Video Management System
Interface Security Systems, a managed service provider delivering business security, managed network, and business intelligence solutions to distributed enterprises, announced it is now offering interactive remote video monitoring service with automated voice-down options to help its retail and restaurant customers promote social distancing and mask-wearing guidelines on their premises. A growing number of retailers and restaurants are reporting increased incidents of agitated customers and in-...
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announces a new line of NVRs (Network Video Recorders) that include its powerful Wisenet WAVE video management software (VMS). Designed for small to medium-sized video surveillance installations, the new, affordable NVRs deliver a complete video management and recording solution in a rack mountable chassis with no need to install a separate server. With a focus on ease of use and installation, the 8 channel...
Senstar, a pioneer in video management and perimeter intrusion detection solutions, is pleased to announce the release of Senstar Symphony 7.4.1 featuring support for PostgreSQL high availability. The award-winning Senstar Symphony delivers an all-in-one solution for video, security, and information management. Senstar Symphony works with cameras from all major manufacturers, scales to deployments of any size, and is easy to use and configure. Video management software With built-in support f...
IDIS, a global security company that designs, develops and manufactures surveillance solutions for a wide range of commercial and public sector markets, has announced that the company is proud to be participating in the Global Security Exchange Plus (GSX+) virtual exhibit. Global Security Exchange Plus While most of the industry trade shows have had to opt for online experiences, GSX+ promises to deliver the high caliber of expertise, influence, and resources synonymous with this flagship ASIS...
In today’s fraught times, business continuity and success hinges on how you manage the visitors to your company. By prioritizing safety and security, and coupling them with top-notch attention and customer service, you win loyalty and gain a reputation that will serve you in years to come. An excellent way to accomplish this is by identifying and implementing the best visitor management system for your company. And visitor management systems go beyond ensuring the safety of your visitors...
The road network is under increasing pressure due to the sheer weight of traffic, and its bridges and water locks are no exception. In view of the importance of free-flowing traffic and the safety of such structures, they undergo continuous modernization. One such modernization is CCTV: by incorporating video surveillance into a security system, end-users can monitor and anticipate what’s happening at a certain location in real-time. This increases the efficiency and safety of such object...
New Wisenet WAVE PoE NVRs introduced by Hanwha Techwin are designed to provide a cost-effective way for users to be able to take advantage of the highly popular Wisenet WAVE video management software (VMS), without having to install a server. The 8 channel Wisenet WRN-810 and 16 channel WRN-1610S NVRs are equipped with a powerful processor to provide users with a seamlessly integrated and optimized way of utilizing the latest version of the feature-rich VMS. The WRN-810 stores up to 12 terabytes of data with the help of 2 internal SATA HDDs and the WRN-1610S stores up to 24 terabytes of data via 4 SATA HDDs. “In addition to the immediate benefit that the Wisenet WAVE VMS embedded in the NVRs is ready to be used out-of-the-box, we also offer system integrators peace of mind in knowing they can rely on us to provide one-stop customer support for the combined hardware and software solution,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Licensing The cost of deploying the NVRs is further reduced by built-in PoE switches which provide an installation time-saving method A key objective of introducing the two new NVRs has been to minimize the total cost of owning Wisenet WAVE and Hanwha Techwin has achieved this by negating a requirement to purchase, install, house and maintain a server normally needed to run the software. Users are also able to take advantage of flexible ‘future ready’ licensing arrangements whereby they only have to initially purchase licenses for half the respective NVR’s channels and then only pay for the remaining licenses, if and when required in the future. The cost of deploying the NVRs is further reduced by built-in PoE switches which provide an installation time-saving method of supplying power to connected cameras. Operator friendly Intended to meet the needs of small to medium-sized video surveillance projects, with an emphasis on a simplified user experience, Wisenet WAVE features an intuitive ‘drag & drop’ tool which makes it extremely easy for operators to set up a display of live and recorded images on a single screen or video wall, with customizable layouts and sizes. This tool is supported by a ‘Layout-as-an-Action’ feature, which triggers a predefined screen layout to automatically open when an event occurs, whilst a wide range of Smart search options, including keyword, calendar and time-slice search, enable operators to quickly retrieve recorded video of specific incidents. Adding to ease of use, a virtual PTZ enables operators with just a few simple clicks of a mouse, to zoom in to see close up detail of any suspicious activity. WAVE 4.1 The 2 NVRs are embedded with the latest version of Wisenet WAVE 4.1, which is equipped with a long list of new practical features including Push notifications of user-defined alarm events which can be sent to mobile devices, and embedded camera web pages that enable operators to manage the settings of connected cameras without having to open a separate browser window. An enhanced Smart search allows users to set-up an Analytics Event Region of Interest (ROI), to narrow a search to a specific area of a field of view, while integration with Wisenet AI cameras enables the attributes of classified objects or people to be displayed on recorded vi Users are also able to forensically search for specific objects or people by filtering the recorded metadata. Wisenet AI cameras “The availability of these 2 new affordable NVRs, means even small shops and offices will now be able to take advantage of Wisenet WAVE user-friendly features to quickly retrieve and review recorded video of any incidents, as well as view live images,” said Uri Guterman. “Although Wisenet WAVE, subject to a minimum specification, will run on virtually any server, embedding the software on the NVRs means installation time is minimized and users can expect to enjoy a robust, cyber secure and optimized recording solution which offers a high level of reliability and performance.”
