions; however the choice and diversif...
Device Authority, a global provider of identity and access management (IAM) for the Internet of Things (IoT), announced the availability of KeyScaler in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Device Authority customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined deployment and management. Device Authority's KeyScaler platform solves one of the biggest challenges of IoT: onboarding devices at scale and managing the owner-controlled identities and credentials across the different services. Device Authority continues to see an increase in the demand for security and management integrations with Microsoft Azure when customers are building and deploying their IoT strategy. Connectors for seamless integration As a result, Device Authority developed a suite of connectors for seamless integration with Microsoft, and now customers can benefit from consuming them from the Azure Marketplace. KeyScaler integrates with a variety of Azure products and services, including: Azure IoT Central Azure Device Provisioning Service Azure IoT Hub Azure IoT Edge Gateway Azure Key Vault Microsoft Active Directory Microsoft Active Directory Certificate Services Azure Event Hub Data Privacy Windows Credential Manager Data-centric security The connectors provide a plethora of benefits, including enhanced security, accelerated deployment, flexible integration and extended support. Microsoft Azure customers can use KeyScaler for: Device-bound data security, operations and automation to protect their IoT devices, applications and data through automation without human intervention for identity, authentication and data security End-to-end data-centric security and device authentication to provide robust, scalable and easy-to-integrate end-to-end encryption and identity solutions for their devices GDPR and HIPAA Compliance. The Azure Event Hub Connector provides policy-based encryption of personal data “We are delighted to launch our KeyScaler platform on Azure Marketplace today. We have invested significantly in integrating our platform and solutions with Microsoft Azure, and now customers and partners can consume KeyScaler directly through Azure Marketplace as they develop and deploy their IoT projects,” said Darron Antill, CEO of Device Authority. Deploy software solutions Sajan Parihar, Senior Director, Microsoft Azure Platform at Microsoft Corp. said, "Microsoft Azure Marketplace lets customers worldwide discover, try, and deploy software solutions that are certified and optimized to run on Azure. Azure Marketplace helps solutions like Device Authority’s KeyScaler platform reach more customers and markets." The Azure Marketplace is an online market for buying and selling cloud solutions certified to run on Azure. The Azure Marketplace helps connect companies seeking innovative, cloud-based solutions with partners who have developed solutions that are ready to use.
According to latest research from its video surveillance and analytics intelligence service, Omdia (Informa), Genetec Inc. (‘Genetec’), a global technology provider of unified security, public safety, operations, and business intelligence solutions, continues to build its position as the world’s major developer of video surveillance software with a widening share of the global market. Overall, Genetec grew at three times the pace of the global video surveillance solutions market and demonstrated the fastest growth of all major software companies across all geographies (based on Omdia reported 2018 and 2019 data). Video surveillance software major “Genetec is encouraged by this news but we remind ourselves that the true measure of success is not to be found in market share figures but whether or not our partners and customers feel like we have delivered against the service levels and outcomes they expect,” states Pierre Racz, President, Genetec Inc. Pierre adds, “Our independence and single-mindedness have helped us earn the trust of the market, and our investment in research and development have helped us deliver products at the cutting edge of client needs.” Importance of privacy and cyber-security We strongly believe that security and privacy can coexist and deliver greater benefits together than in isolation" He continues, “We have a broader obligation to our communities and society. As such we have been outspoken about privacy and cyber-security. We strongly believe that security and privacy can coexist and deliver greater benefits together than in isolation. We also believe that this is what fuels our continued success with organizations that share these values. We will continue to work hard to earn their trust.” Enterprise, government, education, and public safety organizations alike are seeking greater privacy and cyber-security functionality, as well as additional operational value and return on investment from their physical security systems. Unified physical security platform Their requirement for a secure video surveillance solution as part of a truly unified physical security platform has resulted in Genetec outpacing market growth across all geographies. “The Genetec share of the global video surveillance software market continues to grow year on year,” said Jon Cropley, Principal Analyst, Video Surveillance at Omdia, adding “The company reported high growth in all regions including in EMEA where, in spite of a slower market that contracted by over 3%, Genetec revenues increased by 19%.” Video encoders, recorders and software provider Additionally, according to the report, Genetec is now the top Western supplier for back-end video surveillance equipment that includes recorders, encoders and software, demonstrating an increasing demand for trustworthy devices from a recognized firm in privacy and cyber-security. Comparing year-on-year Omdia Research Statistics (2018 to 2019): Genetec increased its lead as the top video surveillance software in the world, with 11.9% market share (up from 10.6% in 2018). Genetec global market share growth increased 18.7% year on year, from 10.6% in 2018 to 11.9% in 2019. Genetec saw the fastest growth of the ten largest vendors in EMEA at 19% in 2019. Genetec posted Asia’s highest video surveillance software growth at 37%, compared to 11.1% growth for the market in general.
