Video management software
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level...
FLIR Systems, Inc. has announced FLIR TruWITNESS, an industry-first wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organizations to reach a new level of situational awareness. FLIR TruWITNESS Wearable Sensor Platform TruWITNESS is designed for any public safety organization that requires on-scene, real-time...
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the selection of Brian White as Regional Sales Manager for the Great Lakes Region. The company, a new business unit of Costar Technologies, Inc. (OTC Markets Group: CTSI), was launched on July 13th, 2018 and is expanding its sales and support across the Americas. “Brian brings nearly two decades of senior-level sales experience in security and cloud computing to our customers in the Great La...
Eagle Eye Networks announced it has completed an eighteen-month globalization project to meet the needs of key global customers. The initiative included: Adding data centers globally to provide wider regional coverage Opening of new Eagle Eye Networks office in Japan and new distribution partnerships in the Nordics and Spain Multi-lingual translations of the Eagle Eye user interface, Eagle Eye Reseller Dashboard and the website Enhanced customer support resources including localization and...
WeSuite, a software manufacturer of sales management tools for technology sales and service providers, announces that its corporate-wide implementation of DevOps best practices has positioned the company at the forefront of software developers prepared to meet market demand for more agile and responsive solutions. The transformation of WeSuite’s entire business model to drive its organizational performance puts it at a distinct advantage in its ability to deliver a premium user experience...
OpenEye, a provider of cloud managed video surveillance solutions, announces a new integration between OpenEye Web Services (OWS) and Connect ONE. Connect ONE by Connected Technologies is a cloud-hosted integrated security management platform which provides a single user interface to control intrusion, access control, critical environmental monitoring, energy management and video surveillance. OpenEye OWS is an online video management solution that combines the performance and reliability of lo...
Pivot3, the hyperconverged infrastructure (HCI) performance and technology pioneer, announced that it experienced more than 50-percent growth in bookings in Q1-Q3 2018 over the same period in 2017, with significant growth among large enterprises and complex, mission-critical use cases. With IT requiring automation and intelligence to manage increasingly complex workloads and multi-cloud environments, Pivot3 saw high demand for its Hybrid Cloud solutions. Pivot3 also experienced continued expansion with Internet of Things use cases, particularly with Smart and Safe City initiatives. “Q3 2018 was remarkable for Pivot3, from our growth in sales and introduction of new products to the announcement of our global strategic partnership with Lenovo,” said Ron Nash, CEO, Pivot3. “Enterprises are demanding more from IT, and our growth indicates that the market is increasingly aware of Pivot3 and the power of our Intelligence Engine to simplify management at scale as well as deliver the security and resilience needed to support mission-critical workloads.” Continued adoption of its Hybrid Cloud solutions, representing more than 60 percent of new sales in Q3Pivot3’s Developments In Q3 2018: More than 50-percent growth in bookings in Q1-Q3 2018 compared to the same period in 2017, with 86 percent of new bookings in Q3 comprising large enterprises. A 95-percent increase in average deal size in Q3 2018 over the 2017 average. Nearly 65 percent of 2018 sales to date have come from satisfied existing customers expanding their deployments to include multiple mixed workloads. Additionally, more than 70 percent of new customers deployed multiple mixed workloads on Pivot3’s platform, indicating that customers are increasingly – and repeatedly – relying on Pivot3’s Intelligence Engine to automate and manage multiple mission-critical applications on a single platform. Continued adoption of its Hybrid Cloud solutions, representing more than 60 percent of new sales in Q3. Named a Strong Performer in Hyperconverged Infrastructure in The Forrester Wave: Hyperconverged Infrastructure, Q3 2018. Pivot3 ranked within the top three vendors in the current offering category and achieved