Video Management System
Arecont Vision Costar, global provider of network-based video surveillance solutions, announced the addition of sales and technical resources with two new hires. Matt Bernfeld has been appointed as the Regional Sales Manager for the US Mid-Atlantic Region. Mark Wicinski has joined the company as a Field Application Engineer for the US East and Canada regions. Total Video Solution Products “We are committed to providing outstanding pre- and post-sales support to our customers and partners...
Senstar, a global provider of perimeter intrusion detection systems (PIDS) and video management systems (VMS), is pleased to introduce Kristen Cory as its new Vice President, Sales, North America. Effective January 1, Mrs. Cory has assumed direct responsibility for Senstar’s North American sales organization. “I am excited to join Senstar and I am looking forward to working with the US and Canadian teams to grow the Senstar brand,” said Mrs. Cory. “Senstar’s market...
DW Complete Surveillance Solutions, the provider of digital recorders, surveillance cameras and related management software, announces the launch of our new 2U Blackjack X-Rack server. The DW-BJX2U is the latest addition to our Blackjack family, offering a high-end, high-capacity solution for enterprise scale applications. The Blackjack X-Rack comes with DW Spectrum IPVMS server installed for setup and configuration, and is recommended as a complete solution with one or more Blackjack NAS devic...
Milestone Systems, the number one global provider of open platform networked video management systems, has released Device Pack 10.1a for partners and customers using Milestone XProtect video solutions. The latest Device Pack offers new firmware support for partners Axis, FLIR Systems, Hanwha Techwin, Honeywell and MOBOTIX. New features include support for SRTP (Secure Real-time Transport Protocol), a feature that ensures that camera video streams are received via secure end-to-end encrypted tr...
Johnson Controls has introduced exacqVision video management system (9.8), which includes several new enhancements that improves users’ ability to store, analyze and search for video. exacqVision 9.8 VMS Most notably, the release supports exacqVision Cloud Drive storage, a subscription-based solution which provides an easy way to store, access, and search critical surveillance video in the cloud. exacqVision Cloud Drive storage helps security and IT teams lower their Total Cost of Owners...
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced a number of new products and innovations, led by the company’s new Facial Recognition camera. 3xLOGIC VISIX Facial Recognition Camera A special purpose, low cost, dual lens 2MP camera for instant face detection, identification, and notification of persons of interest (POI). Using camera-based analytics and 3xLOGIC’s exclusive Facial Recognition (F...
Milestone Systems, globally-renowned open platform company in networked VMS, released its Device Pack 10.0a in October this year and now supports the MOBOTIX MOVE camera series. MOBOTIX MOVE is an independent product line providing customers everything from a single source. “MOVE” stands for the use of mechanically moving parts in the cameras, meaning that MOBOTIX have parted with their previous product policy of only offering decentralized video systems on the market. The MOBOTIX MOVE product line is the first motorized devices and first ONVIF-based camera line from MOBOTIX. “We’re glad to be supporting the first ONVIF compliant products introduced by MOBOTIX as we believe this will enable us a faster release to market going forward,” said VP (Products), Jesper Just Jensen, Milestone Systems. Device Pack 10.0a With the Device Pack 10.0a, Milestone Systems also supports new firmware for MOBOTIX’ Mx6 camera series With the Device Pack 10.0a, Milestone Systems also supports new firmware for MOBOTIX’ Mx6 camera series. Mx6 cameras use a powerful CPU that delivers up to 34 frames per second in full HD. This allows for even better capture of quick movements. The camera line has more capacity for software applications such as 3D motion analysis and license plate capture in the camera. "Thanks to our market opening strategy, Milestone Systems is today one of the largest technology partners of MOBOTIX AG. Due to the growing global demand for our cyber-secure premium cameras, we are very pleased to announce the release of the Device Pack 10.0a, which now enables the integration of the entire MOBOTIX camera world into the Milestone VMS: our Mx6 IoT series as well as the latest MOVE cameras,” says Philipp Helmes, MOBOTIX Product Manager for Integration Solutions. IP-Based Physical Security Solutions Milestone Systems now supports more than 7,000 devices, and 40% of Milestone Systems’ drivers are now integrated through ONVIF, an open industry forum that provides and promotes standardized inter-faces for effective interoperability of IP-based physical security products.