Security at educational institutions is a highly sensitive issue. No matter whether it is a kindergarten, school, university or private learning institute, concentrated learning requires a harmonious environment to focus on the essentials. High-end video technology can make a decisive contribution to protecting students from any kind of disturbance or untoward incident. Safeguarding schools In the past, schools and universities have repeatedly been the target of active shooter and terrorist attacks. The primary goal of educational institutions, owing to this constant threat, is to prevent ‘unauthorized access’ to the school grounds and to allow only authorized visitors. Further potential danger exists internally, such as cases of vandalism, bullying and violence by or among students, which are issues that may arise sometimes in school life. Of course, early smoke and fire detection are also important components for a safe learning and living environment. MOBOTIX video security solutions MOBOTIX has video security solutions for the education & science sector in its portfolio" In addition, the COVID-19 pandemic has brought new health protection requirements into focus. Video technology can provide reliable support in all these scenarios. "MOBOTIX has video security solutions for the education & science sector in its portfolio that makes school, learning and studying safe. These solutions are already in use around the world and have proven themselves to be very effective," said Thomas Lausten, Chief Executive Officer (CEO) of MOBOTIX AG. With its unique product portfolio consisting of hardware, software, services and intelligent partner solutions, MOBOTIX can precisely map the requirements of various industries. The latest technologies can be used to protect people, facilities and infrastructure in schools, universities or private educational institutions. Access and entry control Video technology from MOBOTIX helps to prevent unauthorized access and regulate access to buildings, or individual areas in a targeted manner. In addition, doors can be opened totally contactlessly, for example using RFID chip cards, access codes and identification of authorized personnel, based on face recognition technology. An overview in real time is possible and also helps in emergency situations, e.g. during evacuations to find out whether and which persons are where. At entrances and parking lots, vehicles can be automatically registered via the license plate and compared with databases. The identifying video technology can thus, efficiently restrict access to authorized vehicles or persons. MOBOTIX 7 open video system platform Using the new open video system platform, MOBOTIX 7, numerous camera apps can be used for intelligent video analysis. Among other things, the applications can register, for example, ownerless luggage, stolen furnishings, can track down suspicious persons, count people, recognize overcrowding situations or alert when one or more virtual blocking lines are crossed for burglary protection. The robustness of the MOBOTIX hardware also protects the video technology of MOBOTIX itself against vandalism. The use of thermal imaging cameras is also recommended in special areas. For example, an email can be sent to the building maintenance department if the system, which reacts to invisible heat radiation, detects increasing overheating in an IT server room before a dangerous fire breaks out. Campus security and perimeter protection The MOBOTIX M16 and M73 offer several simultaneous sensors in a robust, weatherproof design For outdoor applications, the MOBOTIX M16 and M73 offer several simultaneous sensors in a robust, weatherproof design. The wide range of interchangeable sensor modules can be configured to meet the exact requirements of the educational institution in question, with the aim to detect danger or any untoward incident in time and thus, effectively thwart them. For example, a floodlight could automatically shine if an unauthorized person enters the campus outside of opening hours. If desired, this could also be combined with an acoustic warning. Cyber-secure MOBOTIX video technology While the communication infrastructure in the education sector constantly improving, there are usually few resources (personnel, know-how) available for the maintenance of the technology. For this reason, the systems used must be stable and, if possible, maintenance-free and also protected against physical and digital attacks. MOBOTIX video systems are made in Germany. With an above-average ‘Mean Time Between Failures’ (MTBF) of more than 80,000 hours, the follow-up costs of a MOBOTIX system are reduced to a minimum. Resources for technology support can be saved. Due to their durability and robustness, they are predestined for use in education and science. "Particularly in the educational sector, the security of pupils, students, teaching staff, but also of equipment and facilities is of particular importance, real and digital. MOBOTIX has optimal solutions that are robust, reliable and cyber-secure. Solutions that help to make our educational institutions more convenient and secure," concludes Thomas Lausten.
Installations around the world by Ultimate Visual Solutions (UVS) have completed more than one million hours of uninterrupted operation since COVID-19 lockdown began in March. The security video wall technology experts currently have almost 250 installations in 18 countries, ranging from the UK and US to Vietnam and Tanzania. UVS Managing Director Steve Murphy said all the sites had operated continuously since lockdown began in March. The company, based in Burney, launched a full suite of remote service access and online demonstration services to help clients during the coronavirus outbreak. Video wall technology Murphy added: “The services are designed to provide peace of mind and support for key operational video wall technology but the reliability of our installs has meant there have been no major issues. As part of our customer service, we have also dealt with a number of service queries for example, one client had an issue with a Windows update. These were all efficiently dealt with by either phone support or via remote connection support and in one case a short onsite visit.” Remote services The suite of remote services offered by UVS includes: Remote diagnostics and remote maintenance for UVS video wall technology which can offer quick analysis and resolution for most issues UVS engineers using remote connection software, which is fully encrypted and which the client has control over, to carry out maintenance For sites where the video wall controller does not normally have an internet connection, UVS is offering to supply a 4G data dongle as part of the contract (managed and paid for by UVS) to allow clients to give internet access as required Assisting clients with reduced cost annual maintenance contracts A live online demonstration facility to provide full video wall technology evaluations for partners and their clients who are in lockdown or self-isolation Technology which visitors can see in operation includes video wall solutions, displays, video wall controllers, control software, integrated VMS (video management systems for security applications) AV over IP and KVM remote access options. Audio visual solutions UVS, which has its headquarters at Business First Burnley Business Center, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. It is led by four senior colleagues who, between them, have more than 70 years’ combined Audio Visual, Control Room and Visual Solutions experience. It has also opened a new London demonstration venue at Woburn Place, a short walk from Euston Station, to cope with increased demand for its technology.
Senstar, a pioneer in video management software and perimeter intrusion detection products is pleased to offer its Safe Spaces video analytics solution in a compact, easy-to use appliance. Initially available to Senstar Symphony VMS customers, Senstar Safe Spaces analytics are now driven by the Senstar Edge Platform. Businesses monitor compliance “Many companies have introduced software and hardware tools to help businesses monitor compliance with aspects of the emerging health and safety protocols around the globe. Senstar has taken the approach of providing a complete solution, operating on an edge platform which is both affordable and easy-to-use, while being both VMS and camera agnostic.” With the Senstar Edge Platform, businesses simply connect to their existing camera(s) or video encoder" “The solution includes Face Mask Detection, Physical Distance Monitoring, Occupancy Counting, and Sanitization Station Monitoring analytics,” said Senstar Chief Operating Officer Jeremy Weese. “With the Senstar Edge Platform, businesses simply connect to their existing camera(s) or video encoder(s), enabling them to monitor their premises, receive alerts when protocols are not followed, and ultimately operate safely.” Face mask detection The Senstar Edge Platform’s compact, fanless design allows it to be installed virtually anywhere. The device works with any camera or video encoder that supports ONVIF and alerts may be sent to any video management software that supports ONVIF alerts. The Senstar Edge Platform may also be deployed in a stand-alone configuration. Alerts can be directed to mobile devices for convenient notification. Local announcements can also be made via pre-recorded messages over IP speakers. Face Mask Detection can be run up to two times, other analytics can run in parallel on any of the input devices per platform and are configured via an intuitive built-in web interface. Senstar Safe Spaces has been developed using the latest innovations and benefits from Senstar’s nearly 20 years of video analytics experience.