the highest scores possible for the criteria of built-in security, customer support options and quality of operations and support. Announced a global strategic partnership with Lenovo to develop, market and sell solutions optimized for mission-critical Smart City applications and use cases, both in the core data center and at the edge. Continued growth of mission-critical Smart City initiatives, including with the City of Bogotá, Colombia, which is deploying a highly-efficient Lenovo/Pivot3 solution to achieve maximum infrastructure efficiency and scale as its surveillance needs grow. Launched Intelligent Edge Command and Control, a new ruggedized and SWaP-optimized Hybrid Cloud solution to support sophisticated analytics, VDI and IoT use cases for defense, intelligence and other extreme operations at the ‘tactical edge’. Released a new large-scale IoT solution designed to support mission-critical deployments of 500TB or more with greater resilience, scale and ease of use, fundamentally altering the economic equation for customers in large IoT data capture scenarios. A diverse range of new customers, including numerous military and federal agencies as well as local governments, a nuclear research facility, multiple educational institutions, a large manufacturing organization and a major sports and entertainment complex. The top industry verticals represented in Q3 sales include government, logistics and transportation, energy and utilities, hospitality, and education. Certified its infrastructure solutions for mission-critical IoT, Safe Cities and Smart Building environments operating with Milestone Systems video management software. This allows organizations to gain access to infrastructure proven to deliver the performance, resilience and scale required in mission-critical environments. Advanced Resilience And Security The key to Pivot3’s differentiation in the HCI market lies in their Intelligence Engine, which delivers advanced resilience and security"“IT organizations need new levels of automation in their infrastructure to provide the resiliency, availability and low latency required to support rapidly expanding volumes of data and the proliferation of applications and business services,” said Mike Leone, Senior Analyst from Enterprise Strategy Group. “The key to Pivot3’s differentiation in the HCI market lies in their Intelligence Engine, which delivers advanced resilience and security, and automates manageability at scale for customers’ most demanding workloads.” “Pivot3 has led the industry in supporting mission-critical use cases where security, resilience and management simplicity are required at enterprise scale,” said Nash. “As customers turn to IT to solve their most pressing business challenges, automation, artificial intelligence and machine learning will become key drivers in enabling the next wave of enterprise-scale digital transformation. Pivot3 is positioned to support this evolution with a foundation of Hybrid Cloud and IoT solutions for the enterprise’s most critical environments.”
Johnson Controls has introduced exacqVision video management system (9.6), which empowers users to gain unprecedented insight into their VMS data, while leveraging powerful integrations and essential recording features during network loss. exacqVision VMS 9.6 With massive amounts of data continuously being generated by security cameras, access control, intrusion systems and other integrations, exacqVision 9.6 lets users analyze their data to make better business decisions. For example, security operators in any business can evaluate aberrant “door open” events in restricted areas with greater granularity to mitigate potentially dangerous trends. Maintaining system uptime is of paramount importance to keep people safe and meet compliance requirements. To help achieve this, exacqVision 9.6 includes support for direct SD video recording capabilities with Axis cameras. When connectivity between supported cameras and an exacqVision NVR fails, video records directly onto the camera’s SD card. Once connectivity is reestablished, recorded video transfers back to the exacqVision NVR and is automatically stored at the correct date and time. Integration With DMP Intrusion Panels This commitment to continuous uptime and complete security is also reflected in the latest integration with the popular DMP intrusion panels. The integration lets users receive events, and arm/disarm the system directly from exacqVision, providing a more intuitive and streamlined security solution.