Incedo is an access control system that can adapt to a business’ individual security needs. Businesses can benefit from one system that links all security solutions a building may have and integrate them into one easy to manage system. Building security Access control regulates how people can enter and exit a building and can offer insights into the movements of staff and contractors. Incedo includes a personalized interface that combines hardware with a cloud-based system offers a high level of security and operational benefits, including access management and audit trails. As well as integrating existing systems, Incedo can also adapt to work with future hardware if a business decides to invest in new security equipment, which includes both Abloy and third-party products. This allows the system to easily adapt with time, saving businesses reinvesting in a new operating system in the future. Businesses are increasingly understanding that a locking solution can offer far more than just a method of securing a building, and connectivity offer greater control. The impact of a lost or stolen mechanical key is that the room or building is no longer secure. With Incedo, a lost or stolen key can be revoked via the management platform, removing all threats of unauthorized access. Audit of employee movement Access control offers the flexibility and fluidity that businesses need. When employees or contractors require access to areas of a building, Incedo delivers connectivity and simplicity to manage the movement of people. The purpose is to create safe surroundings and protect the people and goods within the workplace. Incedo is a future-proofed solution, with scaling capabilities more individuals and access points can be added Incedo benefits everyone, from installers to end users. Facilities managers can enjoy increased control of the premises and detailed audit trails of employee’s movements. The management software will provide information on who, when and where an area is accessed in real time. End users will have an individually programmed keypad access code or card reader that will provide access all areas they are authorized to enter. In addition, those that require ever-changing access rights can have increased access granted in a matter of minutes, which also can be provided with a timed access feature. Software for integration with CCTV Incedo is a future-proofed solution, with scaling capabilities more individuals and access points can be added to the system by system integrators. The software also integrates to all security elements of the business, including CCTV, to combine the data into one place rather than in multiple systems. Incedo can update and adapt when new hardware is introduced. Businesses all have their unique security challenges, hardware and software configuration is tailored to one’s needs, and can be changed when needed. New Incedo-enabled hardware from Abloy UK and third-party provider are accessible within the Incedo platform. To find out more about Incedo other new products and services available from Abloy UK, one can register for the upcoming virtual exhibition.
Significant upgrades to the e3 Series firmware were announced in the Linear Essential, Essential Plus, Elite and ProControl commercial access control systems. The new firmware updates employ the latest code technology to provide improved security and web services protection against the rise in cyber threats for businesses of all sizes. Giving end-customers and users the features most in demand, the upgrades to the Linear e3 Series also include improved encryption, smart reporting and card types access control functionality. Access control security “Commercial businesses of all sizes are acutely aware of need for increased access control security due to the growing sophistication of electronic intrusion capabilities,” said Richard Pugnier, Vice President of Marketing at NSC. “The new e3 Series firmware updates and feature enhancements allow our dealers to offer heightened security confidence to deter intruders while keeping employees and facilities safe using the latest technological advancements.” “After listening to our dealer partners, this firmware upgrade is the first of several planned that will help address ongoing commercial security and access control needs for organizations large and small,” said Mark Prowten, Director of Product Management for NSC’s Linear brand. Commercial access control systems The Linear e3 Series firmware upgrades we’ve engineered open new customer opportunities for our dealers" “With tens of thousands of systems installed, customers depend upon the proven managed access and convenience of our systems, and we remain committed to constantly improving our security technologies to guard against the growing list of internal as well as external threats. Plus, the Linear e3 Series firmware upgrades we’ve engineered open new customer opportunities for our dealers to offer market-leading capabilities along with added security peace-of-mind.” The scalable design of Linear e3 Series is specifically engineered to minimize future costs and help lower Total Cost of Ownership (TCO) as organizational needs evolve and more functionality is needed. Based on a single hardware design, a single software code base and sophisticated integrated features, the Linear e3 Series can easily scale up to 128 doors. All Linear Essential, Essential Plus, Elite and ProControl commercial access control systems include the upgraded e3 Series firmware. License expansion capability Each is out-of-the-box ready to install, designed to match customer-specific needs and are readily upgradeable with a license key. The top-of-the-line Linear Elite is a feature-rich system designed for four to 128 multi-door, multi-site facilities. The advanced capabilities of the Linear Elite system can accommodate more users, doors, readers, online transactions and overall capacity. The Linear Essential and Essential Plus access control systems give smaller and mid-size businesses access control that can grow with them. These systems provide entry-level value for one to four doors with immediate license expansion capability to Elite system with no additional hardware needed.