A substantial focus of the security industry is on the selection and installation of security systems, and there is no doubt that this is a critical element of the process. However, in order to ensure that security systems such as access control, video surveillance, intrusion detection and panic alarms deliver on ‘game day’, an equal if not greater emphasis has to be put on the actions that are taken after the installers have closed the doors on the truck and driven away. This article covers some important issues that were covered at the 2019 International Association of Professional Security Consultants (IAPSC) annual conference in Miami, Florida, where Frank Pisciotta, CSC, Business Protection Specialists, Inc. and Michael Silva, CPP, Silva Consultants, facilitated a discussion among security professionals on the topic. Backwards compatibility in access control solutions David Barnard of RS2 security highlighted the importance of backwards compatibility in access control solutions David Barnard of RS2 Technologies LLC highlighted the importance of backwards compatibility in access control software solutions. Reputable manufacturers are constantly evolving software products and it is critical that software continues to work with all installed hardware or owners will find themselves purchasing equipment a second time, which is never good news. An example, a case study with a client where the video management software upgrades were not backwards compatible through the mobile app and a small manufacturing site was looking at a US$ 75,000 price tag to upgrade cameras to make them compatible with the ‘updated software’. Risks of failures in door hardware products Jim Primovic from ASSA ABLOY cautioned about the risks of failures in door hardware products resulting in a failure to attention to detail in the selection and, in particular, the installation process. He explained the importance of using certified installers to avoid operation problems. In light of constantly evolving software revisions, how often does one see any additional training provided to end users when software updates are released? Charles Johnson of Open Options raised this important point and it is an excellent one. As organizations think about structuring maintenance agreements, it might be wise to consider ongoing training to cover software updates and ensure that end users can continue to optimize the features and benefits of software revisions. Software Support Kim Kornmaier of Honeywell mentioned another element of security system lifecycle consideration, which is ‘Software Support’. Maintenance agreements are available and will likely be offered from every installer and come in a variety of flavors. However, care needs to be exercised to ensure that whatever services and support are included, in the scope of a maintenance agreement, have a clear correlation between service and software upgrades versus the fee charged. Software upgrades and system testing Maintenance agreements should be avoided that simply guarantee the free replacement of parts (which may or may not ever get used, even after you pay for it). Services that should be considered include software upgrades, system testing and replacement of consumable parts, like back up batteries. Another key issue ties directly to periodically measuring and ensuring the risk reduction results of security systems, for example, with an access control system, there are several actions recommended for system owners, including: Conduct periodic door and alarm testing - This presumes users have installed all of the necessary parts to enable alarm monitoring). These tests should include the mechanical testing of doors and confirming door-held-open-too-long and forced-door alarms are properly reporting to the alarm client. Importance of harnessing door alarming capacity Excessive door alarms are an indication of either a user or system problem Excessive door alarms are an indication of either a user or system problem or all alarms should be investigated to determine root cause and corrective action needed. Organizations who fail to harness door alarming capability are giving away up to 50 percent of the system's potential benefit. Ensuring the integrity of the access control database is of prime importance. The failure to manage this can lead to unauthorized access and serious security incidents. This can be achieved in a variety of ways, but in the majority of risk assessments they have conducted over the years, it is common to find separated employees and contractor records with active credentials in the database. Ways to mitigate this risk include: Integrating your access control database with active directory (works for employees, not so well for contractors); Utilizing expiration dates on contractor credentials; Periodically manually auditing contractor and employee active badge reports for anomalies, which may indicate process weaknesses in the change management process; Utilizing the ‘use it or lose it’ feature in many software programs that automatically disable a credential after a set period of non-use (e.g., 90 days); and Establishing processes to limit the removal of certain badges from the site (e.g., those issued to contractors or temporary employees). ‘First Card Unlock’ feature Irregular schedules, holidays and natural disasters can result in access vulnerability. For instance, if access-controlled doors at a site are programmed to open on a timer and something prevents persons from arriving at work (e.g., snowstorm), a site may be left exposed. A mitigation technique against this type of risk would be to employ a concept called ‘First Card Unlock’. Under this feature, a lobby entrance to an office, for instance, would not enter into an unlocked state, until the first authorized employee presented a card and entered the workplace. Changing holiday programming in security systems Holiday programming in some systems needs to be changed on an annual basis Holiday programming in some systems needs to be changed on an annual basis. Managing holidays in an access control system results in doors staying secure which would otherwise be unlocked on a normal business day. Similarly, intrusion detection, duress devices and video surveillance systems can let users down without the proper care and feeding. Examples would include: A panic device fails to communicate an emergency situation because it was not properly reset or the wiring has been damaged due to poor installation. Panic devices should be regularly tested and ideally the activation during testing should be by a person who would be required to use the device in an actual incident. The objective here is to build competency in the persons who may need to activate a device discretely. Similarly, intrusion detection systems should be carefully tested to ensure that all devices are properly reporting to the panel and that the panel is communicating properly to the central station. If there are redundant communications channels, each should be verified. In the same way someone would conduct audits of active credentials in an access control system, it is strongly recommended that users perform a similar review with PIN codes, which have been assigned and would allow for an unauthorized person to disarm a system. Utilizing the failure-to-close feature to ensure that through collusion or negligence, if the last person out of a restricted area fails to arm the panel, the central station will notify a responsible party about the omission. Further, reviewing opening and closing reports might well detect inappropriate entries by authorized personnel which are indicative of suspicious or illegal activity. These features and reports will likely be at an additional cost, but they are important insurance to protect against insider threat. It is not uncommon to hear about an incident happening and during the investigation, the owner of the system discovers that the needed camera was not recording. Where video is not under routine observation, it is recommended to determine if your video management system can send an alarm in the event of video loss. This would allow for rapid remediation before the video loss is discovered in the course of an investigation. Avoiding degraded video quality over time In almost every case, degraded video quality is directly related to resource saturation With respect to video surveillance, as systems grow and evolve over the life of the system, organizations may experience degradation. Darren Giacomini of BCDVideo has studied this issue extensively and concludes that in many cases, installers or others are simply putting too many devices on a VLAN, which results in latency and other conflicts. Degraded video quality has a finite number of potential root causes. In almost every case, degraded video quality is directly related to resource saturation. The resources on a surveillance network consist of IP cameras, network switches, network uplinks, viewing stations, database management and archives. Resource depletions According to Giacomini, each of the resource shares a common thread. And, at the basic level, each of those items is nothing more than a purpose-built computer with limited CPU, memory and network capacity. When any of these resources exceed their capacity, the quality of service delivered will degrade. The following are common resource depletions that can degrade video quality and require a much deeper dive, but are included here as a starting point: IP camera CPU utilization is in excess of 85 percent; CPU elevation in the decoder or workstation decoding the video; and Network congestion or CPU elevation in the network switch. Maintaining the integrity of archived video data Giacomini indicated that the majority of the time degraded video is associated with resource depletion Giacomini indicated that the majority of the time degraded video is associated with resource depletion in one of these key components. Investigation of the potential causes can save time and effort, and prevent a video management software application from unduly being blamed for poor performance during its lifecycle. Also, on the topic of video, John Kampfhenkel, Director of Technical Sales at Veracity discussed the challenges that organizations face when video management system storage is undersized and the need to carefully plan for video retention of existing recorded data when the video system has to be expanded. This can be a problem organizations face and when they do, it is best to involve a video storage expert to determine options, costs and potential legal requirements for maintaining the integrity of archived video data. Selecting the right security technology Dependent on the level and type of integration between various systems, another challenge may be to preserve the integration between the two systems. System owners will need to coordinate carefully with installer(s) to ensure that a software revision to one system will not result in a disruption to a software level integration. This type of integration may require a delay in being able to upgrade one or the other application software versions until the integration can again be certified. Selecting the right security technology is an important element of an organization's security risk management. However, experts would argue that in terms of getting measurable results from technology, there needs to be a keen focus on sustaining activities after the installer closes the doors and drives away. By adhering to the consultant and manufacturers' guidance in this article, organizations can substantially reduce the risk to people, assets and information, and prevent criminal and terrorist incidents in the workplace.
Arcules, globally renowned provider of unified, intelligent security-as-a-service solutions, has announced that its Arcules-XProtect Hybrid VMS solution has been selected as the winner in the service-based solutions category of the 2020 Benchmark Innovation Awards. Arcules-XProtect Hybrid VMS The program selected the hybrid cloud video management software (VMS) from both Arcules and Milestone Systems for its ability to enhance the technological capabilities of security and IT teams while empowering integrators to tap into the revenue benefits of cloud services. Benchmark, which provides insight into technical innovations and smart solutions, believes that it is vital that manufacturers and service providers deliver innovations that both enhance the technological capabilities of their products and allow those developments to be implemented in a way that delivers tangible benefits and added value. The Benchmark Innovations Award program highlights and rewards such advances and innovative thinking. Integrating cloud-based VSaas with XProtect VMS Arcules-XProtect integrates cloud-based VSaaS with Milestone XProtect on-premise VMS Arcules-XProtect integrates cloud-based VSaaS with Milestone XProtect on-premise video management software (VMS) to deliver a powerful solution for organizations looking to centralize their dispersed video surveillance operations. The solution is a flexible and feature-rich solution that allows Milestone XProtect customers to deploy remote sites quickly with the power of the Arcules cloud service, with minimal IT resources and downtime. Enhanced cloud infrastructure Additionally, Arcules’ intuitive platform provides sites and cameras connected to Arcules VSaaS, an underlying cloud infrastructure with features such as compatibility between sites, low video latency, data encryption, redundancy and streamlined maintenance with automatic updates, along with easy onboarding. “We built Arcules on the idea that we could create a unified solution that provides an on-demand, flexible deployment and high security in a cloud service model,” said Nigel Waterton, Chief Revenue Officer (CRO) at Arcules. He adds, “This award recognizes the resiliency, performance and cost efficiencies Arcules delivers to the market alongside our valued partners at Milestone Systems with the hybrid VMS solution, and highlights the significant progression in our technologies and innovation over the past year.”
Security and surveillance applications require accurate, scalable, and cost-effective solutions. However, traditional security technologies pose many risks and challenges including frequent false alarms and high costs—both for system installation and ongoing maintenance. Because of the shortcomings of these technologies, many organizations have adopted 3D LiDAR-based security solutions to improve reliability, reduce false alarms, and streamline their operations. Integrated with cameras and video management systems (VMS), LiDAR enhances security by reducing false alarms, allowing for real time tracking of intruders, and enabling automated PTZ camera control for a more comprehensive security system. Choosing the right technology for security and surveillance The most critical element of any security solution is its ability to quickly, accurately, and reliably identify potential threats so that security personal can be promptly mobilised to respond to said threat. Advanced security capabilities and reduced incidence of false alarms are especially critical when protecting sensitive areas like critical infrastructure and other limited access locations However, many traditional security technologies often fail to deliver the low rate of false alarms necessary to reliably protect secure areas, at any time of the day or night and in any weather condition. For example, cameras can be blinded by bright lights and cannot operate in dark conditions. In addition, cameras and other sensing technologies area also affected by harsh environmental factors like high wind and heavy rain—both of which can lead to security failures. The risks posed by an ineffective security system are high The risks posed by an ineffective security system are high. False alarms are costly, wasting valuable time and resources to respond to nonexistent threats. In addition, security personnel may experience alarm fatigue due to frequent false alarms, which can lead to latency in their response to real threats. Because of the consequences of false alarms and other security failures, security solution providers are searching for technology alternatives which can enhance the accuracy of their current Perimeter Intrusion Detection (PID) system as well as interoperate with the existing VMS platform managing their security devices. How LiDAR works differently LiDAR, which stands for Light, Detection, and Ranging—is a time-of-flight sensing technology that pulses low-power, eye-safe lasers and measures the distance between the sensor and objects based on the light reflections off those objects. The resulting sensor data is used to generate a centimeter-level accurate 3D point cloud image, providing spatial location information to reliably detect and track moving targets, such as intruders. LiDAR sensors are operational in various weather conditions and perform reliably in both very bright and extremely dark conditions. The anatomy of a LiDAR-based security solution A LiDAR-based security solution starts with the LiDAR sensors, but it does not end there. In any security application, several LiDAR sensors will be mounted at various points throughout the area, gathering environmental data to provide a complete 360-degree view of the protected space. A 3D perception software platform using artificial intelligence algorithms will detect, track, and classify objects based on the rich point cloud data received from the LiDAR sensors. From there, the object information is routed in real-time to a VMS, which may also compile data from cameras (including CCTV, IP cameras, etc.). The LiDAR-based object information can be used to enable automated PTZ control based on the target’s position, keeping the target in view of security cameras at all times. This provides a complete and nuanced perspective of the area being surveilled. LiDAR technology can pinpoint the exact location of a threat on a map, enabling quick and effective responses when and where they are needed. The fully integrated solution also empowers security personnel with the tools and information they need to respond to threats confidently, thanks to an extremely low risk of false alarms. LiDAR enhances security, reduces false alarms, and enables timely, effective responses LiDAR-based systems are becoming increasingly popular choice for security and surveillance applications due to the technology’s accuracy, reliability, and cost-effective operation. Overall, LiDAR enhances security, reduces false alarms, and enables timely, effective responses to security threats compared to security cameras alone. 4 key advantages of LiDAR for security LiDAR provides many benefits over competing technologies, including high accuracy, real-time tracking and analysis, seamless integration with existing infrastructure, and simple system management. High accuracy and low rate of false alarms In security applications, false alarms are extremely costly. Whenever an alarm sounds, staff must be mobilised to quickly respond to the threat of an intruder. A security system with a high rate of false alarms not only requires more staff members to respond to these false alerts, but it can also require additional devices to enhance the system’s detection accuracy. In addition, frequent false alarms can desensitise operators, lowering their efficiency in responding to alerts. 3D LiDAR sensors can provide greater than 95 percent detection accuracy and 24/7 reliability in all lighting and atmospheric conditions. The accuracy and reliability of a LiDAR-based solution significantly reduces false alarms, ultimately saving time and costs. A lower rate of false alarms provides personnel with confidence in the reliability of the alerts, improving the quality and promptness of their responses. Real-time tracking and analysis With LiDAR, security data is available in real time. The solution automatically tracks individual people and provides real-time location information, enabling security personnel to quickly locate and respond to potential threats. Seamless integration with cameras and existing infrastructure LiDAR sensors can be integrated with PTZ cameras and Video Management Systems (VMS). The positional data from sensors can be used to automate PTZ camera control and accurately identify and track moving objects in areas of interest. PTZ control is programmable, and the location data is used to intelligently select which camera to follow the intrusion based on pre-programmed rules. Some LiDAR manufacturers provide Automatic ID handover™ technology, which works by assigning a unique identification to each object detection enabling the system to track any object across all sensors within an environment and providing tracking continuity regardless of the target’s location within the secured area. This ensures seamless tracking of an individual’s movement across the entire LiDAR coverage area. Finally, when paired with a VMS platform, all sensors and video footage can be managed under one platform with a single visualization pane. The ability to clearly visualise moving targets on dynamic maps allows security personnel to take corrective action quickly and effectively. Easy-to-manage, fully automated solution Some LiDAR-based surveillance solutions use machine learning and 3D perception algorithms to scan the sensor’s field of view, analyze point cloud data, and provide anonymised information on detected individuals. This enables a fully automated security solution that is easy to manage. Overall, LiDAR-based security and surveillance technology reduces the risk of false alarms and enables security personnel to accurately identify and respond to threats—all at a cost-effective price point.
The only constant theme for video technology is its constant evolution. Over the last 40 years, cameras have gone from limited view, constantly monitored rarities to being one of the most populous Internet of Things (IoT) devices with a global reach. Fixed cameras with limited fields of view have been augmented with panoramic cameras with 180- and 360-degree viewing capabilities at ultra-high resolutions in the 4K and 8K ranges, a far cry from the grainy, monochrome viewing of the past. Threats have also evolved in that time, leading to a necessary evolution in security posture, moving from a series of individual programs and practices, to a comprehensive strategy designed around complex risk assessments. To ensure the successful implementation of your security stance in today’s world, you need technology to integrate seamlessly and vendors to work together to deliver coherent solutions rather than individual components. Since successful partnerships are always a two-way street, it’s important to take a look at some of the factors that vendors should offer and expect to receive when entering a beneficial partnership where technology seamlessly folds into the ecosystem of the partner’s technology offerings. Open Technology Standards If you ask any customer what the biggest negative is when it comes to new and emerging technologies, you’ll get a pretty rapid answer of “vendor lock-in.” You can have the best technology in the world, but if you don’t give a customer the opportunity to build multiple, “best-of-breed” products into a comprehensive strategy, you’re going to fall by the wayside pretty quickly. You need technology to integrate seamlessly and vendors to work together That’s not to say that you can’t have unique, proprietary or visionary technology; you absolutely can, and it is what innovation and progress thrives on. Building those technologies around open technology standards is vital if you are looking for wide-scale adoption. Using open technology standards also allows you to integrate with established industry players faster, more smoothly and with increased benefits to the customer. All of this leads to a faster time to revenue and a more rapid scaling of your presence in the market. Direct Technology Integrations Continuing the theme of open technology standards improving the ability to drive relationships with existing, complimentary technology partners, the directness and depth of integration also bears consideration. Using open technology standards also allows you to integrate with established industry players faster, more smoothly and with increased benefits to the customer One of the blights of building a security practice is getting all of your technologies to integrate together and feed information to each other. When you add the fact that each technology has its own user interface (UI) and management console, it can very quickly become overwhelming for the end user to keep tabs on each console, learn every interface and complicates building a workflow in the case of incidents or investigations. The administrators who manage the system also have to update each component individually, ensure that the integrations don’t break when an update is delivered and ensure that any new technologies don’t cause an existing piece of your solution to fail. As a technology vendor, if you have used open technology standards, and written your software with integrations in mind, you will find yourself becoming an easy solution to turn to. Camera manufacturers in particular can take advantage of this when integrating with a video management system (VMS). The deeper you integrate, and the easier you make it to manage, update, monitor and interact with your cameras for the VMS and subsequently the operator using the VMS, the more likely your technology will be designed into solutions. Open Communication and Equal Joint Development Successful partnerships are all about communication, and in my experience, having organizational alignment throughout both companies does wonders to improve the development processes. Executive support in particular is key, and a mutual understanding between leaders makes for a more successful go to market strategy. Equally as important is joint development, especially for engineering teams. Often, software engineers are just thrown the software from the larger of the two partners and told “make sure we integrate with this.” It is then down to the engineering teams to figure out how the partner software works and figure out their integrations. This is less difficult if the partner is using open standards, but there is still a high degree of difficulty involved. It also takes longer to create, test, adjust and release software integrations in this way. Then you have to repeat the process whenever there is a software update on either side. Successful partnerships are all about communication If you work collaboratively as engineering teams with defined co-development plans and processes, this process is simplified, and a better solution is realised for the customer. Working as equals also allows you to drive technology advancement faster, especially for the longer established vendor. New technology companies are forced to innovate faster to stay alive and that is well worth remembering. Your mutual sales teams also have a large part to play here, since working together in front of customers with a connected message will deliver better feedback into the engineering teams for future developments and projects. If you build your technology partnerships on these foundations, then you are well positioned to deliver great solutions to your customers, real value when it comes to forming a major part of the wider security ecosystem and will be well on your way to becoming a mainstay in the physical security world.
Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. “While the ‘new normal’ is still being defined, we believe there will be a greater focus on creating healthier environments while also complying with new regulations,” says Marcus Logan, Global Offering Leader, Honeywell Commercial Security. “Temperature, humidity, energy efficiency, security, safety, comfort, productivity, and demonstrating compliance with regulations are all a part of a healthy building.” For example, social distancing is a new concept for the workplace. How do you make that happen in an open work setting, in breakrooms, elevator lobbies and meeting spaces? Optimized systems create healthier environments Anxious employees will need reassurance about returning to the workplace Building owners will need to look at how they can optimize their systems – or deploy new ones – to create a healthier environment. Building technologies, like those provided by Honeywell's Healthy Buildings solutions, provide building owners with more control over critical factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations, and a company's risk management policies. These solutions also provide transparency for occupants into a building's status, says Logan. Hygiene will be a critical issue: People will want to know that the spaces are ready for their return. Increased cleaning procedures and schedules will evolve, and a way will be needed to demonstrate the procedures are effective and that they have been strictly adhered to. Identifying ways to measure effectiveness of sanitisation and track compliance to the procedures will be a key challenge to solve. This is a space that will evolve significantly in the coming months and years, says Logan. Access control and video analytics Contact tracing is a new requirement in some businesses, and security technology – like access control and video analytics with advanced reporting – can help. Access control technology integrated with video analytics can be used to trace occupant movements within a facility. These technologies capture data that can be used with advanced reporting to provide a digital footprint of where a person has been within a facility and if they may have been exposed to someone identified as being infected with a contagious virus. Building owners can then proactively notify exposed individuals evolve to self-quarantine and minimize further spread of an infection. Video analytics can help to predict where and when occupants encounter each other Anxious employees will need reassurance about returning to the workplace. They will not only seek confidence that the building is optimized for a healthier environment but also that processes are in place to quickly identify and respond to potential issues. Transparency and visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace. “One way to do this is to share building analytics with occupants – to help them understand factors about the indoor air quality or occupancy density,” says Logan. Controlled health, safety and security Honeywell’s solutions provide building owners with more control over critical health, safety and security factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations and a company’s risk management policies, Logan adds. Visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace Every day there is new information coming from the medical and scientific community about COVID-19, and the building industry is just starting to learn what it all means. Logan warns that there is no single solution that will keep every environment healthy and safe. A good strategy features deploying a combination of solutions, optimising systems and being vigilant to make sure that companies are sustaining compliance to new and changing regulations, says Logan. “Today more than ever we must be mindful of the changing culture of how buildings are managed by making apparent the need to be mindful of health and well-being in all aspects of our lives,” says Logan. Honeywell has developed outcome-based solutions that allow building owners to transparently address building quality factors while supporting their business continuity needs in the uncertain environment. “We’re giving them the data they need to confidently reassure their employees to accelerate their business operations,” he adds.
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorized that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas).Dahua’s presence at the show makes a statement: “We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analyzed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyze the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE reports continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time.ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realized some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system. Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organization. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customizable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organization. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
Installation company Nessence recently integrated Vanderbilt’s ACT365 cloud-based access control and video management system with Mobile BankID in Sweden. Mobile BankID is a citizen identification solution that allows companies, banks, and government agencies to authenticate and conclude agreements with individuals over the internet. The integration with ACT365 comes together to solve a brief put forward by the supermarket chain, ICA Sweden. Web API for integration Tobias Olofsson, Project Sales Manager at Vanderbilt, explains that ICA Sweden is a retailer with a focus on food and health, and they wanted to be open earlier in the morning and later in the evening. “It would be too expensive to hire staff to stay open during these times in smaller locations. This is because the number of customers shopping early in the morning or late at night is minimal. But the store wants to be able to provide its customers with this value-added service,” says Olofsson. ACT365 was the perfect solution for this project due to its easy deployment, easy operation To solve this, the supermarket wanted to open unmanned and needed a solution to allow customers to enter the store in a functioning and approved manner by the insurance company. In Olofsson’s opinion, ACT365 was the perfect solution for this project due to its easy deployment, easy operation, and a smooth web API for integration. Increased accessibility and convenience “The success of this project means it is now possible for shoppers to open the supermarket’s entrance door by digitally signing into the Mobile BankID on their phone and presenting it to the ACT365 reader located on the outside of the door,” states Olofsson. Moreover, good accessibility is maintained as all customers do not need to have specific cards or tags for the access system to be able to enter the supermarket. “A new modern solution has been developed to facilitate trade for private individuals, especially in smaller towns where food stores do not tend to stay open for as long as in the big cities. This project has resulted in increased profits for the supermarket, as well as increased accessibility and convenience for its customers,” concludes Olofsson.
South Africa conservationist, Brett Barlow needed a robust security solution to protect Munu, a blind, South Western Black Rhinoceros, whose species is critically endangered. FLIR video solution Barlow deployed an all FLIR solution, comprising thermal cameras, visible cameras and an NVR, for around-the-clock monitoring, early detection and real-time response. FLIR technology has played an instrumental role to protect Munu’s life and livelihood. Throughout the 20th century, big-game hunters, settlers and poachers have decimated Africa’s black rhino population. In the early 1970s, there were approximately 65,000 black rhinos, and by 2018, that number was reduced to 5,630. In 2020, there are three remaining subspecies of the black rhino, one of the most vulnerable being the South Western Black Rhinoceros, also known as Diceros bicornis bicornis, of which there are only 254 left in South Africa. FLIR thermal and visible security cameras deployed Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes Munu, a 20-year-old blind male rhino, is one of these critically endangered species. When Munu was in danger, South Africa conservationist, Brett Barlow stepped in to save Munu’s life. Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes, detecting threats, increasing safety and enhancing his overall quality of life. In 2019, rangers working at a South African National Park found a black rhino walking in circles and visibly disoriented. They knew they had to do something. After safely tranquilizing him, an ophthalmic surgeon confirmed that the rhino, known as Munu, had suffered two detached retinas and was completely blind, likely as a result of disputes with other rhinos in the area. Protecting endangered rhino, Munu As soon as he heard about the situation, renowned South African conservationist, Brett Barlow spoke with the South African National Park and offered to permanently house and protect Munu. “Every rhino matters,” Barlow adamantly affirmed, adding “You wouldn’t put down a blind child, so why would you put down a blind rhino?” The South African National Park later transferred Munu to Barlow’s care. However, Barlow wasn’t the only one who wanted to help Munu. Relocating Munu to the Mantis Founder’s Lodge Adrian Gardiner, globally renowned conservationist famous for founding the Shamwari Game Reserve and the Sanbona Wildlife Reserve in South Africa, extended the invite for Munu to stay on one of his properties, the Mantis Founder’s Lodge. Wasting no time at all, Barlow relocated Munu to the lodge, knowing it would increase his quality of life. The property, spanning 850 hectares, is home to five white rhinos, as well as other animals, including a zebra and giraffe. The White Lion Foundation, in which Gardiner and Barlow are both executive board members, donated funds to construct Munu’s boma, comprising a secure covered boma and a five-hectare open grazing area. American Humane funding Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats Additional support came from a local internet provider, who donated free internet services for the project. American Humane, a non-profit organization committed to ensuring the safety, welfare and well-being of animals, funded one year of feed for Munu. All donations for Munu go directly to the project with no administration costs deducted. Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats because of his highly valuable horn. He remained a prime target for illegal poaching. Much of Munu’s horn was removed to protect him, but the amount of horn that remained is still worth thousands of dollars. Experts say that one pound of rhino horn is worth at least US$ 3,000 universally and ten times that, on Asian black markets. Thus, even with much of his horn removed, Munu was still in danger. Self-harm was a risk should Munu charge into the boma. Munu’s next door neighbor, Rodney, a white bull rhino, was also a concern should a territorial fight occur. For all these reasons, Barlow looked for ways to enhance Munu’s safety. Video surveillance for enhanced security Previously, the Mantis Founder’s Lodge employed two guards for Munu’s security. However, Barlow believes guards should only be a second line of defense, a visual deterrent that responds to threats. “I wanted to go down to the electronic security system route,” Barlow said, adding “Technology doesn’t sleep.” The first security manufacturer Barlow hired charged high prices for their security products. More than this, once installed, Barlow discovered that these devices were unable to deliver quality images in extreme weather conditions, such as mist or rain, both of which are commonplace at the Lodge. As such, he decided Munu’s security required for a more robust and reliable video security system. In 2019, Wilke Pretorius, Distribution Sales Manager for Sub Sahara Africa at FLIR Systems, was working with Brett Barlow on a separate project. When Barlow told Pretorius about Munu, Pretorius informed the FLIR team who immediately got involved. FLIR end-to-end video surveillance system FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras, in order to protect Munu from poachers. FLIR’s powerful thermal and visible imaging cameras deliver intrusion detection at much longer ranges and complete, 24-hour perimeter protection, regardless of weather conditions. "Other camera manufacturers don't compare. Their cameras can't see through mist or rain. FLIR delivers images 24/7, rain or shine, darkness or light,” Barlow said, adding “technology like FLIR thermal cameras allow for early warnings for perimeter breaches. Even though rhinos have weak eyesight, without any sight, they are basically defenseless. So, in essence, FLIR became Munu’s eyes.” Beyond FLIR’s high-performing technology, Barlow loved working with the FLIR staff. Barlow said, “What drew me to FLIR were the people involved. Wilke and the rest of the FLIR team have been so passionate and resourceful, always available and willing to help when issues arise.” “When I started working at FLIR, Chief Executive Officer (CEO) Jim Cannon said our mission is to save lives and livelihoods,” Pretorius explained, adding, “These words stuck with me. Working on the Munu project, it was clear that saving lives and livelihoods are indeed a passion of FLIR employees. I am proud to be a part of a company so eager and passionate to produce solutions and technology that make a positive impact in the world.” Installation of FLIR cameras Installing the new security system was not an easy task. Merely two days prior to the arrival of FLIR cameras, in March 2020, South Africa was ordered into an immediate lockdown, due to the COVID-19 pandemic. But Barlow was eager to begin the installation process, so he set out to do it himself. By early May 2020, a two-person crew had manually dug over 600 meters of trenching to run cable and conduit through the lodge’s hard African soil. Barlow also installed a solar array to power the system. He cut bushes, installed polling and connected the entire system to FLIR’s central network video recorder (NVR), to view the camera feeds both inside and surrounding Munu’s boma. The result is a fully functioning, comprehensive video security system. FLIR Elara FB-Series ID thermal security cameras deployed Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system based on a two-tier model. The perimeter is shaped as a big triangle about 110 yards away from the boma enclosure. Six FLIR Elara FB-Series ID thermal security cameras, which use onboard analytics to classify human or vehicular intrusions, are installed to monitor the outer perimeter or the first tier. There are also 11 Ariel Full HD IP Bullet cameras deployed, which deliver 1080p video for high motion, complex and low-light scenes. FLIR Saros Dome DH-390 cameras deployed For effective surveillance of Munu’s boma, six FLIR Saros Dome DH-390 cameras, designed to deliver actionable alerts and alarm data, surround the enclosure. One FLIR Saros DM-Series camera is mounted inside the boma to capture every minute detail of Munu’s movement in all conditions. To manage the video from all the cameras, FLIR also supplied its Meridian TM product, a compact, all-in-one network video recorder (NVR), specially designed to support dozens of channels. Meridian also features a FLIR United VMS EZ Client web interface, which simplifies viewing capabilities and saves the cost of additional workstations. Powering, processing and managing this system are six edge servers, FLIR’s USS Edge Appliances, containing 12TB of storage and preloaded with United VMS software, built to seamlessly manage multiple, varied devices. Heightened perimeter protection Thanks to FLIR’s technology, Barlow is confident that Munu can be an ambassador for his species. He hopes Munu’s story may inspire future conservancies around the world to partner with manufacturers, like FLIR, for heightened perimeter protection. Case in point, actress Shannon Elizabeth, founder of the South Africa-based Shannon Elizabeth Foundation that is focused on wildlife conservation, was deeply moved by Munu’s story. She later asked Barlow to participate as an advisor to her foundation’s Ranger Relief Fund. Importance of early warning technology FLIR could prove invaluable to the efforts of rangers all over the African continent to protect endangered animals" In a time where conservation funding is down because of declining tourism due to the COVID-19 pandemic, the Ranger Relief Fund supplies money and much needed equipment to ensure conservation first responders remain employed and properly resourced. With early warning technology being more critical than ever, the need for conservancies to partner with technology manufacturers like FLIR is urgent. “FLIR could prove invaluable to the efforts of rangers all over the African continent to protected endangered animals,” Barlow explained, adding “With Munu being the proof point, FLIR could be more than Munu’s new eyes, but indeed the eyes of an industry desperate to protect the world’s natural heritage from the burgeoning poaching crisis.” Picking the optimal security solution When asked what advice Barlow would give to other conservancies considering similar security technologies, he said “Speak to the right people. Make sure you talk to someone who understands the product. See the solution in action. View a live site and see how it works. Work with the right people to implement that for yourself.” The longer Munu lives, the more good he’ll do. Barlow plans to expand Munu’s boma, once he has acclimatized to his new home. And he has already begun using the FLIR Saros DM-Series’ live stream capabilities to invite learners around the world to observe Munu up close. The plan for Munu is to mate with a female within his own subspecies, thereby directly contributing to the survival of his kind. If Munu does sire a calf, Barlow plans to donate the calf back to the South African National Park that Munu came from to help with the genetic diversity for the reserve. The future for Munu is bright and, with his new eyes, he will see through to the end.
Located 40 kilometers outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realized that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customization of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video Management System Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link License key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, has announced that Army and Navy Academy, a college preparatory military boarding school in California, has upgraded its security infrastructure with Hanwha security cameras. Located on a 23-acre beach-front property, the Army and Navy Academy is home to more than 300 students and employs more than 140 faculty and staff members. Two-fold surveillance upgrade According to Jeffrey Gibson, a system with analytics to keep a close watch on the campus could act as a force multiplier With a commitment to continuously adapt and improve, the Academy developed a strategic plan that focused on supporting the long-term success of their cadets. When the school began building and renovating facilities, they included an upgrade to their technology and physical security system. With a two-fold approach, the school first needed to replace their existing, out-of-date analog camera system. Second, they needed a system that could keep up with current technology. According to Jeffrey Gibson, Assistant Commandant, Operations, Safety, and Security at the Academy, a system with analytics to keep a close watch on the campus could act as a force multiplier. Hanwha security cameras with Wisenet WAVE deployed After an extensive vetting process, the school deployed a video surveillance solution comprised of Hanwha cameras integrated with Wisenet WAVE, a highly customizable and reliable IP-based video management system (VMS). Integrating the Hanwha security cameras using the Wisenet WAVE IP-based VMS made it possible to create a video surveillance solution that was exclusively tailored to the campus’ specific needs. The Academy was able to quickly train security personnel as required, considering the WAVE video management system (VMS) is extremely intuitive and easy to use. Multi-sensor, multi-directional PTZ cameras installed The Army and Navy Academy now has a total of 141 cameras, including PNM-9081VQ multi-sensor, multi-directional cameras for covering wide areas, which allows them to use fewer cameras while seeing more. They have also installed PNM-9320VQP multi-sensor, multi-directional PTZ cameras for zooming in and for covering long distances. Additionally, to be able to effectively monitor between buildings and cover their coastline, the Academy chose PNM-9020V multi-sensor 180° cameras. In-camera and VMS analytics features By taking advantage of the in-camera and VMS analytics available in their new system, the security teams at the Academy can now monitor internal and external areas with high precision and efficiency. The primary cameras installed focus on higher priority, greater risk areas, while the VMS analytics keeps track of the rest of the areas in the campus. Perimeter protection with line crossing analytics With the surveillance system upgrade, most of the campus perimeter is now protected using line crossing analytics As a result of the surveillance system upgrade, most of the campus perimeter is now protected using line crossing analytics. With Hanwha cameras installed above the fence, the system sends an alert to the Security Operations Center (SOC), if it detects something crossing the fence in either direction. Once the system pulls up the camera feeds, operators can see if it’s a false alarm and then decide whether or not to dispatch a security team or call local police. Enhanced students, faculty and staff safety The security team has developed a strategy for inside the fence as well that allows them to focus on specific areas that have higher traffic at specific times of the day. The in-camera analytics looks at the low-traffic areas. If the camera detects movement, the Security Operations Center is alerted and can then determine whether or not to send personnel. Because the new Hanwha security system provides both coverage and analytics, the Army and Navy Academy’s security team is able to focus on what matters most, the safety of students, faculty and staff.
Co-op, a large consumer co-operative in the UK and one of the largest retailers in the country, is rolling out an integrated body-worn video solution from Motorola Solutions to front-line colleagues, with a focus on further increasing safety in-store against a background of rising retail crime in the industry. The Co-op has seen in-store crime increase by more than 140% year-on-year, despite communities recognizing the critical role played by retail workers in society - true frontline workers in the days of a global pandemic. The number of violent incidents also hit record levels with 1,350 attacks having been experienced by Co-op shop workers in the first six months of 2020. Keeping colleagues safe The retailer warns of a crime and violence epidemic and its targeted deployment of a body-worn video solution forms part of an ongoing commitment to invest a further £70M over the next three years in innovative technology to keep colleagues safe. Co-op will equip front-line staff with more than 1,000 Motorola Solutions VT100 body-worn cameras in around 250 stores initially, with the ability to stream video in real-time to the Security Operations Center of Co-op security partner, Mitie. The footage is used to identify criminals and provide evidence to secure prosecution. The VT100 body-worn camera from Motorola Solutions can be worn in standby mode for up to six months, preserving battery for instances when Co-op store colleagues feel threatened by aggressive or violent behavior. The cameras are operated by a simple one-push activation, instantly recording footage to the camera itself, and streaming live video to the security operations center, allowing for a quick response from security personnel or police. Cloud-based software The cameras are supported by cloud-hosted VideoManager software The cameras are supported by cloud-hosted VideoManager software, which enables secure and efficient camera allocation, user administration and incident management. With security features such as comprehensive audit-trails, encryption, configurable retention policies and RFID camera allocation, this integrated solution ensures footage and incidents are dealt with efficiently and securely. As part of its Safer Colleagues, Safer Communities campaign, Co-op is also building awareness and support for MP Alex Norris’ “Assault on Shop Workers Bill” which has now seen its second reading in Parliament postponed until September. The Bill states that because shop workers have responsibilities to uphold the law on age-restricted products they should be afforded greater protection in carrying out those public duties. Retail crime A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack In its 2020 Crime Report, the Association of Convenience Stores (ACS) found that a quarter of violent incidents resulted in injury, with a weapon used in almost 20% of occurrences. A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack or threaten shop workers. In 2019, Co-op funded research into retail crime, with the hard-hitting findings reporting that shop workers were showing signs of Post-Traumatic Stress Disorder (PTSD). Co-op has committed a further £70M over the next three years in innovative technology to keep colleagues safer, it has introduced SmartWater Fog Cannons, the latest remote monitored iCCTV, body cameras and, communication headsets for all frontline colleagues. Protection for shop workers Cheryl Houghton, Co-op Retail Security Manager, said, “Shop workers play an essential role serving communities, yet they have to contend with unprecedented levels of violence and abuse on a daily basis. As a community retailer we see the impact of social issues in our stores. I have never seen such high levels of violence and abuse, it’s a societal issue that all retailers are concerned about and it’s having lasting effects on the lives of shop workers - both mentally and physically. It is not part of the job to be verbally abused, threatened or attacked and we’re determined to make sure it isn’t. Calling for greater protection for shop workers carrying out public duties and for the root causes of crime in communities to be addressed.” Body-worn videos in commercial organizations Richie McBride, Director of Business Operations, Video & Analytics at Motorola Solutions UK, said, “Body-worn video is becoming a critical element in commercial organizations’ strategy to keep their employees safe. As a company focused on mission-critical solutions, we provide our commercial customers with the right tools to help them enhance their operational efficiency, responsiveness and safety. We are proud to partner with one of the UK’s largest retailers in its work to further improve the shopping experience and enhance safety for both shoppers and staff,”
An upgrade of video technology at a south London residential estate has proved so effective that the system has been immediately scaled-up. The IDIS video solution, implemented by Hall & Kay Security Engineering at the Meridian South Development in Hither Green, is less obtrusive than the system it replaced, yet it immediately delivered better results, with a number of incidents tackled to the surprise of the culprits. IDIS video solution Although the mixed development, comprising 440 owner-occupied and rented properties, is a safe and pleasant neighborhood for most of the time, to maintain this high standard of living managers needed to tackle a growing problem with petty crime and anti-social behavior. Hall & Kay were asked to solve this problem by implementing an advanced, end-to-end video solution from IDIS Issues were being reported with increasing frequency, including rubbish being dumped by short-term tenants vacating their apartments, theft from mailboxes, vandalism, and car crime. Rubbish removal alone was costing the management company more than £12,000 annually. Hall & Kay were asked to solve this problem by implementing an advanced, end-to-end video solution from IDIS, Korea’s largest in-country manufacturer. IDIS cameras deployed The H&K team began by replacing the ten column-mounted PTZ cameras with IDIS cameras. IDIS technicians visited the site with the H&K engineers and conducted a bandwidth test on the existing cabling, demonstrating that, by using the existing coax with IDIS ethernet converters, up to four IDIS fixed bullet cameras could be cost-effectively mounted on each existing column. Additionally, wireless access points were installed where cameras couldn’t be cabled directly to the estate control room. This approach eliminated blind-spots and guaranteed that events would not be missed when the system was unmanned. IDIS Center video management software (VMS) To provide wider coverage, a further six columns were added, and additional IDIS cameras were mounted in the underground car parking areas. The system now delivers full HD images in all lighting conditions, with built-in IR ensuring night-time image capture at distances up to 30m. All footage is stored for 30 days. The security officers and maintenance staff who manage the estate are also taking advantage of the easy-to-use analytics functions that come with the totally cost-free IDIS Center video management software (VMS). These tools include motion detection which can be utilized out of hours to ensure that scenes are only recorded when movement occurs, thus minimizing bandwidth usage and storage requirements. This feature, along with IDIS MapVue navigation, also makes it easy to quickly review footage to find incidents of interest. IDIS full HD IR cameras Within 24 hours of the cameras being installed, departing tenants were recorded illegally dumping rubbish The 57 IDIS full HD IR cameras, and the three NVRs with 12TB storage each, benefit from true plug-and-play set up with DirectIP. When the South Meridian management team saw the quality of images now being captured, they asked if the system could be extended. With IDIS’s flexible approach this was quick and easy to do. Within 24 hours of the cameras being installed, departing tenants were recorded illegally dumping rubbish. Shortly after this, a contractor working at the site reported that tools had been stolen in both cases, with high definition evidence of the crime being captured and passed to the police. Easy-to-use VMS controls In fact, thanks to the design of the system, and the easy-to-use VMS controls, security staff was able to retrieve footage of the incident itself, along with a full video trail of the thief moving across the estate, before and afterwards. Word has now spread about how effective the new system is, and residents are delighted that there are now no blind spots. “The support we had from IDIS was second to none and the technology works exactly as promised,” said Wayne Wharton, Security Sales Manager, H&K Security, adding “We are now looking at many more IDIS projects with the same customer and others.” “We are delighted that IDIS technology is making such a positive difference to the quality of life of residents at Meridian South,” said James Min, Managing Director at IDIS Europe.
Round table discussion
Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?
Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analyzing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
How to Choose the Right Solution for Video Data to Enhance Security and Operational IntelligenceDownload
Video Management System: Manufacturers & Suppliers
- Dahua Technology Video Management System
- AMAG Video Management System
- Meyertech Video Management System
- Hikvision Video Management System
- OT Systems Video Management System
- Axis Communications Video Management System
- Video Storage Solutions Video Management System
- IDIS Video Management System
- Vicon Video Management System
- March Networks Video Management System
- Geutebruck Video Management System
- Vanderbilt Video Management System
- Arecont Vision Video Management System