Genetec Inc. (“Genetec”), a technology provider of unified security, public safety, operations, and business intelligence solutions announced that Security Center Omnicast, its video management system (VMS), received the UL 2900-2-3 Level 3 cybersecurity certification. A long-standing advocate for cybersecurity and the ‘Security of Security’, Genetec participated in the UL evaluation process, which today validates its resilience against cyber-attack with the highest Level 3 (L3) assessment certification. UL’s Cybersecurity Assurance Program (CAP) tests network-connectable products and systems against established criteria from the UL 2900 series of cybersecurity standards. Following a standardized methodology, the UL 2900-2-3 standard applies a three-tiered evaluation model, ranking with an increasing level of security for each tier. Three Levels Of Certification The Level 3, which has been achieved by Security Center Omnicast, includes a series of checks including fuzz testing, code and binary analysis, penetration testing, risk assessment methodology, and vulnerability testing. Genetec ranks at the top in its industry for cybersecurity resilience and trust""UL is a globally recognized safety and security solutions company dedicated to promoting safe environments. The UL 2900-2-3 certification was created with three possible levels of certifications to test physical security systems for cybersecurity integrity,” said Chris Hasbrook, UL’s Vice President & General Manager, Building & Life Safety Technologies Division. “After passing our most challenging testing processes, Genetec ranks at the top in its industry for cybersecurity resilience and trust,” added Hasbrook. Validating The ‘Security Of Security’ Initiative “Many security companies claim to follow cybersecurity best practices, noting that their software and systems are ‘hardened’ against cyber-attacks. By participating in this certification process, our Level 3 ranking proves and validates the Genetec ‘Security of Security’ initiative—which we have been sharing with our channel partners, integrators, press, and end-users for many years now,” said Mathieu Chevalier, Lead Security Architect, Genetec Inc. “We’ve always taken an active approach to architecting our unified security solutions with intelligent and fastidious attention to cybersecurity,” added Chevalier.
The Board of Directors of Digital Systems Corporation, the parent company of Galaxy Control Systems, a provider of integrated access control and security solutions, announces the appointment of Rick Caruthers to the position of President at Galaxy Control Systems. Effective immediately, this appointment reflects the company’s long-term planning and succession strategies. “Rick has essentially been working in the capacity as president of Galaxy Control Systems for the past several years, and with this appointment will be able to execute his vision and goals for the company,” said Robert Laughlin, Chairman of Digital Systems Corporation. Extensive Experience “After 17 years of proven service and dedication to Galaxy Control Systems, we are most confident that Rick is the person best suited to be at the helm of this organization moving forward.” Mr. Caruthers’ extensive experience and proven track record in the professional security industry spans over 28 years, where his career was initiated on the integration side of the business then migrated into the manufacturing space. I am extremely honored with the Board’s decision to entrust me with the continued expansion and growth of Galaxy Control Systems" Over 17 years to date, Mr. Caruthers has risen through the ranks in positions ranging from Regional Sales Manager, Government Sales Director, Vice President of Sales, Executive Vice President, to his current role as President of Galaxy Control Systems. “I am extremely honored with the Board’s decision to entrust me with the continued expansion and growth of Galaxy Control Systems,” said Rick Caruthers, President, Galaxy Control Systems. Exceptional Customer Service “There are so many exciting opportunities that lie ahead for Galaxy as we continue to evolve and supplement our portfolio of on-premise based and cloud access control solutions, and expand internationally. And we will maintain our focus on the core values that have propelled Galaxy Control Systems over the years, including exceptional customer service and outstanding quality hardware and software offerings that will remain designed, developed and manufactured in-house in the USA.” The Galaxy Control Systems portfolio is centered on the company’s powerful System Galaxy v11.02 and Cloud Concierge access control platforms, which accommodate the latest reader technologies and technology trends, as well as holistic VMS integration. The versatile offering provides resellers and users with the unique ability to implement the access control solution that best fits their specific needs and budget.