VXG is announcing full integration of any camera with any AI engine. The company was originally founded in 2016, with headquarters in Toronto, Canada, by experts in Video Management Software (VMS) and Video Artificial Intelligence (AI), and was created with over 20 years of experience in the video surveillance industry, with the idea to make video AI solutions highly scalable and more affordable. VXG is an open AI Video Surveillance as a Service (VSaaS) VMS company that offers a platform connecting any camera to any AI, at any scale. VXG provides cloud and on-premise software, and connects cameras to leading AI solutions including Amazon Rekognition, Azure Cognitive Services, Google Vision AI, and OpenVINO, as well as any proprietary vision AI. Delivering unlimited scalability, massive cost reductions, and extensive bandwidth saving. Video management platform What makes VXG different is its AI management - connecting any camera through the platform to any AI Similar to other VSaaS/VMS vendors, VXG offers a complete video management platform with functions like camera management, multi-format video streaming, and cloud or on-premise video recording. VXG offers white label web and cellphone front-ends, and SDKs for fast integration with existing or new services. What makes VXG different is its AI management - connecting any camera through the platform to any AI. VXG pre-processes video for AI and whether this is extracting images or short clips, VXG does it at any scale. Then VXG interfaces data with video AI solutions from companies like Amazon, Microsoft, Google, and Intel, and provides a wide variety of AI use cases from people counting and scene recognition, to facial analysis and face recognition. Optimal employee-to-customer ratio Analysis of images provides actionable information critical to business people and decision makers, some examples include: Traditional Video Analytics People Counting - How many people are occupying a pre-defined space? People/Object Detection - Has a person or object been identified? Car Counting - How many cars are visible in a pre-defined area? Occupancy Rate - How much space is occupied? Are we abiding by government laws/restrictions for occupancy limits? Facial Recognition - Has a face been identified or verified from an image or video frame? Facial Analysis - What features and expressions have been identified on a human face? (age, gender, emotions, etc.) Use Cases and Analysis Retail - Are there enough staff to accommodate customer demand in a given space? What is the optimal employee-to-customer ratio? When are the company’s peak times? Parking - How many parking spaces are available? Tied in with auditing, ticketing and POS data/systems. Real Estate - How many people are in the lobby, or elevator at a specific time? Restaurants - Are there any tables available? Are they abiding by the mandated occupancy restrictions for the restaurant? Transportation - Is each bus, subway car, train abiding by occupancy limits? Are riders distanced properly? Smart City - Is the park, building, hospital, etc. at its capacity? How many people are in a given area? Does anyone have a harmful object on them? Industry Specific - How many dogs/wildlife are there in the park at a specified time? How many cars are on the road right now? Is the supply chain or factory solutions optimized? Video surveillance companies Yaro Lisitsyn, Co-Founder & CEO, believes the company is applying deep learning in a game-changing way for business operations and business intelligence, directly applicable to an abundance of industries and use cases. Yaro says, “We are taking any manufactured camera, and any camera type, and connecting these to the most reputable, leading AI engines. Leveraging these as operational tools to provide real-time, actionable data that is meaningful to key business decision makers.” VXG’s solutions are available globally, working with video surveillance companies, camera manufacturers, retailers, retail analytics companies, and video AI companies helping make AI solutions highly scalable and more affordable.