Johnson Controls announces the latest version of the victor and VideoEdge flagship video management solution (VMS). This release features an array of tools to improve analytic reporting and streamline device and user management across multi-location installations. The victor client on VideoEdge hardware platforms allows users to leverage high-performance video streaming, audio, video intelligence and an expansive feature set for improved real-time command and management. victor And VideoEdge VMS “This is a major step forward for our VMS platform in its ability to better suit system owners and stakeholders that appreciate the benefits of regular updates and other proactive maintenance,” said Jammy DeSousa, senior product manager, American Dynamics, Building Technologies & Solutions, Johnson Controls. “In the past, keeping up with the latest and greatest firmware and cyber practices, such as rotating passwords on an array of devices, like cameras and NVRs, could be a hugely cumbersome process. With version 5.3 we've greatly reduced that workload while adding capabilities for cyber security and policy compliance.” This latest release presents firmware and software management with enterprise bulk configuration that reduces the time and complexity associated with managing updates across enterprise deployments of Illustra cameras and VideoEdge recorders. Also included is the ability to efficiently manage camera and NVR passwords to adhere to cyber security policies, enriched by the new enhanced security mode which removes default accounts and requires the creation of new accounts and roles. Video Analytics Metadata Visualization Analytic functionality has been optimized with a new dashboard that displays important operational business intelligence from search results and visuals Analytic functionality has been optimized with a new dashboard that displays important operational business intelligence from search results and visuals for average occupancy, conversion rates, engagement rates and more. Analytic overlay and live people counter allow built-in tools for video analytics metadata visualization by creating people counting areas and tallying entry and exit to those areas. VideoEdge NVRs VideoEdge NVRs now support H.265 streaming for efficient encoding in constrained environments, saving network bandwidth and storage costs. Further, NVR camera access permissions simplify the user interface by restricting camera access, effectively hiding cameras from operators who don’t need to see them. victor and VideoEdge offer powerful command and control to seamlessly synchronize video surveillance with access control, fire, intrusion and other systems into one powerful, intuitive interface and recording platform, allowing customers to manage their business more safely and intelligently.
Connected Technologies LLC, maker of a powerful cloud-hosted security management platform and OpenEye, an innovator in cloud-centric software solutions for video management, business intelligence and loss prevention, announced an exciting new integration between OpenEye Web Services (OWS) and Connect ONE. OpenEye OWS Connect ONE by Connected Technologies is a cloud-hosted integrated security management platform which provides a single user interface to control intrusion, access control, critical environmental monitoring, energy management and video surveillance. OpenEye OWS is an online video management solution that combines the performance and reliability of local recording with the convenience and flexibility of the cloud. Now, the OpenEye NVR and the Connect ONE cloud platform are accessible directly through the OWS cloud. The integration eliminates the need to connect to an IP address or open an inbound port on the end-user’s network firewall. Once connected, Connect ONE users can quickly retrieve and easily configure OpenEye cameras, view live video, record snapshots upon an event from the Intrusion/Access System for video verification or review a 10-second Pre-Event and up to 45-second Post-Event video clip. Another future feature release will include the ability to receive OpenEye NVR health status reporting as well as motion or input trigger events through Connect ONE. Integral Connectivity “We’re excited to offer this capability to OpenEye and Connect ONE user,” said Rick Sheppard, Chief Executive Officer of OpenEye. “OpenEye is committed to offering integrated solutions that add value and enhance functionality for our customers through strategic partnerships such as this one.” Dan Simon, Co-Founder and Managing Partner, Connected Technologies, said technology partnerships with industry leaders such as OpenEye allow dealers to add new capabilities and services to their customer’s systems. “Connected Technologies is founded on delivering the timeliest solutions to security dealers. In fact, this integration was created due to dealer’s requests. The OpenEye integration adds value to their projects, brings exciting capabilities through a single user interface and helps them differentiate their service offerings.”