OnSSI and Oncam have partnered to seamlessly integrate the companies’ industry-leading VMS and panoramic camera solutions. The integration of Oncam’s Evolution 12 Series and Evolution 180 outdoor and indoor panoramic cameras with OnSSI’s recently released Ocularis 5.6 VMS provides a highly efficient means to further improve situational awareness and reduce overall costs. OnSSI-Oncam Integration “This latest integration leverages the extensive camera management and control capabilities of Ocularis with the performance and wide area surveillance capabilities of Oncam’s industry-leading panoramic imaging solutions,” said Ken LaMarca, VP of Sales & Marketing, OnSSI. “OnSSI recognized the myriad advantages of panoramic technology early on and continues to support the implementation of these wide area imaging solutions for enhanced general surveillance applications.” Oncam’s Evolution 12 (12MP) and Evolution 180 (6MP) series fisheye cameras integrate with OnSSI’s Ocularis VMS to provide high resolution 360° and 180° views Oncam’s Evolution 12 (12MP) and Evolution 180 (6MP) series fisheye cameras integrate with OnSSI’s Ocularis VMS to provide high resolution 360° and 180° views respectively. Dewarping is performed on live and recorded images using a new plug-in for Ocularis, with the ability to view a variety of pre-configured camera views with electronic PTZ control. Ocularis 5.6 VMS OnSSI’s newly released Ocularis 5.6 VMS enhances overall performance and operator functionality, delivers cybersecurity enhancement through heightened system security with fortified dual authentication measures, and provides enhanced mobile and web access capabilities. These latest improvements combine to further empower users with a best-in-class VMS solution and experience powered by OnSSI Ocularis’ high performance engine. “Partnering with OnSSI makes it easy to implement Oncam’s Evolution 12 Series and Evolution 180 outdoor and indoor panoramic cameras on their powerful Ocularis VMS platform, providing users with an extremely efficient and cost-effective imaging solution,” said John Haspel, Director of Technology Programs, Oncam. “In addition to increasing overall situational awareness, users can significantly reduce their Total Cost of Operation (TCO) by deploying fewer cameras and eliminating all of the related equipment, installation and maintenance expenses related to them.”
Doug Dickerson has joined Razberi Technologies as CEO to propel its growth in the video surveillance security arena. He brings more than 25 years of technology industry experience to the role. Founder and former CEO Tom Galvin has been appointed chief product officer to spearhead continued development of the technology he originally invented. “I’m excited to be joining Razberi at this opportune time, because we see in the news every day the importance of securing our digital and physical infrastructures from hackers. Companies are also facing significant challenges managing video surveillance more effectively,” said Dickerson. Dickerson will focus on expanding sales of Razberi solutions across geographies and vertical markets such as energy, finance, city surveillance“Razberi has developed a unique set of solutions that enterprises across the globe are using to monitor their infrastructures and automatically secure their video surveillance and Internet of Things (IoT) devices.” Expanding Sales Of Razberi Solutions Dickerson will focus on expanding sales of Razberi solutions across geographies and vertical markets such as energy, finance, city surveillance, and more. These types of customers increasingly depend on Razberi’s data center, edge, and rugged applications to secure their critical assets and scale with them. The company sells through a growing list of security integrators and value-added resellers. “The addition of Doug as CEO gives us one of the industry’s best management teams and shows that Razberi continues to attract top talent to our team,” said Galvin. “His experience will be invaluable, because the growth in video surveillance and IoT devices has organizations facing security vulnerabilities and manageability challenges they’ve never experienced before. I look forward to working with Doug to help more customers take advantage of our technology.” Implementing Cybersecurity Best Practices CameraDefense hardens IP cameras, networks, and other IoT devices, defends the VMS, and provides 24x7 cyber threat monitoringBuilding upon Galvin’s invention of the Razberi ServerSwitchIQ appliance, Razberi has continued to innovate with award-winning products such as Razberi CameraDefense. This solution enables security pros to consistently implement automated cybersecurity best practices without requiring additional firewall products and special expertise. CameraDefense hardens IP cameras, networks, and other IoT devices, defends the video management system (VMS), isolates the camera network, and provides 24x7 cyber threat monitoring. Doug Dickerson has held leadership roles in both start-up and large public companies. Most recently, he served as CEO of Coban Technologies, a video SaaS company offering artificial intelligence-based mobile video systems. Before that, Doug was president of Danaher Tektronix Communications, a network management software and hardware company.