Trustonic and Huawei announce the next step in their partnership to bring simplicity and greater security to cellphone applications. Trustonic Application Protection (TAP) now supports Huawei’s hardware-backed Trusted Execution Environments (TEE) “iTrustee”, and the HUAWEI P40 Series smartphone supports the TAP SDK at launch. Application developers can use the TAP development platform to leverage Huawei’s hardware-backed security for features such as Trusted User Interface (TUI), which is vital for the next generation of cellphone banking, payments and mPOS, automotive and cellphone identity-based apps. The TAP platform makes it easy for application developers to build advanced security and shielding into critical cellphone apps. Advanced security features iTrustee’s integration with TAP will simplify the process of secure application development for Huawei devices This will help Huawei to create a secure ecosystem for its Huawei devices, starting with the HUAWEI P40 Series, while adding support for the other devices that are upgraded to EMUI 10.1. iTrustee’s integration with TAP will simplify the process of secure application development for Huawei devices and their acceptance into the broader application ecosystem. “The TAP development platform gives application developers access to the advanced security features that they need to bring trust and richer user experiences to app users across billions of smartphones worldwide,” adds Dion Price, Trustonic CEO. “This announcement is a significant achievement in just one year of working with Huawei and will bring hardware-backed security to an even wider range of applications and services.” Digital car key sharing This news builds on the 2019 launch of the first development platform to enable developers to protect their apps and assets with TEE across different devices. TAP is the only application development platform that combines hardware-backed and software based in-app protection, enabling any developer to build and deploy applications with advanced security, and make use of TUI to shield sensitive user-interactions from potentially-compromised main device operating systems. TAP is already protecting a wide range of sensitive cellphone application use-cases globally. This includes the digital car key sharing apps for Volkswagen Group and Hyundai, and off-the-shelf smartphone secure payment acceptance with Rubean.
Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. “While the ‘new normal’ is still being defined, we believe there will be a greater focus on creating healthier environments while also complying with new regulations,” says Marcus Logan, Global Offering Leader, Honeywell Commercial Security. “Temperature, humidity, energy efficiency, security, safety, comfort, productivity, and demonstrating compliance with regulations are all a part of a healthy building.” For example, social distancing is a new concept for the workplace. How do you make that happen in an open work setting, in breakrooms, elevator lobbies and meeting spaces? Optimized systems create healthier environments Anxious employees will need reassurance about returning to the workplace Building owners will need to look at how they can optimize their systems – or deploy new ones – to create a healthier environment. Building technologies, like those provided by Honeywell's Healthy Buildings solutions, provide building owners with more control over critical factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations, and a company's risk management policies. These solutions also provide transparency for occupants into a building's status, says Logan. Hygiene will be a critical issue: People will want to know that the spaces are ready for their return. Increased cleaning procedures and schedules will evolve, and a way will be needed to demonstrate the procedures are effective and that they have been strictly adhered to. Identifying ways to measure effectiveness of sanitisation and track compliance to the procedures will be a key challenge to solve. This is a space that will evolve significantly in the coming months and years, says Logan. Access control and video analytics Contact tracing is a new requirement in some businesses, and security technology – like access control and video analytics with advanced reporting – can help. Access control technology integrated with video analytics can be used to trace occupant movements within a facility. These technologies capture data that can be used with advanced reporting to provide a digital footprint of where a person has been within a facility and if they may have been exposed to someone identified as being infected with a contagious virus. Building owners can then proactively notify exposed individuals evolve to self-quarantine and minimize further spread of an infection. Video analytics can help to predict where and when occupants encounter each other Anxious employees will need reassurance about returning to the workplace. They will not only seek confidence that the building is optimized for a healthier environment but also that processes are in place to quickly identify and respond to potential issues. Transparency and visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace. “One way to do this is to share building analytics with occupants – to help them understand factors about the indoor air quality or occupancy density,” says Logan. Controlled health, safety and security Honeywell’s solutions provide building owners with more control over critical health, safety and security factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations and a company’s risk management policies, Logan adds. Visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace Every day there is new information coming from the medical and scientific community about COVID-19, and the building industry is just starting to learn what it all means. Logan warns that there is no single solution that will keep every environment healthy and safe. A good strategy features deploying a combination of solutions, optimising systems and being vigilant to make sure that companies are sustaining compliance to new and changing regulations, says Logan. “Today more than ever we must be mindful of the changing culture of how buildings are managed by making apparent the need to be mindful of health and well-being in all aspects of our lives,” says Logan. Honeywell has developed outcome-based solutions that allow building owners to transparently address building quality factors while supporting their business continuity needs in the uncertain environment. “We’re giving them the data they need to confidently reassure their employees to accelerate their business operations,” he adds.
The coronavirus pandemic has brought about an unprecedented crisis for businesses and individuals. It has also created a new normal, notwithstanding the disruption to our lives, ultimately changing life as we knew it. However, our resilience as humans will ensure that we survive and become better, stronger, and more determined than ever before. As I mentioned, both businesses and individuals have struggled significantly to balance the need for safety versus survival. But at AxxonSoft, we remain committed to keeping our people safe, while ensuring that our support and commitment to our clients are not compromised. Ensuring business continuity At AxxonSoft, our vision has always been to ensure business continuity through enhanced safety and video surveillance offerings. Adhering to the COVID-19 regulations, we are prescribing to social distancing to slow the spread of the virus. As such, we are utilising this time to ensure that our service offering is optimized to afford our clients the ability to repurpose and extend their remote working viabilities. As an essential service provider, we have ensured that we are providing the right tools to our clients to comply with regulations. Our video analytics and face recognition services have no reliance on on-site control rooms and, therefore, clients’ security solutions and personal safety are not compromised. Innovation reimagined During these precarious times, our focus remains on support and service. Our development team continues to work tirelessly to ensure that you can use our software during the lockdown and have accelerated innovation to this end. While we must maintain social distancing, we can and will still be of service to our community Therefore, we are proud to present version 4.11 of the Intellect PSIM, which offers our clients a neural network-based analytical tracker which recognises specific types of objects, such as humans and vehicles. We have also equipped this version with video wall management interface, automatic object tracking and a web reporting subsystem. Behavioral analytics generates data by detecting specific postures, like crouching, shooting or any potentially dangerous scenario. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement, offering a comprehensive bird’s-eye view to clients. This upgrade also upholds mandated social distancing measures and keeps any face-to-face meetings to a minimal. The silver lining is that you can even use this technology when the pandemic is over. Now that’s what I call experiencing the next with AxxonSoft! Finding solutions to the challenges Our specialist technology and frontline technical support staff will ensure that your business is protected during and post-lockdown. We will continue to ensure that we provide solutions to the new challenges that the coronavirus brings, ensuring that our clients can emerge stronger and more responsive to any changes in the future. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement While we must maintain social distancing, we can and will still be of service to our community. After all, change is not just about technology but about mastering mindsets. The COVID-19 disaster has demanded that businesses embrace tech disruptions as early as possible and apply technology in imaginative ways to define the new world of work. Until next time, stay safe!
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enroll and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Kingfisher Sec, a West London-based security specialist, has adopted SmartTask to support the rapid growth of the business by streamlining and automating critical business processes. The company will use the cloud-based software to handle employee scheduling, proof of attendance and operational reporting across a team of up to 50 security guards. As a result, Kingfisher Sec has already reduced administration by around 17.5 hours a month, with further improvements expected moving forward. “We wanted an employee scheduling and workforce that would mitigate any growing pains we experience as the business continues to expand as well as helping us achieve our aim of creating a paperless operation,” explains Filipi Nascimento, Operations Manager at Kingfisher Sec. “SmartTask is allowing us to automate many of our manual processes in a phased approach to maximize benefit realization, without losing focus on our core operational priorities.” Electronic communication tool SmartTask was selected following a tender process based on its feature-rich and easy-to-use functionality. Kingfisher Sec is using the software to provide a simple tool to the company’s team of security guards, via a smartphone app, so they can simply book on and off shifts, accept schedules and book holidays. Meanwhile, the advanced rostering system allows Kingfisher Sec to quickly create monthly work plans and communicate them direct to staff for electronic confirmation. Kingfisher Sec is also looking to replace a paper-based DOB system at around 40 customer sites with SmartTask’s Daily Occurrence Log (DOL). The electronic communication tool will enable security guards to quickly create entries and upload details regarding any on-site occurrence, providing online visibility of all incident data and supporting photo evidence. Capturing accurate data The software is capturing accurate data about the performance of our team and the business" As well as reducing the administrative burden, both on-site and centrally, the DOL will also remove the cost of providing, distributing and archiving a paper-based log. “SmartTask is streamlining our business and operational procedures, so we can save both time and money while providing a better service to our customers. The software is capturing accurate data about the performance of our team and the business, which we simply did not have access to previously. This is allowing us to better manage staff, eliminate human error and quickly respond to any issues,” adds Nascimento. Cloud-based software Paul Ridden, CEO of SmartTask commented: “Our cloud-based software is a highly-advanced and easy-to-use guard management, monitoring and reporting solution that typically reduces costs and improves efficiency by 30 per cent. As a result, a growing range of security businesses are using SmartTask to plan, manage, conduct and measure workforce activities more effectively.”
Teleste Corporation and a renowned international rail vehicle construction company Stadler have agreed on deliveries of Teleste’s passenger information and CCTV systems to Stadler’s new FLIRT trains for Norwegian State Railways. The deliveries will take place in 2019–2021, continuing the cooperation between Teleste and Stadler that was started in 2009. The deployment will include on-board passenger information (PIS) and CCTV systems for more than 20 trains complemented with video security cameras and video recorders, intercommunication and public address systems as well as TFT and LED information displays. The flexible and future-proof system works seamlessly together with the existing PIS systems, delivered during earlier stages of the cooperation, and includes upgrades such as enhanced cybersecurity. Rolling stock manufacturers We have been able to fulfill Stadler’s requirements for high-quality delivery of passenger information" “Today, transport operators and rolling stock manufacturers need to stay at the cutting edge of on-board technologies to deliver an excellent travel experience for the growing number of public transport users who wish to be informed about their travel at every step of the journey." "We are pleased that we have been able to fulfill Stadler’s requirements for high-quality delivery of passenger information on their trains to Norway, and we are looking forward to continuing our cooperation,” stated Jörn Grasse, Vice President of Rail Information Solutions at Teleste. Effective transport system Teleste’s on-board passenger information system is based on modular software architecture, which makes it possible to use the system technology for different kinds of applications. The system provides a flexible option for the delivery of passenger information for rolling stock manufacturers and operators who wish to build and run an effective transport system that can carry large volumes of passengers smoothly and safely every day. Customers can visit the company’s website for more information about the solution and its benefits.
The New Athos Cave (also known as Novoafonskaya, Novy Afon Cave, and New Afon Cave) is a karst cave in the Iverian Mountain located in Abkhazia, Georgia. It is one of the largest caves in the world with the volume of its void of about 1,000,000 m³. As a well-known tourist attraction, one of the most important factors that keep tourists from visiting this cave is its security. To achieve this, the management of the cave deployed a surveillance solution from Dahua Technology to provide visitors with comprehensive security throughout their cave exploration. Dahua Technology's Vari-focal Bullet Camera Due to the harsh environment with high humidity and low-light conditions in the cave, the customer needed a high-quality monitoring system to ensure the safety of tourists, avoid accidents, as well as achieve remote management. For the low brightness and high humidity condition in the cave, a group of highly reliable infrared cameras were installed. The main function of the cameras is to prevent visitors from crossing the installed fence which might pose danger to them. The IR Megapixel Vari-focal Bullet Camera presents a 2MP resolution with a motorized 2.7mm - 12mm vari-focal lens. With IR illumination, the camera can capture detailed images in low light or total darkness condition, making it suitable for the environment of the cave. IP video surveillance applications Smart IR technology prevents IR LEDS from whiting out images as they come closer to the camera The camera's Smart IR technology adjusts to the intensity of the camera's infrared LEDs to compensate the distance of an object. Smart IR technology prevents IR LEDS from whiting out images as they come closer to the camera. The camera's integrated infrared illumination of up to 60m (197ft) provides high performance lighting under extreme low-light environments. As for back-end equipment, Dahua's NVR5216-16P-4KS2 network video recorder was selected. It offers excellent performance and high recording quality for IP video surveillance applications. For applications where details are critical for identification, this professional NVR provides a powerful processor with up to 4K resolution. It also features a mouse shortcut operation menu, remote management and control, central storage, edge storage, and back up storage. Access camera remotely In addition, the NVR's Heat Map option highlights the areas with the highest concentration of people. This information can then be exported into a customized report to assist in business or forensic analysis. Security is one of the keys to sustainable tourism. These high-quality and reliable surveillance devices provide a convenient way for the customer to access the camera remotely, allowing the security personnel to monitor the situation in the cave 24/7 and respond quickly in case of an accident. The Dahua solution reinforces the security of this popular tourist destination, creating a safe and enjoyable cave exploration experience for visitors all over the world.
Synectics has secured a competitive public space contract to provide integrated surveillance solutions for a number of prestigious sites across London, the UK's capital. Comprising government properties, heritage sites, and high-profile public event venues, the contract builds on Synectics' reputation as the surveillance solution of choice for London's public space protection. The successful award can also be attributed to the company's ability to deliver tailored, open-architecture solutions incorporating integration to third-party systems such as access control and intruder detection. Control software platform Synectics, which supports more than 70% of London's boroughs, as well as major retail stores and stadiums across the city, will upgrade all sites to its Synergy 3 command and control software platform. Each of these sites falls under our specialism in public space" While the specific locations cannot be named, the sites include listed buildings, high-security 'closed-to-public' assets, and venues with high levels of public footfall. Martin Bonfield, UK Sales Manager, at Synectics commented: "Each of these sites falls under our specializm in public space, but individually they each have unique requirements. That plays to our strengths in terms of the flexible technologies we offer and the broader sector experience we hold, from gaming and critical national infrastructure to city surveillance, retail, and public transport.” Superior incident management "These credentials illustrate our capability at developing and deploying surveillance solutions for projects that must balance high levels of public access with stringent security conventions and superior incident management. Our professional services team is also highly skilled at migrating systems under live operating conditions, which was a specification of the comprehensive brief." "One of the locations included in this tender process was an existing Synectics site operating a legacy Synergy product. The trust in our Synergy solution by the customer meant that satisfaction with the system reliability and user experience was high." Multi-Site monitoring The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras — totaling around 500 across the sites — alongside integrated third-party systems such as access control and intruder detection. Linking all locations for eventual multi-site monitoring was a crucial component of the project brief, ensuring the sites continue to support future needs and incorporate the latest camera technology and system features as required. Martin explained: "Synergy 3's power and scalability in terms of integrations and future system consolidation presented a powerful proposition to our customers, combined with our wider London portfolio of projects, partnerships, and supporting closer collaboration with the Metropolitan Police."
A global hyper- and supermarket giant has transformed an ailing legacy CCTV system and enhanced storage capacity across its Middle East operations with a high performance surveillance and business intelligence solution. Carrefour Jordan operator Majid Al Futtaim turned to specialist systems integrator Ametrad Technology Services to upgrade its video technology as it prepares for growth. Increasing operational efficiency The Dubai-based retail pioneer, which first introduced Carrefour to the Middle East in 1995 and now operates 70 outlets across the region, has ambitious expansion plans and is looking to open new express stores and hypermarkets. Ametrad are deploying video technology built around IDIS Solution Suite (ISS) video management software (VMS) for the Majid Al Futtaim security team, whose priority is to prevent losses, improve safety and security, enhance the customer experience and greatly increase operational efficiency across its existing eight express stores and hypermarket. Failover providing protection The legacy CCTV system was proving costly to maintain and time-intensive to operate ISS VMS is modular and scaleable, giving Carrefour a cost-effective centralized monitoring environment with multi-layered failover providing protection against network instability and power outages. The legacy CCTV system was proving costly to maintain and time-intensive to operate, while low bandwidth at some stores was limiting performance. These problems were being compounded by new requirements to move from 30 to 90 days storage. Ametrad managing director Ahmad Shanawani says: “We have not experienced a single hard disk drive failure, a request for an NVR reset, or any gaps in footage due to a power outage. This is tangible evidence of IDIS’ quality, resilience and failover technology.” Ensuring pin-Sharp image capture All the hardware is backed by a cost-free warranty and the ability to easily add new stores as they come online – vital as Carrefour serves over 200,000 customers every day across the region and is continuing to expand – ensuring low total cost of ownership. Using a phased upgrade approach 32 2MP domes and bullets already provide coverage at the hypermarket in Irbid City Center, with a further 64 legacy cameras earmarked for upgrade, while an average of 28 cameras deliver situational awareness across each express store. The IDIS cameras ensure pin-sharp image capture in varying light conditions, including in darkness up to 30 meters, and cope with varying light and shade thanks to true wide dynamic range. 32-channel NVRs and a user-friendly interface for authorized retail staff at each supermarket provide 370Mbps throughput and up to 960ips UHD real-time recording. High performance live monitoring These technologies also allowed Carrefour to double the camera count at each store This ensures high performance live monitoring and forensic video retrieval, while native RAID 1 provides an important additional layer of redundancy. Ametrad engineers connected each device in minutes thanks to true plug-and-play IDIS DirectIP® technology, and IDIS For Every Network (FEN) technology allowed one-click configuration linking each store to the control center. The hierarchical connection structure between IDIS DirectIP devices also guaranteed the most efficient method of cabling into the compact control room. Limited bandwidth was solved with IDIS Intelligent Codec, which typically reduces storage and bandwidth requirements by up to 75% compared to H.264, while dynamic multi-stream control has alleviated latency. These technologies also allowed Carrefour to double the camera count at each store to provide comprehensive coverage without the need to upgrade networks. Intelligent reporting capabilities Ametrad is also deploying IDIS VA in the Box analytics, to provide each store with heatmapping, people counting, queue management and intelligent reporting capabilities – thus helping improve sales and marketing performance and providing store managers with valuable business and customer behavioral insight. ISS control panels provide live monitoring, playback, event search, system health reports, and navigation via store layouts, allowing control room staff to troubleshoot and manage 100s of video streams and devices across multiple stores. These intuitive functions have reduced the time needed to find and export video clips from hours to minutes. Carrefour has contracted Ametrad to provide maintenance services and is working with the Ametrad team with a view to adopting new IDIS technologies such as IDIS Deep Learning Analytics.
Round table discussion
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
The manufacturers behind today’s security technologies are a varied bunch. There are large manufacturers with deep pockets and plenty of resources. And there are smaller manufacturers who are nimble, can react faster to changing market conditions and to whom each customer represents a hard-fought win. There are also plenty of manufacturers in the middle ground. But what impact does the size of a company have on the quality of its products? We took the question to this week’s Expert Panel Roundtable: Is there a correlation between the size of a manufacturer and the quality of its products – for better or worse?
Surveillance software: Manufacturers & Suppliers
- Milestone Surveillance software
- CCTV Software Surveillance software
- Panasonic Surveillance software
- Hanwha Techwin Surveillance software
- Vanderbilt Surveillance software
- Bosch Surveillance software
- Geutebruck Surveillance software
- Axis Communications Surveillance software
- artec Surveillance software
- Vicon Surveillance software
- Genetec Surveillance software
- Verint Surveillance software
- March Networks Surveillance software
- ADPRO Surveillance software
- FLIR Systems Surveillance software
- eneo Surveillance software
- Siqura Surveillance software
- TeleEye Surveillance software
- TDSi Surveillance software
- Dahua Technology Surveillance software
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload