Video management software
Today’s market wants access control systems that are always available, scalable, and integrated with other security solutions like video and intrusion systems to ensure the highest security and safety levels. At the same time, these systems must be easy to configure and use. With the introduction of the Access Management System 3.0, Bosch meets all of these requirements. Always available for security Access Management System 3.0 is designed to be available at all times. Its resilient des...
The new family of social distancing tools supports the smooth return to a safe shopping environment by providing automated occupancy control, ensuring the number of customers in a physical space never exceeds a maximum limit. With Gunnebo’s OccuLinq software, retail managers enjoy real-time data on customer numbers at their fingertips. When a maximum occupancy level is reached, gates lock temporarily until another customer has left the store, after which a new customer is free to enter. A...
June brings a new vcore software release. Vaion has continued to focus on features that bring more value to the user’s organization and their security team. With the 2.2 release, they introduce the ability for anyone to develop access control integrations with the vcore video management system, as well as privacy masking to vcam devices. The new generic access control API allows Vaion, access control vendors, or third parties to develop a proxy that facilitates the integration between the...
As businesses, schools, hospitals and sporting venues look to safely reopen in a COVID-19 world, thermal imaging systems will play a critical role in helping to detect and distinguish skin temperature variations in people. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, is now being deployed to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. In the coming weeks and months, the se...
A healthcare facility or hospital is unlike any other organization. It’s generally open to the public 24 hours a day, seven days a week. There is expensive equipment in many areas, patient records and confidentiality that needs constant protection, in addition to parking facilities and door access control needs and medicines that need to be kept secure. Hospital and healthcare settings use video surveillance in many ways, as the security needs of these institutions reflect the life-or-dea...
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announced a line of 4K AI cameras. Part of the Wisenet P series, the new AI-based cameras capture pristine images at up to 4K resolution while including powerful, in-camera deep learning algorithms for advanced object detection, classification and error-free analytics. Utilizing object recognition versus motion detection all but eliminates false alarms while also providing valuable business and operations in...
Cybersecurity is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions; however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cybersecurity. Explosion-proof rated cameras Customers are currently overwhelmed by the perpetual advertisement of products related to cybersecurity. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cybersecurity. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. For software, similar requirements exist but there is less clarity than with their counterparts The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist: in general, it is possible to universally define safety requirements for installation in special environments, such as a drilling rig, a marine vessel or along a railroad. For software, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Video management software Furthermore, a device's firmware and video management software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever-changing conditions. Other aspects of security, such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements, such as gases or dusts, and deducting the product requirements. Video surveillance equipment During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. Several certification options are currently available on the market, and these can be placed in two main groups The result of the lack of certainty that characterises software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap, by pursuing certifications and stamps or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Cybersecurity certification Several certification options are currently available on the market, and these can be placed in two main groups: System certification Product certification As the name suggests, system certification addresses cybersecurity at a system level. This group includes ISO27001, NIST SP 800-53° ISA/IEC62443-3 for example. In these frameworks, risks related to information management are evaluated across every aspect of the organization: information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Video surveillance system Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organization willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/IEC 15408, also known as Common Criteria. It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Cyber secure surveillance Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products: developing safe products for all possible tasks - mechanical, electrical, electromagnetic and software - according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. New security feature Software architecture must be flexible enough to guarantee integration into very different products Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalog. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. Accomplish video acquisition For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Secure video surveillance Every night, the validation tools embedded into the continuous integration process automatically test each product to verify that no regression was unconsciously added while the company proceed with software development. Every time Videotec adds a new feature in response to a suggestion for improvement by the company's customers or identification of an issue, it also updates the testing tools to increase the reliability of the company's products. Videotec has yet to definitively choose a certification scheme for the DeLux technology Videotec believes that its products, and the continual updating of these, actively contribute to maintaining the safe operation of secure video surveillance system, helping IT departments and system administrators by keeping their systems balanced and by not requiring excessive mitigating actions or protections due to future issues. At Videotec, they call this cyber-sustainability. System-level security requirements At the time of writing this white paper, Videotec has yet to definitively choose a certification scheme for the DeLux technology. Several options are being evaluated, as the company search for a solution that will create value for the company’s customers without sacrificing the addition of new features on all products that make up the DeLux technology range. Although Videotec is still exploring the best certification scheme for its software, this does not prevent the company from having a clear and active development path for the cybersecurity in their products. At Videotec, the following five principles are the basis for implementing cybersecurity in products: Hardened software architecture to minimize the attack surface of the cameras Constant updates and availability of new features, even on old products Removal of predefined credentials in the products, to strongly indicate to customers that, as a minimum, a new username and password combination must be defined by the user during installation according to the system-level security requirements Contribution to the ONVIF Security Service specification, to push the industry shifting from usernames and password to X.509 certificates Clear communication to customers, by avoiding fake marketing claims Security service specifications Videotec had an active role in the development of the ONVIF Profile Q specifications. Among other activities, it contributed to driving the standard towards the removal of predefined credentials. The security market must teach installers and users that using pre-defined usernames and passwords is equivalent to not having credentials at all. Videotec is proposing extensions to the ONVIF Security Service specifications Defining the factory-default state of Profile Q compliant devices, where no authentication is required, is the strongest reminder a vendor can provide to its customers. Similarly, with regard to the commitment for the ONVIF Profile Q, Videotec is proposing extensions to the ONVIF Security Service specifications that will include the widespread the adoption of X.509 certificates to replace the usage of credentials. Video surveillance market Moving towards this new way of handling authentication between devices and VMSs will not only impact devices, but it will require a leap forward for the whole video surveillance market. Beyond implementing the functionality in its devices, Videotec is already planning the actions that will be necessary to make its customers effective at selling, installing and maintaining video surveillance systems based on this technology. Last, but not least, trustworthy communication to customers is a key value for Videotec. For this reason, Videotec will never exploit the unintuitive requirements of system certifications of international privacy rules to send wrong messages to the market. As an example, Videotec added to all its IP products an instruction about performing a safe installation according to the General Data Protection Regulation (GDPR), similarly to the instructions given for mechanical, electrical of environmental safety. IP-based device In the last ten years, the video surveillance industry has vigorously shifted from analog to IP products These instructions are meant to teach customers and stimulate their attention to aspects related to cybersecurity. As such, instructions will never be turned into unreliable market claims, such as claims for conformance to the GPDR or any other rule. Cyber threats started menacing video surveillance systems from the day the first IP-based device was put into the market. At that time, the number of digital systems was low and video surveillance was not as pervasive as it is today. In the last ten years, the video surveillance industry has vigorously shifted from analog to IP products and, at the same time, it has witnessed a constant growth in market demand. As a result, digital video surveillance systems are everywhere nowadays and attract attention not only from professionals but also from malicious users. Risk assessment analytics Keeping these systems safe from cyber-threats is an activity that cannot be performed just by performing a risk assessment analytics during the commissioning phase - maintenance and recovery plans must be operative during the whole lifespan of the systems. These activities have a cost; also managing the effects of a system violation has a cost. Integrators and users must find the correct balance, to minimize expenses while keeping video surveillance systems updated and secure. In order to make reduction of expenses related to maintenance and recovery plans easier, Videotec bases the development of its products on the concept of cyber-sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle and assist integrators and customers keeping their systems protected.
According to latest research from its video surveillance and analytics intelligence service, Omdia (Informa), Genetec Inc. (‘Genetec’), a global technology provider of unified security, public safety, operations, and business intelligence solutions, continues to build its position as the world’s major developer of video surveillance software with a widening share of the global market. Overall, Genetec grew at three times the pace of the global video surveillance solutions market and demonstrated the fastest growth of all major software companies across all geographies (based on Omdia reported 2018 and 2019 data). Video surveillance software major “Genetec is encouraged by this news but we remind ourselves that the true measure of success is not to be found in market share figures but whether or not our partners and customers feel like we have delivered against the service levels and outcomes they expect,” states Pierre Racz, President, Genetec Inc. Pierre adds, “Our independence and single-mindedness have helped us earn the trust of the market, and our investment in research and development have helped us deliver products at the cutting edge of client needs.” Importance of privacy and cyber-security We strongly believe that security and privacy can coexist and deliver greater benefits together than in isolation" He continues, “We have a broader obligation to our communities and society. As such we have been outspoken about privacy and cyber-security. We strongly believe that security and privacy can coexist and deliver greater benefits together than in isolation. We also believe that this is what fuels our continued success with organizations that share these values. We will continue to work hard to earn their trust.” Enterprise, government, education, and public safety organizations alike are seeking greater privacy and cyber-security functionality, as well as additional operational value and return on investment from their physical security systems. Unified physical security platform Their requirement for a secure video surveillance solution as part of a truly unified physical security platform has resulted in Genetec outpacing market growth across all geographies. “The Genetec share of the global video surveillance software market continues to grow year on year,” said Jon Cropley, Principal Analyst, Video Surveillance at Omdia, adding “The company reported high growth in all regions including in EMEA where, in spite of a slower market that contracted by over 3%, Genetec revenues increased by 19%.” Video encoders, recorders and software provider Additionally, according to the report, Genetec is now the top Western supplier for back-end video surveillance equipment that includes recorders, encoders and software, demonstrating an increasing demand for trustworthy devices from a recognized firm in privacy and cyber-security. Comparing year-on-year Omdia Research Statistics (2018 to 2019): Genetec increased its lead as the top video surveillance software in the world, with 11.9% market share (up from 10.6% in 2018). Genetec global market share growth increased 18.7% year on year, from 10.6% in 2018 to 11.9% in 2019. Genetec saw the fastest growth of the ten largest vendors in EMEA at 19% in 2019. Genetec posted Asia’s highest video surveillance software growth at 37%, compared to 11.1% growth for the market in general.
Coinciding with the recent launch of the Occupancy Monitoring application designed to help implement social distancing rules, Hanwha Techwin has also introduced a Face Mask Detection application which will further help businesses operate in a COVID-19 affected world. Wearing a mask is believed to prevent the spread of COVID-19 and has already been adopted as a safety measure in many workplaces. However, the availability of the Face Mask Detection application could not come at a better time with the World Health Organization (WHO) now recommending the use of face masks wherever social distancing is difficult. The UK government is also making it compulsory to wear a face covering when visiting or working within healthcare facilities and when using public transport. Innovative video analytics An Alarm Out feature can also be used to turn on a device such as a warning beacon The UK is not alone in introducing regulations to ensure the wearing of face coverings. In Germany, for example, it is necessary to do so when on public transport and while shopping, and in Spain everyone older than six, has to wear masks in indoor public spaces and outdoors when it is not easy for people to keep more than two meters apart. The Face Mask Detection application developed by Hanwha Techwin’s technology partner, a2 Technology, runs on open-platform Wisenet X Series cameras and uses innovative video analytics to detect if a person entering an area is not wearing a mask. This will trigger the playing of a customizable audio message such as ‘please wear a face mask’. Fixed lens cameras The audio message is generated via an audio support feature built into Wisenet X cameras, negating the need for a PC or a separate audio storage device to be installed nearby. A short cable is all that is required to connect a speaker to the camera. An Alarm Out feature can also be used to turn on a device such as a warning beacon. The application, which simultaneously detects and analyses up to 4 people and can detect people at a distance up to 5 meters from a camera, is not affected by glasses, hats or scarfs, is also able to detect if a mask is not being correctly worn. A digital zoom-in function, which is designed to be used with fixed lens cameras, assists installers to configure the application so that it focuses on a specific region of a camera’s field of view if it is considered to be too wide. Edge-based solution The Face Mask Detection application can be ordered pre-loaded on selected Wisenet X models as an out-of-the-box solution. These are: XNB-6000/MSK Network box camera XNO-6080/MSK Network IR bullet camera XND-6010/MSK Network dome camera XNV-6011/MSK Vandal-resistant network dome camera As is the case with all Wisenet X Series cameras, these models are equipped with SD/SDHC/SDXC memory slots, enabling images associated with incidents of people not wearing masks or not wearing them correctly, to be stored locally. There is also the option for the images to be stored on an FTP server. Video Management Software We fully understand our responsibilities in terms of offering solutions which are fit for purpose" A web-based interface enables users to receive alerts via a desktop PC. The application has also been integrated with the Wisenet WAVE 4.0 Video Management Software (VMS) platform which, with its ‘Layout-as-an-Action’ feature, enables a predefined screen layout to be automatically opened when an event occurs. This makes it even easier for operators to verify there has been an infringement of mask wearing rules. “The Face Mask Detection application is an excellent example of how video surveillance technology is able to help people safely go about their every-day business,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Occupancy Monitoring applications “With lives sadly at stake, we fully understand our responsibilities in terms of offering solutions which are fit for purpose, such as the Face Mask Detection and Occupancy Monitoring applications." "Over the coming weeks we will therefore continue to work in-house and with hand-picked technology partners to develop additional practical solutions which will robustly assist offices, factories, hospitals, art galleries and museums, places of worship, transport facilities and many other types of businesses and organizations, to safely open their doors to the public.”
Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management - announced the launch of Cayuga R15. The new release of Qognify’s video management system (VMS) for multi-site corporate and enterprise projects focuses on enhanced usability and connectivity, improved maintainability and intelligent analytics. Help security personnel One of the main goals while developing Cayuga R15 was to help security personnel quickly identify, locate and evaluate an event. This can present a real challenge when operating large systems with widely distributed locations and a large number of cameras. Cayuga R15 solves this problem by supporting the use of the powerful Esri ArcGIS mapping platform, enabling cameras to be positioned on a map and available globally - depending on access rights. Multiple views or areas of interest within one map source as well as the clustering of icons depending on the zoom level make it easy to keep the overview on the map at any time. View live streams The new Qognify Mobile Client is another powerful tool added in Cayuga R15 that improves the ability to respond to an event. Retail sector often need to export video in a way that does not infringe privacy rights The Mobile Client is the result of Qognify’s cross-product initiative, to combine the benefits of technological assets within its VMS portfolio. It can connect to Cayuga and Ocularis installations using a smartphone or tablet, enabling security personnel to view live streams as well as to browse and playback recorded footage remotely in a totally revamped, intuitive design. It is available for iOS and Android devices and can be downloaded from the App Store or from Google Play at no additional costs. Exporting video For organizations, such as those in the retail sector, that often need to export video in a way that does not infringe privacy rights, Cayuga R15 adds a new Export Designer. This software module enables the editing (blurring and/or masking of moving objects and static areas) of video sequences to be exported. This new functionality is complemented by an optional Export Validation Tool - provided on the Qognify website - that can be used to easily check that exported footage supplied for the purpose of evidence has not been tampered with. Mitigating false alarms IT systems to create new levels of information to optimize business processes Many other changes, big and small made it into the release. For enterprise customers there is a new time management feature that enables the use of multiple distinguished vacation calendars within one organization. Active directory management has been further improved and now offers even deeper integration for setting user rights directly in Windows. And finally, for customers relying on video analytics as part of their security regiment, Cayuga R15 now uses deep learning-based AI to deliver optimized object classification. This helps to set up video analysis faster and mitigates false alarms caused by common occurrences such as insects and headlights. Business Video Intelligence Carsten Eckstein, Head of Product Management for Cayuga at Qognify is proud of what his team achieved for this latest version of the product: “The additions and enhancements in Cayuga R15 are in direct response to the feedback from our partners and customers. This is the first release, where Qognify’s new development philosophy, to look beyond one specific product, has been put to practice. I can’t wait for Cayuga customers to start using R15 but it is equally nice to know that also those users who rely on other Qognify products will profit from the work we have accomplished here in their Qognify system of choice.” Cayuga R15 is compatible with Qognify’s innovative Umbrella web-based platform that can be used to configure, manage and monitor all connected Cayuga systems centrally. It also integrates with its Business Video Intelligence (BVI) software, which combines video footage from Cayuga with transaction data from business-related IT systems to create new levels of information to optimize business processes. Cayuga R15 is part of Qognify’s comprehensive video management portfolio that includes VisionHub, Ocularis and NiceVision. It is available now in 15 languages and is SIRA (Security Industry Regulatory Agency) compliant, enabling it to be used in public projects in Dubai and the wider Gulf region.