ONVIF, global standardization initiative for IP-based physical security products held its annual membership meeting in early November this year, with an overview of important activities of 2018 and perspective on the year ahead. Attendees heard presentations on the final release of Profile T in 2018, an advancement which represents how ONVIF keeps pace with technological advancements that affect product development and interoperability between IP-based physical security products. Profile T For Advanced Video Streaming In an acknowledgement of its 10th anniversary, ONVIF chairman, Per Björkdahl highlighted the forum’s achievements over the past decade, including an overview of the six ONVIF profiles, with emphasis on the newly released Profile T for advanced video streaming. Collectively, the profiles provide support for the more than 10,000 conformant products that are increasingly included in various bid and specification processes in projects around the world. Björkdahl also cited the continued involvement of ONVIF as part of the work of the International Electrotechnical Commission’s TC79 for international standardization. ONVIF also recognized the contributions of four individuals from various ONVIF technical committees for their work on different profiles and committees. Fredrik Svensson of Axis and Dora Han of Hikvision were recipients of the ONVIF award, which acknowledges individuals and companies who have made significant contributions to ONVIF. As chairman of the Profile T Working Group, Svensson was a leading force in the development and successful final release of the Profile T specification. Han received the award for her extensions to the specification, and for supporting the development of other members’ extensions to the specification. 2018 ONVIF Distinguished Service Awards Recipients One of two 2018 ONVIF Distinguished Service Awards was given to Baldvin Gislason Bern of Axis One of two 2018 ONVIF Distinguished Service Awards was given to Baldvin Gislason Bern of Axis for his role in developing and proofing the evolution concept as chair of the Technical Services Device Test Tool Evolution. Joining him in receiving this award is Dr. Hasan Timucin Ozdemir of Panasonic, who served as chairman from 2009-2018 of the ONVIF Video Enhancement Working Group, which is responsible for formulating and prototyping new features for the ONVIF specification. “All of our honorees have shown their significant and long-term commitment to the organization as a whole, and in turn have directly and positively impacted the work of ONVIF,” said Björkdahl. “The success of our organization would not be possible without the innovative contributions and hard work of our members, and for that, we say thank you.” Defining Video Surveillance And Access Control Standards ONVIF Technical Committee Chairman, Hans Busch of Bosch, spoke to members about the specification development roadmap and its alignment to the standardization activities within the IEC TC 79 working groups for video surveillance and physical access control standards. Technical Services Committee (TSC) Chair Andreas Schneider of Sony gave an overview of the committee’s work on new and existing profiles, client and device test tools, updates to the conformance process and tools and Developers’ Plugfests. Founding members Axis, Bosch and Sony automatically retain seats on the Steering, Technical and Technical Services CommitteesONVIF Communication Committee Chair, Tim Shen of Dahua provided a recap of ONVIF communication efforts in 2018, with a continued focus on market education about the specific profiles through presence at industry events and media activity. He also reported on the success of the first ever ONVIF Open Source Spotlight Challenge that took place earlier this year. The results of the annual elections for committees of ONVIF were announced by Kevin Schader, ONVIF Executive Director. Re-elected to the ONVIF Steering Committee were Mayur Salgar of Honeywell and Stuart Rawling of Pelco by Schneider Electric. For the Technical Committee, Hanwha Techwin’s Sujith Raman, Pelco by Schneider Electric’s Steve Wolf, and Tyco Security Product’s Stephen Serplus were re-elected, while Hikvision’s Dora Han joined the committee as a new member. Bob Dolan of Anixter and Giri Guntipalli of Honeywell were re-elected to the Technical Services Committee, along with new member Marwan Obeidat of Pelco by Schneider Electric. Tim Shen of Dahua, Jens Berthelsen of Hikvision and Xinming Kang of Honeywell were re-elected to the ONVIF Communication Committee, while Cathy Zhou of Huawei joined the committee as a new member. Founding members Axis, Bosch and Sony automatically retain seats on the Steering, Technical and Technical Services Committees. IP-based Physical Security Solutions Expert Founded in 2008, ONVIF is a leading and well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system and access control companies and more than 10,000 profile conformant products. ONVIF offers Profile S for streaming video; Profile G for recording and storage; Profile C for physical access control; Profile Q for improved out-of-the-box functionality, Profile A for broader access control configuration and Profile T for advanced streaming. ONVIF continues to work with its members to expand the number of IP interoperability solutions that ONVIF conformant products can provide.