“With C•CURE 9000 at the heart of so many high security solutions, it is not surprising that end-users want to be kept informed on any emerging cyber threats and how we are dealing with them,” said Gordon Morrison, GB Sales Director for the Tyco access control and video brands. “In this respect the well-established Tyco Cyber Protection Program, which we see as part of our long-term' holistic approach to supplying customers with quality solutions, is helping us maintain a leadership position on cyber security.” Tyco Cyber Protection Program “We were able to reassure delegates that our solutions are specifically designed to be cyber resilient and that before they are introduced, they are extensively tested so that we can discover and address any critical vulnerabilities. We also arrange for independent testing to be conducted on our products and software to ensure that any new firmware or software updates do not open a ‘back door’.” The end-users from across the UK who attended the daylong event were able to see demonstrations of how they can take advantage of the latest technical advances from C•CURE 9000, the access control and event management platform from Tyco, the security products division of Johnson Controls. These included a Business Intelligent Reporting System (BIRS) module which provides real-time ‘easy on the eye’ graphical reports on access control activity. C•CURE Go Mobile Access Control App The C•CURE Go mobile access control app is supported by iPhone, iPad, iPad Air, iPad Mini, Android phones and tablets The C•CURE Go mobile access control app, which is supported by iPhone, iPad, iPad Air, iPad Mini, and Android phones and tablets, attracted a lot of interest. Delegates were impressed with the app’s extensive range of features including offering the ability to remotely lock/unlock doors with a touch of a button, as well as quickly search, create or update personnel records and add/remove clearances and deactivate cards on the go. Some new hardware was also showcased such as the recently introduced Innometriks readers which provide strong identity authentication for mission critical environments using smart card, PIN and biometrics, and delegates were informed that a second generation PoE edge based iSTAR 4 door controller was under development. Web-Based Access Management Portal A recent updated version of C•CURE 9000, v2.7, has seen the introduction of a wide new range of features and functions designed to enhance the user experience. Included is a web-based Access Management portal which further adds to C•CURE 9000’s ability to claim that it is the most flexible and easy to use access control platform available, as well as adding to its reporting capabilities. A cardholder’s request to be given access to a restricted area can now be directed to the person best placed to make the decision, replacing potential long email chains and slow response times common for access approvals. A new Access Management module offers an efficient method of managing cardholder access requests without requiring direct involvement from the security team. C•CURE 9000 Access Management C•CURE 9000 Access Management allows cardholders to make access requests through an intuitive, web-based portal C•CURE 9000 Access Management allows cardholders to make access requests through an intuitive, web-based portal. The self-service capabilities increase the agility of clearance owners' responses to cardholder access requests for temporary and contract staff, as well as employees who have with drop-in work schedules or are part of project-based self-organizing teams. There was also a presentation on the latest features and functionalities of the victor unified video management system and how it integrates seamlessly with C•CURE 9000 to streamline real-time security command and management over widespread and demanding environments. Victor VMS The victor Video Management System (VMS) seamlessly synchronizes video with data from access control, fire, intrusion and other systems. Future-proof and scalable, it has been designed to provide a high-performance solution which provides operators with superior situational awareness, as well as an easy way to investigate incidents and generate activity reports. Intelligently delivers the right video and other critical information such as event notifications, maps and health monitoring, to the right person at the right time and with the flexibility to display the video and other information on single or multiple screens, as well as video walls. System integrators are able to meet the customers’ operational requirements by selecting the right Tyco NVR for their needs together with a camera compatibility list spanning over 60 manufacturers and 3,300 cameras. Provides a centralized view of fire, security and life safety operations. Offers powerful tools to help simplify and enhance your command and control operations. Victor VMS - C•CURE 9000 Integration Victor’s integration with C•CURE 9000 enables operators to monitor and prioritise events from both systems Victor’s integration with C•CURE 9000 enables operators to monitor and prioritize events from both systems and to color code them for rapid identification in order to facilitate quick response times. Combine these with other innovative C•CURE 9000 features and you have a formidable integrated security solution which can provide security or operational personnel with all the information they need to make quick decisions and take appropriate command actions if an incident or emergency occurs. The event, which was supported by a number of C•CURE 9000 Enterprise Partners as well as a number of third-party manufacturers who have integrated their solutions with the platform, was by all accounts a great success, with many of the delegates contributing to the session dedicated to discussing the new features and innovations which could be introduced in future updates of the C•CURE 9000 platform. Intelligent Communications Solutions Russell Baker, Southern Area Business Development Manager for Zenitel, the UK’s leading specialist provider of intelligent communications solutions, said “We were very pleased to be able to participate in the end user event. We were able to take the opportunity to demonstrate how the deep level of integration which can be achieved between the C•CURE platform and Zenitel’s intercom and public address systems, enables our mutual end-user clients to take their security to the next level.” “For high security and mission critical applications, the interaction that takes place between the two solutions will ensure security personnel are able to strictly control who has access to restricted areas and react quickly to any incidents.” Traka - C•CURE 9000 Integration Traka showcased how its intelligent key and equipment management systems have been integrated with C•CURE 9000Traka, a division of Assa Abloy, showcased how its intelligent key and equipment management systems have been integrated with C•CURE 9000. “Our ability to support C•CURE 9000 means there is so much more we can do together to provide end-users with greater value from their electronic security system,” said Steve Bumphrey, UK Sales Director for Traka ASSA ABLOY. “The level of integration achieved means end-users can use the C•CURE interface to enrolI authorized personnel into the Traka database and then control access to our key cabinets and intelligent lockers, as well as manage the removal of physical assets. Traka generated real-time alarms can be seamlessly managed via the C•CURE 9000 platform and improved efficiency comes from only needing a single credential for both systems.” Other successful integrations with C•CURE 9000 which were highlighted at the event included: FireClass, a revolutionary new class of commercial fire detection products which are packaged as an easy to install, out-of-the-box, digital open-protocol solution. Designed and engineered in Europe, FireClass technology is part of Tyco’s family of solutions. 3D Fingerprint MorphoWave from Idemia, the market leader in augmented identity. Immune to environmental factors such as dust and lighting, MorphoWave acquisition of finger prints is dynamic, high speed and because it is touchless it offers the additional benefit of being hygienic.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
Unlike private sectors, the government-run offices or buildings are the places where people constantly visit for specific purposes, making these official institutions easily become a target for tempted malicious attack by people who might possess strong and negative emotions toward the governments. Despite the fact that these buildings are often guarded with more security staff with arms, it is even more than necessary to set up a solid surveillance system to proactively safeguard the public and its assets. Surveon provides government solutions with product lines including weatherproof cameras with excellent image quality, patent RAID NVRs with spare drive protection, and feature-rich VMS with post VA search. These powerful solutions enable the governments to protect people from most of the threats. Weatherproof Cameras With Smart WDR Surveon cameras secure the outer spaces of government building with IK10 vandal proof and IP66-rated weatherproof housingTo build a reliable security system for governments, SIs might encounter some challenges such as harsh outdoor conditions and data protection of recorded video. Under these circumstances, Surveon cameras secure the outer spaces of government building like parking lot with IK10 vandal proof and IP66-rated weatherproof housing, giving partners the most reliable outdoor-use option. Moreover, all of Surveon cameras provide excellent image quality with smart WDR, allowing the security guards to recognize crucial details such as license plates even under lighting contrast and prevent any suspicious vehicle from entering. Patent RAID NVR With Data Protection To avoid the loss of confidential data from surveillance system, the data protection of recorded video is particularly important in terms of planning for government security. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video loss. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video lossBesides, its client-server architecture can offer high I/O, large capacities, and overall system stability. To quickly identify useful information and relative footage from hundreds of hours of video recording, Surveon designs Post VA Search, an efficient management tool, reducing the time and efforts of management staff, making the surveillance system more efficient. Enhancing Security System Surveon government solutions have been successfully safeguarded the customs building in Bolivia, the post offices in Cairo, and the border checkpoint in Turkey. “Surveon provides the best C/P value solutions for the customs and improves its whole security system with high-reliability products. We are satisfied with the result and I’m sure we will keep choosing Surveon’s solutions in the future projects,” said VisionLine, Surveon’s major partner in Bolivia. Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.
Cosmo Music was established in Richmond Hill, Ontario, Canada in 1968. Its current 56,000 sq ft store opened in 2008, making it the largest music instrument store in North America. It is also home to the Cosmopolitan Music Hall venue. Needing to replace a 20-year-old analog video system, Cosmo Music Vice President and COO Rudi Brouwers, started researching modern video management software (VMS). Initially he intended to purchase IP cameras and a basic VMS with the ability to record and playback. But Brouwers soon learned of the vast capabilities of modern systems. He turned his focus to finding one that went beyond basic video management to offer business intelligence. Identify Suspicious Customers Brouwers ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic In particular, he was interested in face recognition, which would enable Cosmo Music to identify suspicious customers to prevent shoplifting. Working with integrator Northern Alarm Protection Ltd. (NAP), Brouwers looked at a number of different systems, and ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic. “I was sold on Symphony when I got to actually use it,” said Brouwers. “It floored me how easy it is to work, how straightforward it is. It is so user friendly it is unbelievable.” Brouwers likes several of Symphony’s core features, including: the ability to save video for up to six months (he had been hoping for 90 days) customization options (for example, recording only when motion is detected) ability to bookmark video the mobile app, which lets users connect to Symphony via a smartphone or tablet to view and playback video, control pan-tilt-zoom (PTZ) cameras, manage I/O devices, receive alarm notifications, and more. Face Recognition Analytic Before implementing Senstar’s Face Recognition video analytic, when a suspicious customer was identified through video surveillance, Brouwers would screen capture an image, email it to staff, and ask them to keep an eye out for that person. With Senstar’s Face Recognition video analytic, Brouwers can flag suspicious customers in Symphony. When that person enters the store again, Brouwers is automatically notified. One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up" Brouwers tested the analytic thoroughly and was amazed by its capabilities. “One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Mr. Brouwers. “That’s what sold me on it.” Symphony and the Face Recognition analytic, deployed on Senstar’s R-Series network video recorder (NVR) hardware, have been running at Cosmo Music since April 2018 and Brouwers couldn’t be happier. Business Intelligence Applications “It’s everything I dreamed of and more,” he said. From an integrator perspective, NAP, who had significant VMS experience but never used Symphony, thinks the product is a great option for business intelligence applications. “Symphony is the right fit for any application that requires enhanced security such as analytics. It’s superior to many other systems out there,” said NAP President and CEO Dave Koziel. “From a deliver what is promised standpoint, it’s 12 out of 10 on the scale.” Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment Identify known and unknown individuals Create allow and deny lists, and be alerted when someone on that list is identified Save time and resources with a robust search functionality that lets users look for registered and unknown people in video Search across multiple cameras, and filter search results by match score or date and time Two-factor authentication processes for access control applications
Vega Systems Inc. has announced that their Redundancy Management Framework (RMF) software has begun operations at a prominent airport in the Middle East. The airport surveillance software plugin for Milestone XProtect enhances video security. Typically, without the software system, video surveillance down-times at critical infrastructure locations have the potential to create security loopholes. Vega Systems' RMF reduces live video disruption to milliseconds during server failure episodes while simultaneously providing uninterrupted access to all archived footage. This, along with other beneficial features, mitigates the impact of server failures on security overall. Vega Systems' RMF RMF is a novel, few-to-all approach towards enhancing XProtect Recording Server Redundancy through dual recording. A few redundant servers can handle concurrent failures of all primary servers. Offering a live view recovery almost instantaneously following the recording server failure, the system works two orders of magnitude faster than fail-over recording. RMF is a result of collaboration between Vega Systems Inc in San Jose, California, Sunjin Infotech based in Seoul, South Korea, and Milestone Systems' Middle East offices. The product is a plug-in framework for the Canon subsidiary Milestone Systems' XProtect software.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting And Deterring Power Thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch Video Security And Intrusion Detection Systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
To succeed in business, one must be brilliant at one thing. In many cases it’s a skill, such as art, coding, engineering or design. Or that one brilliant attribute can also be a personality trait or a business process. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement - not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners. Developing A Partnership Ecosystem One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world. All this additional partner horsepower is still no guarantee a company will succeed but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilize great products, and less wedded to the concept if it doesn’t prove out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat! Open Platform Matters Producing software takes time, and producing great software takes even longer All of this is not possible, however, if a company produces closed platform software. This is software whose functions can only be changed by the original developers. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone - or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners and may lead to the worst of all complications in a partnership: distrust. Add-On Modules and Intrinsic Scripting When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source) but by add-on modules and intrinsic scripting abilities. Total Integrated Solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution to fulfill the customer’s needs with the minimum of effort. This gives agility, and agility means fast go-to-market abilities. Just what is needed in this fast-moving world. There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented. The partners must have access to training and knowledge sharing. (It does not help to have a system for extending the capabilities of the software if the partners have to guess at the process and the documentation is rudimentary.) Open Access Is Key It is important that the business philosophy is based on openness, giving the partners full access to all relevant information. And openness is a two-way street: By being open for your partners, you also have to be open about their business. A partner might be able to develop a highly sophisticated solution but be unable to market the solution. By building a catalog of partner solutions easily accessible to customers, openness extends to ensure open access to the partners. Openness is not something a business can just tack on to their approach. It has to be in the DNA of the business from the start. In a Harvard Business Review article entitled ‘Predators and Prey: A new ecology of competition,’ JF Moore says: “A business ecosystem, like its biological counterpart, gradually moves from a random collection of elements to a more structured community.” Structured Business Ecosystem Milestone has seen this progression within the company's ecosystem Milestone has seen this progression within the company's ecosystem. They introduced training and certification requirements as part of the partnership success structure, ensuring knowledge is shared and also used in a way that is most mutually beneficial for all involved. Moore also writes: “Every business ecosystem develops in four distinct stages: birth, expansion, leadership and self-renewal.” At present, Milestone and its partners are entering into the ‘leadership’ stage, where video enabling is creating opportunities beyond those offered by a traditional video surveillance system, and into areas that provide additional business benefits to our customers. Video Enabling “A leader must emerge in the ecosystem,” Moore says, “to initiate a process of rapid, ongoing improvement that draws the entire community toward a grander future.” This is the role Milestone has played in leading the industry towards the video enabling phase and redefining the industry’s expectations of what a surveillance system is capable of. In the article, Moore underlines that “executives whose horizons are bounded by the traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies.” Getting Connected Connectors are those people with a wide range of contacts across different social circles In his book The Tipping Point, Malcolm Gladwell describes what he calls ‘The Law of the Few,’ which says: "The success of any kind of social epidemic is heavily dependent on the involvement of people with a particular and rare set of social gifts." This is based on the 80/20 principal, “which is the idea that in any situation roughly 80 percent of the 'work' will be done by 20 percent of the participants." He goes on to identify three types of people with these gifts: Salesmen, who are skilled in persuasion and negotiation; Mavens, who collect and disseminate useful information; and Connectors. Connectors are those people with a wide range of contacts across different social circles who can make introductions and create links between otherwise disparate individuals. Milestone, Key Connector In Physical Security Industry In the wider scheme of things, Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry. Milestone brings together companies who are brilliant in their respective fields and make it easy for them to work together to create a valuable solution for the customer. The company provides the environment for that to occur and work closely with them to ensure that the end result is useful and effective. At Milestone, partners realized that significant investments in education and training was required to create the demand for the company's products and solutions that the conservative physical security industry required. The value of partnership was learnt and the ‘open’ approach adopted, which was a central part of the thinking behind our software. Adopting The Scandinavian Management Model Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry Milestone extended this approach to the entire business model, creating the ecosystem that has been the driving force for success. And while the company embraced the best of the Scandinavian management model, its inclusiveness and encouragement of creativity, they still needed to have the courage to make changes to the business, changes which would ensure the best possible position to take on whatever challenges the future might hold. Milestone Partner Ecosystem Milestone have always worked in a partner-driven business mode. The company from the start was designed to be open and partner oriented. The Milestone partner ecosystem is a fundamental part of its mindset and daily operations. It is one of the major reasons for getting the company to the position where it is today. To be in a company without the partner component would be like cutting the internet and phone cables while reverting to telex and written paper letters! The company would be developing products in the dark, not knowing the demand. Open Business World Today, Milestone's partners are delivering optimal solutions to mutual customers, building a better and open business world with video as a business enhancer. All thanks to the company's open platform and community approach. To have a flourishing partner ecosystem, one must think not as a corporation but in human terms. Because companies don’t think, humans do. In all senses of the word, there is one thing that will contribute more to the success of a partnership than anything else; 'Give before hoping to receive'.
Global provider of digital and analog cable television, broadband internet, and fixed telephony in Serbia, SBB brings nearly a decade of experience in serving the largest customer base in Serbia and Montenegro. SBB is a part of the United Group, which operates in six countries of the former Yugoslavia, with sibling companies Telemach, Total TV, NetTV Plus, and more. Their services bring the most popular news, sports, films, children’s programs, and a variety of other content to their growing audiences. As the world continue to advance in the technological development and use of the Internet, companies like SBB play a crucial role in connecting people with each other and with the rest of the world – in the sharing and enrichment of vast varieties of information. Comprehensive Surveillance Solution As SBB’s business and customer base grow, so does its need to expand and upgrade the video surveillance systems at its numerous retail locations As SBB’s business and customer base grow, so does its need to expand and upgrade the video surveillance systems at its numerous retail locations. Nowadays, security in and around the locations is a given, while more important uses of video surveillance technology is monitoring and analyzing customers coming into the store. With useful analytics on customer numbers, lengths of stay, peak times, and frequency of customer visits, the company will be able to improve human resources management, maximize the efficiency of services in the stores, and minimize security risks, all the while saving on costs. To do this, the company needs to upgrade its video surveillance setup from traditional CCTV systems to automated, smart solutions that not only facilitates state-of-the-art security but also accuracy in people counting, ease of setup, convenient storage, smooth and fast content transfer, and high video quality. It must also be easy to manage for the company’s information and security divisions to do their best at their jobs in this day and age. Netiks-VIVOTEK Collaboration To Equip SBB Netiks is a global distributor of network and communication equipment in Serbia and Montenegro and has been SBB’s partner of choice to bring its surveillance systems to the next level. The main focus of the current stage of upgrades is installing more than 50 of the latest FD8166A ultra-mini fixed dome network cameras cross the company’s retail locations which get 450,000 visitors every month and setting up the VAST 2 software to make everything work in perfect unison. FD8166A Network Cameras VIVOTEK’s people counting solution is a smart-edge video analytic function that delivers real-time, bi-directional counting data On the hardware side, the FD8166A has compact, low profile, yet stylish design that fit right into modern, sleek spaces of the retail locations, both on the perimeters and inside the stores. After the easy transition process from traditional equipment, aided by the built-in IEEE 802.3af compliant PoE technology the camera’s 2-megapixel CMOS sensor started capturing 1920x1080 resolution video at 30 FPS. With WDR enhancement and 3D Noise Reduction that come with the cameras, the information and security staffs can tap into crisp and clear images even in extremely bright and dark environments. The defogging capability further defends against adverse weather conditions. VIVOTEK’s people counting solution is a smart-edge video analytic function that delivers real-time, bi-directional counting data across a large field of view. With this function, counting and monitoring data are directly computed rather than relying on a dedicated computer. SBB applied the 2D people-counting solution to count and monitor its visitors. To date, the solution has achieved 98% accuracy. The system stores the data for 90 days and issues push notifications to relevant operators. To ensure uninterrupted access to information on security and flow, the camera supports H.264 compression, which significantly reduces data size, conserving network bandwidth and enabling real-time monitoring of all camera systems across the company’s retail scene. VAST 2 IP VMS Powering this advanced setup at SBB is also the VAST 2 software, which was also introduced to upgrade SBB’s surveillance system. VAST 2 is VIVOTEK’s top-shelf IP video management software (VMS). Behind the stylish, intuitive UI are a suite of functionalities that make the work of the staff easy and effective. VCA report and Smart Search in particular have driven the company's analytical efficiency to unprecedented heights. As central management software, VAST 2 is designed to oversee all surveillance products, which means that the system will be able to scale to more of the company’s retail locations as well as grow with the company's prosperous future expansion.
How to Choose the Right Solution for Video Data to Enhance Security and Operational IntelligenceDownload