Video wall and visual display providers Ultimate Visual Solutions (UVS) has seen a 10 per cent rise in the official quotations and detailed system proposals it has been asked to supply, despite the coronavirus lockdown. UVS Managing Director Steve Murphy said the increase, compared to the same period in 2019, was as a direct result of the full suite of remote access and online demonstration services which it launched at the start of the COVID-19 outbreak. UVS remote demonstration facility He said that the new way of working was already starting to translate into firm orders for a wide range of its products. These include a substantial order for a large UVS Lucidity video wall controller solution for a council CCTV project, where the final demonstration to the client was made at the start of lockdown using the UVS remote demonstration facility. Contracts also included eight new or renewed annual maintenance contracts for critical infrastructure or critical security sites Demonstrated the usefulness and effectiveness of the investment we made in the remote demonstration facility. Steve Murphy said: “During the ‘lockdown’ period from March 23 to May 31, UVS official quotations and detailed system proposals were 10% up in overall total project value against the same period last year.” “This has demonstrated the usefulness and effectiveness of the investment we made in the remote demonstration facility and the benefit it has brought to our clients, both integration partners and their end clients.” Video wall projects physical delivery During the lockdown period, UVS has continued to physically deliver major critical control room video wall projects, in strict accordance with all government and its own health and safety experts’ guidelines. These include: 24x 55-inch video wall system and Lucidity video wall controller for critical high-security project 16x 49-inch video wall system and video wall controller for critical high-security project 65-inch 4K screens for high security prison project Shipping a Lucidity controller for control room project to Vietnam and providing detailed remote, online product training to Vietnamese partner The remote access and online demonstration services, based from UVS’ new HQ in Burnley, are designed to provide peace of mind and support for key operational video wall technology. Remote Services by UVS The suite of remote services offered by UVS includes: Remote diagnostics and remote maintenance for UVS video wall technology which can offer quick analysis and resolution for most issues. UVS engineers using remote connection software, which is fully encrypted and which the client has control over, to carry out maintenance. For sites where the video wall controller does not normally have an internet connection, UVS is offering to supply a 4G data dongle as part of the contract (managed and paid for by UVS) to allow clients to give internet access as required. Assisting clients with reduced cost annual maintenance contracts. A live online demonstration facility to provide full video wall technology evaluations for partners and their clients who are in lockdown or self-isolation Technology visibility for visitors Technology which visitors can see in operation includes video wall solutions, displays, video wall controllers, control software, digital signage, integrated VMS (video management systems for security applications) AV over IP and KVM remote access options. UVS provides video wall displays and audio visual solutions to clients across the UK and the rest of the world. It is led by four senior colleagues who, between them, have more than 70 years’ combined Audio Visual, Control Room and Visual Solutions experience. It has also opened a new London demonstration venue at Woburn Place, a short walk from Euston Station.
Security & Safety Things GmbH (S&ST), together with its partners, is offering packages of smart security cameras and video analytic solutions designed to provide retailers with immediate solutions to practical challenges from the COVID-19 pandemic. AI Tech on cameras in retail stores In an effort to assist retailers operating their shops in compliance with COVID-19 regulations, these packages will include test cameras running the S&ST operating system. Integrators and end-customers can choose and deploy AI applications on these cameras to address operational challenges related to the COVID-19 pandemic. These apps are offered by S&ST’s development partners. Uses for applications include: Occupancy management Face mask detection Social distancing monitoring Real-time occupancy and face mask detection solutions A face mask detection app, offered by Geutebrück, enables efficient monitoring of people Security & Safety Things’ developer partners include Link Analytix, which is offering Retail Flux, a real-time occupancy solution designed to limit risk of infection for both shoppers and employees. SAIMOS has developed the SAIMOS Counting app, which can be used to monitor multiple entrances and exits to track occupancy in real-time and manage visitor access through automated displays at entry points. A face mask detection app, offered by Geutebrück, enables efficient monitoring of people to ensure compliance with prescribed hygiene concepts. This solution is able to recognize if an individual is wearing a protective mask and instantly notifies unprotected persons to onsite staff or remote operators via a connected Video Management System. SAIMOS also offers a feature for face mask detection in their counting app. Talos Social Distancing app CVEDIA’s Talos Social Distancing app features a foot traffic algorithm designed to detect and analyze at-risk areas for physical distancing in corporate or public spaces. This app detects people and the distances between them, while providing additional visual analytics that allow companies to improve current COVID-19 practices.
Video surveillance is commonly associated with security. But in most cases, it's used to record incidents and assist in investigations after the fact rather than prevent undesirable events. Artificial intelligence–powered video analytics is a highly promising trend that fundamentally changes the way things work. Extracting manageable data from a video stream can help recognize risky situations early on, minimizing damage and, ideally, completely avoid emergencies. At the same time, AI significantly expands the areas of application of video surveillance beyond security systems. AI significantly expands the areas of application of video surveillance beyond security systems However, the hype around this new, trendy technology prevents the potential user from choosing quality solutions in a wide variety of products. This often leads to over-expectation, followed by a complete let-down. Can AI-powered video analytics really be the key to a technological breakthrough in video surveillance? We'll take a look at what the technology can do, what it can't, and where it can go from here. Technological breakthrough or just another bubble? It's often said that the video management software (VMS) market is becoming increasingly commoditized and widely available. A lot of products with similar features (or, at least, similar promises from the manufacturer) make it hard to choose. As a result, vendor names and reputations are turning into one of their primary selling points. Manufacturers have two choices available: get wrapped up in a price war and rely on cutting expenses, or offer a product that's truly innovative and revolutionary. Manufacturers have two choices available: get wrapped up in a price war, or offer a product that's truly innovative and revolutionary VMS developers who choose the second route are gravitating towards creating products that use artificial intelligence based on neural networks and deep learning. Emerging two or three years ago, the AI video analytics market is experiencing a boom in growth. This new tech wave has stirred the still, stagnant backwaters of the VMS world and gave small, ambitious developers something to be optimistic about. It seems they now have a chance to emerge as market leaders in the next few years. However, the hype around this popular trend is raising reasonable concerns among experienced security industry professionals. These concerns come from clients looking for a solution to their problems, and from suppliers building a long-term development strategy. This largely resembles another tech bubble, like the one built up around pre-AI video analytics and burst when it became clear that the sensational promises around it were pure marketing hype (and rather unscrupulously so). However, there are a lot of factors that indicate that AI-powered video surveillance systems aren't another bubble. The three factors The first — and the main one — comes from systems already in place on customers' sites. They fulfill the same promises made during the previous bubble by hotheads in a rush to teach the computer to analyze events in real time using a classical algorithmic approach. The second is the fact that this new technology has seen investment from not only software and cloud startups, but also established VMS developers. Even giants like Intel, which has presented a full line of neural network accelerator hardware and a set of software tools that streamlines working with them, specifically in the field of computer vision. This new technology has seen investment from not only software and cloud startups, but also established VMS developers The third factor lies in artificial intelligence's abilities. AI plays chess, drives cars, and works wonders in many other fields. Why shouldn't it be applied to video monitoring and analysis? What AI can do Just what can artificial intelligence do in video surveillance systems at this stage of development? It can't quite analyze a sequence of events and understand the "logic" of what's happening in the cameras' field of view. At least not yet. But it's probable that AI will learn to do this in the next few years. But neural network analytics can already detect, classify, and track objects very well, providing high accuracy even in busy scenes. Artificial intelligence can be used in the real world to: detect smoke and flames for early fire warning at open areas (forest, open warehouse, parking lot, etc.); distinguish people/vehicles from animals and other moving objects, e.g. to protect the perimeter of a nature park from poachers; distinguish a person in a helmet and protective clothing from a person without them to prevent accidents at a dangerous production facility or construction site; count objects of a specific type, e.g. cars in a parking lot, people in the sales floor, wares moving on a conveyor belt, etc. in non-security-related solutions. Those are just a few examples. After training a neural network, it can tackle other, similar tasks, too. Generally, a neural network trained in specific conditions isn't replicable. In other words, it won't work as well under different conditions. On the other hand, developers have learned how to quickly train AI for the needs of a specific project. The most important requirement is having enough video footage. Somewhat apart from that is the use of neural networks in facial and automatic number-plate recognition. This is an example of reproducible neural networks (train once, deploy everywhere), which makes them more appealing commercially. If non-reproducible neural networks have only recently become economically feasible due to the rapid evolution of specialized hardware (aforementioned Intel's product, for example), then the use of AI in facial recognition and ANPR has been well established for a long time. The use of AI in facial recognition and ANPR has been well established for a long time Another kind of AI analytics that we'll explore is behavior analytics. This function, probably more than any other, is bringing video surveillance systems closer to understanding what's happening on camera. Its potential is vast. How Behavior Analytics Works From a technical point of view, behavior analytics combines artificial intelligence with a classic algorithmic approach. A neural network trained on a multitude of scenarios can determine the position of the bodies, heads, and limbs of humans in the camera's field of view. The algorithm outputs an array of data containing descriptions of their poses. Conditions can be set for data to detect a specific pose, such as raised hands, prostrated or crouching persons. Developers can use this to quickly create new detection tools to identify potentially dangerous behavior specified by a government or business client. There's no need for additional training of the neural network. How Behavior Analytics Can Be Deployed Someone crouched down next to an ATM could be a technician, CIT guard, or burglar. Bank security should be notified in any of the cases. A person in shooter position, together with a bank employee or cashier with their hands raised could indicate a robbery. The system can be configured to automatically send alerts with a surveillance snapshot to the police so they can assess the threat and take action if needed. It's vital that the police receive the alert, even if the employee is unable to activate the alarm. In many cases, attention should be directed to a prostrate individual. This could be somebody who needs immediate help, or it could be someone sleeping in an inappropriate public place, for example, a 24/7 ATM space. Behavioral analytics can also be used to ensure workplace safety. For example, tracking whether employees are holding the handrails when using the stairs at a manufacturing facility or a construction site. What Now? Behavior analytics can be deployed wherever your clients' imagination takes them. With this feature, practically any pose that indicates potentially dangerous behavior can be detected. Timely response to an alarm helps avoid material damages or, in other situations, casualties. Practically any pose that indicates potentially dangerous behavior can be detected An area of potential development for behavior analytics is the ability to analyze a sequence of poses by the same person or a combination of poses and relative positions of several individuals. That will be the next level of evolution in AI's use in video surveillance: moving from "detecting" to "understanding" behavior in real time. In its most basic form, this type of analytics can be deployed to detect deviations from the search procedure in correctional facilities when a person being inspected must assume a pre-defined sequence of poses. A more advanced form allows it to detect any kind of abnormal behavior, such as a brawl breaking out in a public space. Ideally, behavior analytics can predict dangerous situations based on nearly imperceptible cues gleaned from collected statistics and a Big Data analysis. At the moment, this sounds like pure fantasy, but what seemed like whimsy not too long ago is now a reality with AI. It's already beaten humans in chess and the game of Go (Weiqi). Will artificial intelligence be able to outplay humans at charades one day? It's entirely possible that we'll soon see for ourselves.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
ADT Commercial has grown organically in double digits since 2016, in addition to growing through 15 acquisitions completed since the merger of ADT and Protection One. Acquisition of integrator companies such as Red Hawk Fire and Security and Aronson Security Group has expanded ADT Commercial’s presence geographically to more areas of the country. Most of the employees of the acquired companies have stayed with ADT and “helped to create a corporate culture and a good place for employees to work,” says Dan Bresingham, Executive Vice President of ADT Commercial. Happy employees ensure good customer service. Enterprise resource planning Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020 “We adapt to where our clients want us to be,” adds Joe Sanchez, Senior Vice President of Customer Operations of ADT Commercial National Accounts. “We take a strategic approach as we determine how adaptive our customers are going to be to the new technology.” I caught up with ADT Commercial at the GSX trade show in Chicago. Bresingham tells me ADT Commercial has benefitted from the caliber and breadth of leadership talent that have come along with the various acquisitions, including Mike McWilliams of Red Hawk, Bob Dale of Protection One, and Phil Aronson of Aronson Security. The transitioning of internal systems such as enterprise resource planning (ERP), billing and customer repair software will further steamline the ADT Commercial operation in the next several months. Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020. We caught up with ADT at the GSX trade show in Chicago Providing new opportunities for regional integrators Additional acquisitions are also likely; in fact, growth is likely to accelerate. ADT Commercial offers a national footprint that can provide new opportunities for regional integrators it brings into the fold. New acquisitions will continue to fill out ADT’s skillset requirements in specific geographic areas where more expertise is needed. Security directors have a small staff and we help them know what they should be looking at in terms of data"“The industry doesn’t change a lot,” says Bresingham. “The technology just gets better, faster, and cheaper. As a service provider we take the best technology and combine it to provide the best solutions. We’re product-agnostic. Most of our jobs are down-and-dirty, doing the same things, but we’re pushing ourselves to be the best every day at the basics.” An emphasis at ADT is to provide customers ‘actionable’ data compiled from their various security systems. “We have a range of customers,” says Sanchez. Managing networks and video remotely “From small businesses to large data centers, there is no electronic system we cannot do. We are adaptable, from providing basic intrusion all the way to more sophisticated elements. Security directors have a small staff and we help them know what they should be looking at in terms of data.” “Our customers are our ‘true north’,” says Sanchez. A strong relationship with clients forms the basis for ADT Commercial’s success. Helping customers track data utilizes ADT Commercial’s eSuite account management system, homegrown software that compiles and analyses various customer data inputs. It also allows the ability to manage networks and video remotely. “We built it from scratch for customers. It’s a web-based system that helps them manage their business,” says Bresingham. “We hold ourselves accountable. We don’t hide from data, we encourage it.” Monitoring refrigeration units The solution is different in every case, just as every customer is uniqueIn addition to data from customer systems, eSuite can compile local weather information, crime statistics and other information that can help provide trending information to guide a customer’s business. The system’s flexibility enables ADT to provide the data each customer needs. ADT helps customers manage their business beyond the security department, too. “We do a lot of things in environmental control, monitoring refrigeration units and making sure humidity and temperature readings are correct,” says Sanchez. Leaving a door open could cause product loss at a pharmaceutical company, for example. In the food industry, a freezer malfunction could cause huge losses. In either case, an alarm can draw attention to the problem in a timely manner. Other customers face regulatory requirements that demand an audit trail of compliance, which ADT’s systems can provide. At the end of the day, ADT asks customers ‘What’s your security need?’ The company then adapts and assembles its solutions using internal resources and outside vendors, to meet that need. The solution is different in every case, just as every customer is unique.
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorized that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas).Dahua’s presence at the show makes a statement: “We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analyzed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyze the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE reports continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time.ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realized some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system. Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organization. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customizable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organization. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
FLIR PT Series cameras were used in a surveillance project to detect and monitor illegal fishing and poaching activities along the Spanish Galician coast. The FLIR thermal imaging cameras combined with maritime video analytics from Gradiant were ideal for spotting illegal vessels on a 24/7 basis and at a long range. The vastness of the Galician coastline and the multitude of fishing and farming activities call for a more automated surveillance approach. Fishing, shellfish harvesting, and marine aquaculture - mainly mussel farming in inshore waters are important economic activities in Galicia (northwest of Spain). Local public authorities strictly control these activities to prevent exploitation, fish stock depletion and resulting economical losses. They are fighting a constant battle against this unfair and illegal competition that affects thousands of professionals who make a living from the fishing and seafood industry. Challenges of coastal monitoring Illegal fishing and poaching has an enormous impact on the environment and food safety Illegal fishing and poaching of seafood resources also has an enormous impact on the environment and food safety; especially during periods of toxic algal bloom (red tides), when fishing conditions are hazardous for public health. The detection of unauthorized fishing and shellfish harvesting is of paramount importance for the Galician authorities. However, monitoring and protecting all of Galicia’s inshore and offshore fisheries, shellfish harvesting areas, and marine aquaculture farms is a challenging task. Galicia has 1,200 km of coastline. Its protection involves the surveillance of activity in 122 ports, including around 5,000 fishing boats, 400 beaches dedicated to shellfish harvesting, and 47 mussel aquaculture farms, with a total of more than 3,000 bateas (floating mussel farms). Long-range thermal imaging Moreover, most illegal activity takes place at night, making it extra difficult for law enforcers to detect any type of vessel. The Galician climate does not help either. With an average of 128 days per year of rain, visibility conditions are usually not ideal for surveillance operations. Manned surveillance patrols can only do so much; they are hindered by the climate and visibility conditions, making it impossible (from a practical and financial standpoint) for coast guards to cover the entire Galician coastline. In 2017, the Galician Coast Guard started a project to test video surveillance of the coastline based on thermal imaging cameras. The pilot included the use of FLIR’s PT Series multi-sensor camera, combined with maritime video analytics software from Gradiant (Pontevedra, Spain). Multi-sensor installation FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications The multi-sensor installation was extensively tested on two different locations along the Galician coast. One set-up was used to monitor illegal vessels on coastal waters at short/medium range, while another set-up was used for long-range monitoring. The PT Series thermal cameras allowed the Galician Coast Guard to monitor the required area over a long range on a 24/7 basis, even at night and in adverse weather conditions. In addition, the FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications. This software is specifically adapted for monitoring coastal environments and allowed the coast guard to detect, track and geo-localise people and vessels, including small wooden and plastic boats. Visible-light camera The software enabled the thermal cameras to detect objects and people despite adverse maritime conditions, such as high waves, low contrast due to low light, fog and rain, reflections on the sea surface, camera vibrations, and the presence of distractors, such as birds and vessel wakes. The FLIR PT Series is a high-performance multi-sensor pan/tilt security camera, incorporating an uncooled thermal camera with sensitivity of <35mK and a visible-light camera with 36x optical zoom. While the thermal camera is used to detect threats over a long range based on their heat signatures, the visible-light camera can be used for verification and identification. Long-range surveillance The requirements for this long-range application were extremely challenging for any thermal camera" “FLIR is the reference for long-range surveillance applications with thermal imaging,” says José Antonio Rodríguez, Head of Video Analytics at Gradiant. “The thermal performance of the camera and the fact that this technology is easy to set up makes it ideal for this type of application. In addition, FLIR supported us from the start for lens selection, calibration of the system and much more.” “The requirements for this long-range application were extremely challenging for any thermal camera,” says Nikitas Koutsourais, Product Marketing Manager at FLIR Systems. “Thanks to the FLIR PT Series’ unique thermal sensitivity of less than 35mK, we could provide the best image performance in the market.” IP video streaming Two different configurations were used in this application. The long-range surveillance station used a FLIR PT-606 camera, and was able to detect a rubber inflatable boat at 4,000m. Despite its narrow field of view, this camera allowed for wide coverage thanks to the high-precision pan/tilt unit. The camera was able to sweep a wide field of view span in a pre-programmed sequence of pan/tilt presets. The port surveillance station used a PT-625, offering a good compromise between detection range and field of view with a single pan/tilt preset. The integration of the video analytics software with the camera was easy thanks to IP video streaming and the camera’s ONVIF compliant interfaces for pan/tilt control. Long-range surveillance typically requires the use of lenses with a narrow field of view, which is a problem when you want to monitor wide areas. Coastal protection applications The FLIR thermal cameras provided the Galician coastguard with increased situational awareness However, the video analytics from Gradiant was able to take advantage of the Preset Sequencing mode of the FLIR PT Series. This allowed the coastguard to cover a wide field of view with a single camera and to perform video analysis on each pan/tilt preset. The FLIR thermal cameras provided the Galician coastguard with increased situational awareness and allowed them to respond much quicker to illegal fishing activities. The pilot project was performed in a realistic surveillance environment along the Galician coast and generated very positive results. The combination of a multi-sensor system with Gradiant’s maritime video analytics proved to be effective to deal with the intricate Galician coast lines and a lack of open view. In addition, this technology combination is a cost-effective alternative, making automated surveillance applications accessible for fish farm companies worldwide. Extremely rugged systems Finally, the PT-Series are extremely rugged systems, which makes them ideal for coastal surveillance, especially in an extremely humid environment such as the Atlantic coast of Spain. The system’s vital core is well protected against dust and water ingress, and complies with IP66 requirements.