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Video surveillance systems have proven to not only be a deterrent to crime, but are also now being used to collect data points to actually help detect abnormal behaviours which can alert authorities of potentially evolving situations. In either case, recorded video is critical for investigations to provide all but irrefutable evidence to prove or disprove that an incident took place and the identity of the individuals involved. Sounds like a pragmatic approach that’s quite simple in theory. Not so when large numbers of cameras are deployed across multiple sites, and perhaps multiple users within the framework of a centrally managed system. Examples include a mass transit system, large university campus, mega malls, airports, gaming resorts… and more. Video Management Systems (VMS) have evolved from simply facilitating camera and recording management to a more sophisticated role Aside from the challenges presented with multiple camera feeds, recorders and control locations, and assuming that all system components are operating as they should; investigators need the right tools to find the footage they need. Today’s advanced Video Management Systems (VMS) have evolved from simply facilitating camera and recording management to a more sophisticated role within a larger video surveillance and security system ecosystem. Coordinated Response Efforts From monitoring and tracking a live situation within a facility or across a municipality, to coordinating response efforts, through forensic investigations, new VMS capabilities provide a holistic solution that improves overall protection and contributes to business intelligence. Among these capabilities, VMS forensic tools are meeting the needs of important investigation activity – both during and after an incident. For instance, while monitoring live video feeds, users can perform a basic investigation on individual cameras including playback, and digital and optical pan-tilt-zoom (for PTZ cameras), without the need to switch to a dedicated investigation mode. New VMS capabilities provide a holistic solution during the investigation process Advanced VMS solutions, such as OnSSI’s Ocularis, provide investigators with a multitude of options for accessing and enhancing video data to document incidents. Some of the most notable toolsets available include: Switching Between Live And Browse Modes As opposed to the Live Monitoring view, which displays multiple cameras asynchronously (i.e. different panes can show playback, paused and/or live cameras simultaneously), the Browse mode displays all cameras synchronously. This provides insight into events taking place at different locations at the time an incident occurred, allowing investigators to easily track an incident as it moves from camera to camera. Scalable Kinetic Timeline Any video recordings triggered due to motion detection can be automatically queued to speed up the investigation processThis provides a clear overview of recorded motion events over extended periods of time with the ability to scale the timeline to show shorter or longer time intervals. Color-coded segments in the timeline indicate whether video has been recorded at a certain time to the minute, and whether motion was detected during those periods. Any video recordings triggered due to motion detection can be automatically queued to speed up the investigation process. Once investigators isolate recorded video of interest using any of these preferences, one or multiple cameras can then be easily viewed. Synchronous Playback Synchronous playback displays all recorded video from all displayed cameras on the timeline into a Browse mode regardless of which video source is selected. This provides investigators with a comprehensive overview and fast access to all recorded video during the time intervals that an event occurred. One-Click Snapshot And Motion Detection One-click snapshot allows investigators take JPEG image snapshots of any recorded video during the review process. These snapshots have multiple applications including identifying individuals of interest. Motion detection eliminates the need to manually review volumes of recorded data Motion Detection expedites the event detection process by eliminating the need to manually review volumes of recorded video data. Motion can be detected within a defined zone, and the detection process can be configured to the exact parameters of the targeted behavior or movement. The desired time intervals to search for motion detection can be preset by operators to expedite searches. The percentage of changed pixels can also be set when searching by motion detection to match the nature of the targeted movement. For example, high value setting would be used to detect a vehicle entering a detection region down to the size of a single parking space, eliminating false detections of persons walking in the parking lot. Additionally, parameters can be set for pixel color and brightness to compensate for the amount of noise caused by ambient lighting, shadows, reflections and more.Motion Detection expedites the event detection process by eliminating the need to manually review volumes of recorded video data Slicing Capabilities Time Slicing enables users to easily and quickly access video of an incident by automatically generating equal-interval thumbnails of a specific camera view. Once the incident is evident in one of the thumbnails, investigators can create sets of thumbnails of increasingly smaller time