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations center not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data center standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations center, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
For more than a century, SwedishAmerican Health System, its hospital and medical facilities, have been serving the community of Rockford, Illinois. As a division of the University of Wisconsin Health, the medical staff has been delivering high-quality healthcare and strategies to keep patients and families healthy. What families and patients don’t see is the security systems that have been put in place at all Swedish American medical facilities and outlying satellite healthcare clinics. “In an ongoing effort to provide security at the highest level, SwedishAmerican is upgrading all their servers to include Windows 10,” said Randy Lapp, a regional business development manager at Salient Systems. Reliable security solution “The security team has nearly completed the replacement of old DVRs with new enterprise network servers. This offers a much more reliable security solution tying all the medical facilities together. Each clinic will have a single server, while there will be multiple servers in the hospital. Server types and camera counts will depend upon the needs of each wing of the facility.” In keeping with SwedishAmerican’s mission to deliver excellence in healthcare, they also maintain the highest level of care when it comes to keeping their patients, medical staff, and facilities safe. One such effort is the migration from Windows 7 platform to Windows 10 and maintaining compliance in their OS. Utilizing Salient’s CompleteView VMS with Dynamic Resolution Scaling, the security team has more than adequate bandwidth to record and store video for 90 days at each facility. Video surveillance systems The servers replace an obsolete system and have been engineered by Salient System network engineers Because the medical center offers a daycare facility, recording is ongoing, and is stored for 90 days; however, some recordings are held for as long as six months. In locations where there are privacy issues, such as patient treatment areas, no video recordings are made. Still, in spaces such as parking lots and common areas, video recording is essential. The servers replace an obsolete system and have been engineered by Salient System network engineers to accept upgrades in security solutions as technology, and various solutions evolve. Even more important is the fact that the servers are tailormade to fit the specific needs of the various hospital departments and separate clinics. The servers, just like the hospital, have evolved over the years. The PowerProtect platforms extend the limits of operational capabilities for video surveillance systems engineered for continuous access and durability. Various requirements for storage “The reason for the custom build is to fulfill several missions of the hospital system,” Lapp said. “There are various requirements for storage and differing requirements for recording frames per second. The customized nature of these security solutions fulfills the unique needs of the customer.” SwedishAmerican Hospital has video recording requirements that weren’t necessary a few years ago. This is an inner-city hospital system, where there are different and sometimes difficult challenges" Terry W. Gagliano, security manager at the hospital system, said the investment in this server solution would not only help with the upgrade to Windows 10, but it will allow greater recording capacity. “This is an inner-city hospital system, where there are different and sometimes difficult challenges,” Gagliano said. “The clinics also are within the inner city, and we wanted to ensure that we had enough bandwidth to not only record, but to store the images that we are getting. We wanted to be able to effectively record and store video for 90 days.” Mission-Critical video surveillance Recording and storage specifications vary at the hospital. For instance, at the child daycare center at the hospital, recording is active only during hours of operation, and storage of those images last from three to six months. Parking lots also are under constant surveillance, and storage on the servers is ongoing. “We’re thrilled to have these server platforms in place and working,” Gagliano said. “What we had been using is obsolete. The PowerProtect solutions are engineered to accept upgrades as they are needed and as they become available. We expect these servers to last beyond five years before we have to consider replacement.” The servers or hybrid NVRs are a value oriented digital video surveillance system, offering continuous operation with advanced components. They are rack-mounted, and as any end-user would expect, delivers reliability and a processing power required by mission-critical video surveillance. High performance in a flexible platform Because the storage of video images is important, SwedishAmerican sought a single Intel Xeon processor with 16 GB of memory, which also offered the hospital system up to 48 TB of video storage. “We were looking for new servers at our existing buildings, so that meant we were in the market for 40 to 45 servers,” Gagliano said. Our clinics have varied and different missions, so demand for security services are different" “Our clinics have varied and different missions, so demand for security services are different. When we sought customized solutions, we found exactly what we needed.” PowerPlus is a two-unit NVR rack mount used for the installation because SwedishAmerican sought a balance between processing power, storage capacity, and redundancy for high performance in a flexible platform for its existing video surveillance applications. A hospital setting is a 24/7/365 environment, requiring a system that can withstand the rigors of continuous operation. That’s where the enhanced performance of CompleteView 20/20 comes in. Considering performance first and foremost “When we started the process of replacing our servers and NVRs, we considered performance first and foremost,” Gagliano said. “It was mission-critical to have flexibility, and it was important to honor the standard of excellence already offered by SwedishAmerican Hospital.” In recent years, SwedishAmerican has been honored in the medical professional for its commitment to quality, and it has become a gold standard for medical care of any other healthcare system in northern Illinois. The hospital has received a Top 100 Hospital Quality Award, 150 Top Places to Work in Healthcare, and a Distinguished Hospital Award by J.D. Power and Associates, among many other accolades. While there may not be an award or designation for security in the workplace, SwedishAmerican has done its best to ensure that patients are afforded the highest level of safety and security.