intervals to determine the exact moment an incident began and/or ended. Motion Slicing is similar to a Time Slicer, but enables instant detection of motion events, adjusted for the duration of the event and level of motion. Alert Generators Alerts generated by the recording component in response to events such as motion detection or generic events received from external systems (e.g. access control, emergency phones, etc.) may also be used in Time Slicing. Event Sequencing provides messages generated by the recording components indicating a sequence of events. Each sequence may include one or more instances of motion, or alerts received from external sources, making this method more suitable for accessing complex incidents. Combined with the inherent video management and control capabilities provided by best in breed VMS solutions, these powerful new embedded investigation tools allow users with large surveillance systems to fully leverage the power of their investment to easily and comprehensively investigate events.
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video Compression Technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF Physical Security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardization organizations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 Compression Formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognizes the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
A video surveillance system installed by Daemon Fire & Security, based on an AMG Systems-supplied Ethernet switch network, is helping to protect the UK’s first new inland rail freight hub for over a decade: iPort Rail. The iPort project near Doncaster, South Yorkshire, offers 6 million square feet of space across 337 acres. The massive park is already home to enormous distribution facilities for companies like Amazon, CEVA, Fellowes and Lidl, and its occupancy is set to expand in the coming years. The newly developed iPort Rail terminal, located on its own 30-acre site within iPort, is connected to the electrified East Coast Main Line via the South Yorkshire Joint Line. It offers integrated access to iPort, meaning occupiers can directly approach the rail terminal using their own specialist vehicles on the facility’s private roads. Implementing Video Surveillance System The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System"The terminal can handle up to six trains a day, operating 24-hours, six days a week. Each train can be the maximum UK length of 775m. iPort Rail has an 800m reception siding and two 400m handling sidings, with storage capacity for 1,500 shipping containers. With iPort Rail playing such a crucial role in developer Verdion’s iPort transportation strategy, there was a pressing need to ensure that the terminal has effective ongoing video monitoring. Buckingham Group Contracting Ltd was responsible for the work on iPort Rail, and they worked with CCTV specialist Daemon Fire & Security to implement the video surveillance system for the perimeter of the terminal. Chris Tattersall, Technical Director at Daemon, said the system runs on a redundant fiber optic network. “AMG Systems assisted us with the fiber optic network design.” Tattersall said. “The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System. The cameras are on towers from Altron, and the networking is from AMG.” Cameras For Intrusion Detection The cameras utilize Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through"There are 32 cameras mounted on 18 towers around the rail terminal site perimeter. Tattersall explained that the cameras are primarily used as detectors to monitor for trespass or intrusion. “The cameras utilize Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through,” he said. “The cameras are monitored live by the 24-hour security team in the site gatehouse. The system is networked using equipment and expertise from AMG Systems. Daemon and AMG designed a failsafe fiber optic ring system together,” Tattersall said. “From the gatehouse there’s a fiber optic cable which goes and loops around every camera tower and goes back to the gatehouse,” he said. “It’s a redundant ring, so if they get a fault or deliberate cut, everything will carry on working. We’re using industrial PoE Ethernet switches in the towers so they can withstand low temperatures, which is particularly important during cold winters in a relatively open site like this.” Operative In Extreme Temperatures The industrial managed switches are able to operate in temperatures ranging from -40 deg C to 75 deg CThe industrial managed switches, 20 of which were used in this project, are able to operate in temperatures ranging from -40 deg C to 75 deg C and are designed for medium to large network environments to strengthen network connections. AMG Business Development Director Sara Fisher said AMG was thrilled to be involved in this project. “We were delighted to be asked by Daemon to contribute our design and product expertise to help protect this important and growing freight hub,” she said. Daemon’s video surveillance project took around 10 weeks in total, including implementation and commissioning. It was handed over on time and installed on target. Tattersall said the smooth running of the project could be put down to Daemon’s good working relationship with contractor Buckingham, distributor Pro-Vision, networking and transmission expert AMG Systems, and product suppliers Bosch and Altron.
Senstar, a global provider of video management and perimeter intrusion detection solutions, announces that its Symphony video management software and Face Recognition video analytic are helping to protect Cosmo Music. Working with integrator Northern Alarm Protection (NAP) Ltd., Richmond Hill, Ontario, Canada-based Cosmo Music selected Senstar after comprehensive research and testing to replace its 20-year-old analog video system. “Senstar Symphony delivers an all-in-one solution for video management, video analytics, perimeter intrusion detection system integration, and alarm management for deployments of all sizes,” said Justin Shorn, Senstar’s Vice-President of Product Management. “We are glad that Symphony’s core features and ease-of-use, along with our Face Recognition analytic, were able to meet Cosmo Music’s needs.” Flag Suspicious Customers Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment and is a powerful tool for retail loss prevention. At Cosmo Music, the analytic is used to identify and flag suspicious customers and provide real-time alerts if a flagged individual enters the store, with the goal to prevent theft. “(During testing) one of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Rudi Brouwers, Vice-President and COO of Cosmo Music. “That’s what sold me on it.”
Vega Systems Inc. has announced that their Redundancy Management Framework (RMF) software has begun operations at a prominent airport in the Middle East. The airport surveillance software plugin for Milestone XProtect enhances video security. Typically, without the software system, video surveillance down-times at critical infrastructure locations have the potential to create security loopholes. Vega Systems' RMF reduces live video disruption to milliseconds during server failure episodes while simultaneously providing uninterrupted access to all archived footage. This, along with other beneficial features, mitigates the impact of server failures on security overall. Vega Systems' RMF RMF is a novel, few-to-all approach towards enhancing XProtect Recording Server Redundancy through dual recording. A few redundant servers can handle concurrent failures of all primary servers. Offering a live view recovery almost instantaneously following the recording server failure, the system works two orders of magnitude faster than fail-over recording. RMF is a result of collaboration between Vega Systems Inc in San Jose, California, Sunjin Infotech based in Seoul, South Korea, and Milestone Systems' Middle East offices. The product is a plug-in framework for the Canon subsidiary Milestone Systems' XProtect software.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control center in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting And Deterring Power Thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch Video Security And Intrusion Detection Systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
To succeed in business, one must be brilliant at one thing. In many cases it’s a skill, such as art, coding, engineering or design. Or that one brilliant attribute can also be a personality trait or a business process. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement - not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners. Developing A Partnership Ecosystem One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world. All this additional partner horsepower is still no guarantee a company will succeed but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilize great products, and less wedded to the concept if it doesn’t prove out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat! Open Platform Matters Producing software takes time, and producing great software takes even longer All of this is not possible, however, if a company produces closed platform software. This is software whose functions can only be changed by the original developers. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone - or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners and may lead to the worst of all complications in a partnership: distrust. Add-On Modules and Intrinsic Scripting When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source) but by add-on modules and intrinsic scripting abilities. Total Integrated Solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution to fulfill the customer’s needs with the minimum of effort. This gives agility, and agility means fast go-to-market abilities. Just what is needed in this fast-moving world. There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented. The partners must have access to training and knowledge sharing. (It does not help to have a system for extending the capabilities of the software if the partners have to guess at the process and the documentation is rudimentary.) Open Access Is Key It is important that the business philosophy is based on openness, giving the partners full access to all relevant information. And openness is a two-way street: By being open for your partners, you also have to be open about their business. A partner might be able to develop a highly sophisticated solution but be unable to market the solution. By building a catalog of partner solutions easily accessible to customers, openness extends to ensure open access to the partners. Openness is not something a business can just tack on to their approach. It has to be in the DNA of the business from the start. In a Harvard Business Review article entitled ‘Predators and Prey: A new ecology of competition,’ JF Moore says: “A business ecosystem, like its biological counterpart, gradually moves from a random collection of elements to a more structured community.” Structured Business Ecosystem Milestone has seen this progression within the company's ecosystem Milestone has seen this progression within the company's ecosystem. They introduced training and certification requirements as part of the partnership success structure, ensuring knowledge is shared and also used in a way that is most mutually beneficial for all involved. Moore also writes: “Every business ecosystem develops in four distinct stages: birth, expansion, leadership and self-renewal.” At present, Milestone and its partners are entering into the ‘leadership’ stage, where video enabling is creating opportunities beyond those offered by a traditional video surveillance system, and into areas that provide additional business benefits to our customers. Video Enabling “A leader must emerge in the ecosystem,” Moore says, “to initiate a process of rapid, ongoing improvement that draws the entire community toward a grander future.” This is the role Milestone has played in leading the industry towards the video enabling phase and redefining the industry’s expectations of what a surveillance system is capable of. In the article, Moore underlines that “executives whose horizons are bounded by the traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies.” Getting Connected Connectors are those people with a wide range of contacts across different social circles In his book The Tipping Point, Malcolm Gladwell describes what he calls ‘The Law of the Few,’ which says: "The success of any kind of social epidemic is heavily dependent on the involvement of people with a particular and rare set of social gifts." This is based on the 80/20 principal, “which is the idea that in any situation roughly 80 percent of the 'work' will be done by 20 percent of the participants." He goes on to identify three types of people with these gifts: Salesmen, who are skilled in persuasion and negotiation; Mavens, who collect and disseminate useful information; and Connectors. Connectors are those people with a wide range of contacts across different social circles who can make introductions and create links between otherwise disparate individuals. Milestone, Key Connector In Physical Security Industry In the wider scheme of things, Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry. Milestone brings together companies who are brilliant in their respective fields and make it easy for them to work together to create a valuable solution for the customer. The company provides the environment for that to occur and work closely with them to ensure that the end result is useful and effective. At Milestone, partners realized that significant investments in education and training was required to create the demand for the company's products and solutions that the conservative physical security industry required. The value of partnership was learnt and the ‘open’ approach adopted, which was a central part of the thinking behind our software. Adopting The Scandinavian Management Model Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry Milestone extended this approach to the entire business model, creating the ecosystem that has been the driving force for success. And while the company embraced the best of the Scandinavian management model, its inclusiveness and encouragement of creativity, they still needed to have the courage to make changes to the business, changes which would ensure the best possible position to take on whatever challenges the future might hold. Milestone Partner Ecosystem Milestone have always worked in a partner-driven business mode. The company from the start was designed to be open and partner oriented. The Milestone partner ecosystem is a fundamental part of its mindset and daily operations. It is one of the major reasons for getting the company to the position where it is today. To be in a company without the partner component would be like cutting the internet and phone cables while reverting to telex and written paper letters! The company would be developing products in the dark, not knowing the demand. Open Business World Today, Milestone's partners are delivering optimal solutions to mutual customers, building a better and open business world with video as a business enhancer. All thanks to the company's open platform and community approach. To have a flourishing partner ecosystem, one must think not as a corporation but in human terms. Because companies don’t think, humans do. In all senses of the word, there is one thing that will contribute more to the success of a partnership than anything else; 'Give before hoping to receive'.
How to Choose the Right Solution for Video Data to Enhance Security and Operational IntelligenceDownload