OPTEX Teams up with Mobile Pro Systems to create a Rapid Security Deployment Solution for a high-end condominium builder in Extreme Weather Conditions. The solution was required for a large construction site for Cove Properties, one of Alberta, Canada’s premier luxury condo builders. Weather conditions With many developers and construction companies building throughout the year, they're forced to battle a myriad of different weather conditions including rain, sleet, snow and extreme cold. On top of this, they still face the inevitable problem of theft and vandalism. Theft of tools, machinery, new materials and scrap material cost contractors millions of dollars per year and leaves the construction companies and their sub-contractors with the effect of having to deal with their losses. The general contractors and developers feel the chain reaction as well, as they have to deal with higher insurance premiums and weeks and months of project delays. To avoid the major effects of construction site theft, Cove Properties turned to 2020 Digital Security Solutions of Alberta, Canada for help. Cove’s requirements included a mobile solution capable of wireless communication that could be moved from site to site with surveillance, motion detection, lighting and remote monitoring capabilities. In addition, it had to survive the harsh outdoor elements of Northern Canada. Powering network and surveillance solution 2020 Digital Security Solutions took all of Cove’s requirements into consideration and found the perfect solution in the PowerSentry by Mobile Pro Systems. The PowerSentry is a self-sufficient, temporary, semi-permanent or permanent surveillance solution. Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole Built as a “power platform”, it can power anything from surveillance, security, communications and/or network technologies. And with its universal mounting options, the PowerSentry can be mounted to a pole, a wall or tripod or can be easily hooked over a fence or roof parapet for superior mobility. It accepts 90-277VAC to minimize re-wiring and is equipped with a high quality Lithium-Ion battery pack as a backup power source due to loss of power or power outages. In addition, the PowerSentry has a unique remote system status and control software called Power Broker, which monitors the PowerSentry’s battery voltage, current power usage, displays active map GPS monitoring, intrusion detection reporting, warning and flood lighting control and horn/speaker control. Motion-activated floodlights To help solve the limited daylight obstacle, 2020 DSS had two 8,000 lumen LED flood lights mounted to the chassis of the PowerSentry. The LED floodlights are motion activated and have a pre-determined setting of how long they will stay on. The lights can also be turned on and off manually through the Power Broker software. “Due to the short amount of daylight during the winter months, the flood lights will help light the site in the evening hours and after hours if there is a breach in the perimeter,” said Gene Telfer, president of 2020 DSS. The perimeter and the interior of the construction site is protected by an Optex RedScan laser perimeter detection device which was connected to the PowerSentry and mounted 8’ below providing a 200’ horizontal area of detection. “We decided to mount the RedScan below the PowerSentry instead of on it because we will get a wider detection range and a firmer detection trigger,” Telfer said. Optex Redscan laser detectors With abnormal cold temperatures hitting the Northern United States and almost all of Canada, the first test was in late December into early January when normal temperatures fell to -40°F and -60°F with the wind chill. “The systems are working great and we haven’t had a system go down at all,” Telfer said. According to Telfer, Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole that made installation very quick and easy. They are using Milestone video management software that integrates with the cameras and Redscan laser detectors for visual verification and event response in one platform.
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilizing indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
Siqura and TKH Security realized a fully integrated surveillance and access control system in the Sheikh Khalifa Central Hospital. This new hospital is located at the eastern edge of the emirate of Fujairah and will provide better 24/7 health services to citizens on the Eastern coast. The hospital consists of 11 specialized departments, a 32-bed emergency ward, a 3-story rehabilitation building and more than 700 parking spots. Integration of multiple systems This hospital required a complete surveillance solution integrated with healthcare applications. The project combined access control and video management from TKH Security with cameras from Siqura. "We worked closely with our partners to comply with the solution which conforms to the new guidelines in Fujairah” says Tariq Anwer, Sales Director – Middle East & West Asia with Siqura. “The video surveillance component consists of around 700 different Siqura cameras, working with VDG Sense video management software and storage from TKH Security. The iProtect access control system, also from TKH Security manages around 400 doors with card and pin authentication. iProtect security management system is able to flawlessly fulfill the set of complex requirements demanded by this client.” Security management system healthcare facility For Siqura Middle East & West Asia and TKH Security, Sheikh Khalifa Central Hospital in Fujairah is a prestigious project in the healthcare segment. The integration of multiple systems under one roof combined with the integration of healthcare applications provided an extra challenge. Tariq Anwer: “The scope of the project involved an integrated security management system consisting of Siqura cameras, VDG Sense VMS and iProtect access control." "These are all managed at an upper level by iProtect security management system. Among others, some of the following features are implemented: managing visitors on-site and mustering system for emergency evacuation. This is in addition to the integration option with third party systems, for example baby-monitoring.”
Round table discussion
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?
Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analyzing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
How to Choose the Right Solution for Video Data to Enhance Security and Operational IntelligenceDownload
Video management software: Manufacturers & Suppliers
- AMAG Video management software
- Milestone Video management software
- Vicon Video management software
- Avigilon Video management software
- Axis Communications Video management software
- Bosch Video management software
- Video Storage Solutions Video management software
- Vanderbilt Video management software
- March Networks Video management software
- AxxonSoft Video management software
- Hanwha Techwin Video management software
- FLIR Systems Video management software
- Qognify Video management software
- MOBOTIX Video management software
- Verint Video management software
- eneo Video management software
- Verex Video management software
- Meyertech Video management software
- IDIS Video management software
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload