Video motion detection
Synectics has released its latest ‘Tech Note’ to help business and organizations explore how video analytics can transform their security and surveillance operations. The free ‘Tech Note’ highlights how operators can maximize intelligence and analytics from real-time video data. It draws on Synectics deep experience in the design and deployment of advanced surveillance solutions for highly regulated and specialized industries around the world. Martyn Rowe, Head of Produc...
Hanwha Techwin America, a supplier of IP and analog video surveillance solutions, will debut its next generation Wisenet 7 SoC (System on Chip). Built from 30 years of innovation in video surveillance solutions, the highly anticipated announcement sees the continuation of the Wisenet line of custom-built SoCs designed specifically to address the unique challenges of the security market. New key features include cybersecurity features, clear images in all lighting conditions, improved lens disto...
Panasonic has announced its new i-PRO X-Series of network security cameras with built in AI capabilities making them ideal for the next generation of intelligent applications in business and society. i-PRO X-Series security cameras With its Software Development Kit, the camera range is designed for third party application development that can be tailored to a business customer’s needs. The range includes six new models, with 5MP resolutions available in July, 2020 and 4K resolutions at t...
The COVID-19 pandemic is the defining global health crisis of our time. In order to be able to fight against it, mask detection and temperature measurement have become daily routines for everyone. In this situation, Merit LILIN, with over 40 years of experience in IP video manufacturers of IP cameras, recording devices, and software, have created a cost-effective COVID-19 solution to ensure end-user health and safety. Temperature measurement Many solutions should provide temperature informatio...
Heason Technology warmly welcomes the recent appointment of Jon Howard as the new Managing Director for the UK subsidiary of Elmo Motion Control. As a longstanding UK distribution partner, and fully equipped with its own design and applications engineering teams, Heason works closely with Elmo - combining servo drives and advanced network motion controllers from the global motion systems designer and manufacturer's comprehensive range as part of its own motion systems integration service. Heas...
Applied Motion Products Inc. (AMP), the USA based motion control innovator, has released a new application note for programmers using Python, the popular computer programming language. Available from Mclennan, AMP’s European distribution partner, the application note includes sample Python scripts and resource information for establishing RS-232/RS-485 or Ethernet communications, along with streaming commands and handling replies for single- and/or multi-axis drive set-ups using AMP&rsquo...
Today’s market wants access control systems that are always available, scalable, and integrated with other security solutions like video and intrusion systems to ensure the highest security and safety levels. At the same time, these systems must be easy to configure and use. With the introduction of the Access Management System 3.0, Bosch meets all of these requirements. Always available for security Access Management System 3.0 is designed to be available at all times. Its resilient design includes a Master Access Controller (MAC) as an additional layer of defense between the server and the access controllers. If the server fails, the MAC takes over, ensuring continuous communication across controllers while sharing necessary information from the card readers. In addition, access control functionalities that involve multiple access readers, such as anti-passback and guard tour can continue to perform. The anti-passback functionality is an important feature to ensure a high level of security. It prevents a cardholder from passing a card to another person enabling an unauthorized entry. Guard tour is a safety functionality offered to security guards, which uses access readers as checkpoints along a defined route at specified times. Threat level management The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked Any deviation of sequence or timing causes an alarm in the Access Management System. Immediate notifications to colleagues or first responders increase the safety of security guards. In the rare event that both the Access Management System 3.0 server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the Access Management Controllers (AMCs). Thanks to this offline capability, it is possible to save millions of events even during downtimes, ensuring the continuous availability of the system. Access Management System 3.0 offers up to 15 configurable threat levels such as lockdown, controlled lockdown, or evacuation, which means safety measures can be initiated quickly in critical situations such as fire or security breach. The threat level state is activated by one of three triggers: operator workstation, external contact such as an emergency button, or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked. Scalable and future-proof Users can start small and add extra capacity whenever necessary. The Access Management System 3.0 software can be expanded up to 10,000 doors and 200,000 cardholders. The software is offered in three pre-configured software bundles from medium to large organizations: Lite (max. 144 doors), Plus (max. 512 doors), and Professional (max. 10,000 doors). All bundles support up to 200,000 cardholders. No hardware needs replacing when expanding; users only require software upgrades and possibly additional controllers, readers, and cards. So, increasing the system is also cost-efficient. Customers who work with the software solution Access Professional Edition (APE) from Bosch can migrate to the Access Management System 3.0 by using the new importer/exporter tool. Together with regular updates to data security enhancements, these features make the system a future-proof investment - suitable for office and government buildings, retail environments, educational institutions, and more. Easy configuration and operation Access Management System 3.0 also has trusted digital certificates for mutual authentication Configuration is easy: Users can import existing floor maps into the system, and drag and drop icons on the map to represent controllers, doors, and building objects. User onboarding is straightforward. For example, enrollment and assignment of access profiles are all implemented in one dialog manager. Operation is smooth: The graphical user interface (GUI) is simple and easy to understand. The dark color scheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. Access Management System 3.0 offers protection against cybercrime and loss of personal data. The database, as well as the communication between the server and access controllers, is encrypted at all stages through the support of the secure Open Supervised Device Protocol (OSDP) v2 protocol. Access Management System 3.0 also has trusted digital certificates for mutual authentication between the server and client to prevent tampering by unauthorized clients and uses secure design principles such as “secure-by-default” and “principle of least privilege.” Integration with third-party solutions Access Management System 3.0 is ideal as a standalone solution to meet today’s access control needs. It integrates seamlessly with Bosch B Series and G Series intrusion control panels as well as with video systems such as Bosch Video Management System or third-party systems like Milestone’s XProtect for increased security and enhanced situational awareness. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly Integration with Bosch Video Management System (version 10.1 and higher) offers manual video verification to increase the security level at doors. The operator can visually verify whether the person at the door matches the registered person in the database. If so, the operator allows the person to enter. Bosch Video Management System integration also enables searching for cardholder events and events at doors. With the searching functionality, it is possible to quickly check who has entered an area and at what time. Moreover, access commands and events can be handled in Bosch Video Management System, making the operation of the integrated system most efficient. Intrusion control panels integration B and G Series intrusion control panels integrate seamlessly into Access Management System 3.0 for efficient authorization management and a central overview of all access and intrusion events. With central user management, operators can add, delete, and modify intrusion-related user passcodes and authorizations directly into the system, as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly in the Access Management System 3.0 user interface as well as to see states of the areas (e.g. “armed”, “ready to arm”) and detectors (e.g. “motion detected”) on the system map. This provides operators with a central overview of all access and intrusion states, allowing them to easily and remotely handle intrusion events. Bosch Access Management System 3.0 is available for sale and makes access management simple, scalable, and always available.
Hikvision, an IoT solution provider with video as its core competency, has announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Dedicated DeepinView Cameras Over the last few years, Artificial Intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performance has improved to enable massive computing power using various algorithms and contributing to multi-intelligence functionality and higher accuracy. The new Dedicated DeepinView Cameras are an example of these advances, incorporating several AI-powered deep learning algorithms in one unit. What’s more is that these algorithms can be switched, thereby essentially putting 5 or 6 unique cameras in one housing. Integrated with enhanced AI technology Embedding switchable algorithms is a significant step for Hikvision to take in its AI product development" “Embedding switchable algorithms is a significant step for Hikvision to take in its AI product development. In a world of ever-changing technologies and functionalities, this approach creates great value for end users to try new technologies to ensure security, as well as to implement business intelligence and other applications,” said Frank Zhang, President of the International Product and Solution Center at Hikvision. He adds, “The benefits of our new offerings are numerous including reduced costs, improved efficiency, and speedy and effective incident response.” Vehicle analysis capability The Dedicated DeepinView cameras combine two product categories – the first is vehicle analysis where cameras combine automatic number plate recognition (ANPR) with vehicle attribute recognition. Attributes include the vehicle’s make, color, and direction of movement. Typical uses include installation at checkpoints of city streets and at entrances & exits of buildings or industrial parks. Switchable deep learning algorithms Models in the second category boast six switchable deep learning algorithms in one camera housing, including facial recognition, face counting, hard hat detection, perimeter protection, que management, and multiple-target-type detection (detecting multiple targets and multiple types of targets at once). Accordingly, users can simply enable an algorithm manually for dedicated use, and then later switch the algorithm as needed. One example of a switchable algorithm is hard hat detection. This algorithm can be used on construction sites to ensure safety and compliance. Face-counting function Specially-equipped DeepinView cameras can precisely distinguish a worker on the site wearing a hard hat from those without one, and automatically deliver alerts when the hard hat violation is detected. Another example is in a retail setting, a face-counting function can be enabled to precisely count customers entering and leaving the store. Repeat customers and store staff can be automatically excluded in the process, helping store managers count new customers with precision. Flexibility among algorithms enables users to also switch among: Perimeter protection – To monitor outdoor areas needing security and deliver accurate alarms upon intrusions. Facial recognition – To grant authorized access to restricted areas in various organizations, such as school laboratories, archive rooms, and hospital pharmacies. Que management – To better understand customer wait times, optimize staff levels, and enhance customer experience. DarkFighter and LightFighter technologies The Dedicated DeepinView Cameras are available in 2, 4, 8, and 12 MP resolutions Equipped with Hikvision’s DarkFighter and LightFighter technologies, these cameras capture vivid and color images in extremely low-light environments or in scenes with strong backlighting where color and brightness balance is extremely difficult. Smooth Streaming mode further ensures a high-quality live feed. The Dedicated DeepinView Cameras are available in 2, 4, 8, and 12 MP resolutions for customers to choose from. Vibration detection Furthermore, metadata is supported to allow third-party platforms to receive data from Hikvision cameras for real-time video analysis or recorded into footage archives to enable rapid searching forensic evidence. Finally, these camera models also offer Vibration Detection for outdoor use, which detects and notifies users of vandalism.
Alarm systems have been available for decades, but many solutions offer little functionality beyond a sensor triggering an alert in the event of a break in. To take alarms to the next level, Hikvision is bringing a number of new and innovative technologies to market, allowing customers to meet their home and business security requirements more fully and to help expand the alarm business. No one can stay alert for a potential home or business security breach every hour of every day. That’s why alarm solutions are critically important for customers in terms of identifying and reacting to any incident in the fastest and most effective way possible. Enhancing residential and corporate security Hikvision offers a broad range of alarm solutions and technologies for different customer requirements But not all situations require the same kind of alarm system, which is why Hikvision offers a broad range of alarm solutions and technologies for different customer requirements. In some cases, for example, a customer needs to be aware when the perimeter of a site or location is breached. In other situations, they may need to monitor entrances or site perimeters, to track multiple intruders at the same time, or to speed up responses in the event of attacks in buildings or in public spaces. Hikvision innovative alarm solutions To address this broad range of end-customer requirements, Hikvision has created a broad portfolio of innovative alarm solutions that are sophisticated, automated, and always fit for purpose. These allow one to: Meet customers’ home security requirements with Hikvision Intrusion Alarm A break-in at a customer’s home can cause major upset, as well as material and financial losses. With Hikvision Intrusion Alarm solutions, they can get peace of mind that their home is properly protected at all times. Hikvision Intrusion Alarm solutions To maximise home security, the intrusion alarm solutions combine a wide range of integrated detectors To maximize home security, the intrusion alarm solutions combine a wide range of integrated detectors, including door and window-contact detectors, break-glass detectors, vibration detectors, smoke, and temperature detectors. Customers can also stream video from their security cameras direct to their mobile phones with Hikvision’s pioneering Intruder Verification as a Service (IVaaS) technology, which seamlessly unites video with cutting-edge intrusion detection capabilities in a single platform. Wireless alarm control panels The Hikvision Intrusion Alarm solution includes wireless alarm control panels and peripherals that make it fast and easy to deploy in home environments. Wired products are also available for small commercial applications. For residential applications, end users can connect into the alarm control panel, receive alerts, and watch streamed video from CCTV cameras on their handheld device. They can also configure their home security system remotely and view alarm reports. Detect and track multiple intruders concurrently over large distances with Hikvision Security Radar Customers with large sites to secure may need to track multiple intruders concurrently. They can get this capability with Hikvision Security Radar, which offers a detecting distance of up to 120 meters and a 120° detecting angle. That means customers can cover sites of 15,000 square meters and – most importantly – they can track up to 64 targets simultaneously. Hikvision Security Radar To make life easy for customers’ security teams, they can define the different areas they want to monitor, such as the warehouse, the car park, the perimeter or entrance, and others as needed. One Hikvision Radar can link up to 4 PTZ dome cameras at the same time to check multiple targets via video. With Hikvision, customers also get an extremely low rate of false alarms. This means they can focus on real intruders rather than pets or other animals, or weather interference such as fog, rain or snow. Stop criminals before they can do any damage with Hikvision Perimeter Protection The best way customers can minimize safety risk and damage to their assets is to stop intruders while they are still outside of the site or building, and that’s what Hikvision Perimeter Protection is all about. To stop criminals in their tracks, we use two parallel infra-red bars that have to be broken at the same time for the alarm to be sounded. Hikvision Perimeter Protection solution With two infra-red bars, customers can filter out all kinds of false alarms With two infra-red bars, customers can filter out all kinds of false alarms, from small animals crossing their perimeter, to falling leaves or flickering lights, which means they always know when an intrusion threat is real. Furthermore, their solutions are temperature and weather hardened, enabling deployment outside, in all kinds of perimeter locations. Their customers can also monitor their perimeter security remotely via their handheld devices. Increase safety for people in public places with Hikvision Emergency Alarm An emergency situation can unfold anywhere, in a school, on a university campus, in a park, or in the street. To help security teams work effectively, and ensure that people feel safe wherever they are, Hikvision has created the Emergency Alarm system. Hikvision Emergency Alarm system This solution allows a person in an emergency situation or attack to call for help by pushing a button, or by broadcasting a call for help to police or emergency response teams, or both. The Hikvision solution has a built-in camera and audio recording facility to collect evidence of the events taking place. In addition to these benefits, the Hikvision solution is available in different formats and can be integrated with joined-up ‘safe city’ technologies, including dome cameras, license-plate recognition cameras, low-light cameras, and much more. This kind of solution is already being deployed to improve safety in cities, parks, universities and schools worldwide and can be deployed in a wide range of other customer scenarios. Fit-for-purpose alarm solutions for every application Based on these four key application areas, Hikvision alarm solutions cover all of customers’ home security and business security requirements. While Hikvision Intrusion Alarm solutions protect homes and small businesses against break-ins, their Security Radar, Perimeter Protection, and Emergency Alarm solutions enable protection of people and assets and rapid responses on a far larger scale, either for large sites or in smart-city environments.
The perimeter is the first line of defense against intruders who could put people or assets in danger. For many forward-looking businesses, the answer is to deploy thermal cameras, which offers a number of advanced benefits. In complex light environments, at night, or in severe weather conditions, many conventional ‘visible light’ cameras may not be able to recognize intruders and alert security teams. By contrast, thermal cameras can recognize tiny changes in temperature, allowing them to detect people or vehicles that cross perimeter boundaries even in extremely low-light or low-visibility conditions. Some thermal cameras incorporate deep learning algorithms to distinguish humans and vehicles from animals, falling leaves, and other moving objects that could otherwise trigger false alarms. This means that intrusion alarms are only triggered when a real perimeter threat is identified, which supports a faster response with far less time spent analyzing footage and investigating false alarms. Perimeter protection with minimal false alarms Another key benefit of thermal cameras is that they are effective at longer distances than many conventional ‘visible light’ cameras. This means that small and medium businesses can reduce equipment and installation costs for their perimeter-protection solutions, while also monitoring camera feeds with fewer team members. Hikvision offers a range of affordable thermal cameras that are ideally suited for perimeter protection in small and medium applications such as residential areas, office buildings, car parks, factories, stores, and even museums. With Hikvision’s thermal camera range, detection in real time of people or vehicles that breach perimeter defenses is made possible, even in low-light and poor-visibility conditions. As an added benefit, overlay of traditional video images on top of thermal camera images is possible, which ensures availability of evidence needed to support legal processes or insurance claims in the event of a perimeter breach. Hikvision thermal cameras for perimeter protection Hikvision’s range of thermal turret, bullet, and speed dome cameras are already being deployed in many perimeter protection solutions for housing developments, car parks, factories, stores, farms, and even museums. In one example of a successful project, a car brand is protecting one of its European dealerships 24 hours-a-day with Hikvision thermal cameras. In this case, the Hikvision camera alerts security teams if perimeter defenses are breached, enabling a real-time response to prevent the theft of vehicles or parts.
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announced a line of 4K AI cameras. Part of the Wisenet P series, the new AI-based cameras capture pristine images at up to 4K resolution while including powerful, in-camera deep learning algorithms for advanced object detection, classification and error-free analytics. Utilizing object recognition versus motion detection all but eliminates false alarms while also providing valuable business and operations insight. AI cameras analytics “Our new AI cameras have solid performance in both analytics and deep learning applications,” said Ray Cooke, Vice President - Products, Solutions, and Integration, Hanwha Techwin America. “The included, license-free analytics detect and classify a range of objects including people, vehicles, license plates, and faces. This technology will provide more reliable edge based intelligence, and open new opportunities in security as well as business and operations intelligence.” Unique attributes of the objects are also stored as metadata alongside the video information including: Colors of people’s clothes for both top and bottom People’s clothing length for both top and bottom People wearing of glasses or not People wearing or carrying a bag Age group Gender Vehicle types Vehicle colors Hanwha’s plugin for Video Management Software This metadata can be read by a VMS server and used in post-event forensic search to significantly reduce time spent investigating specific events. Wisenet P series AI cameras offer integration with Wisenet WAVE and other popular VMSs from Milestone and Genetec using Hanwha’s plugin. As businesses re-open with new policies regarding social distancing and occupancy limits, it’s never been more important to accurately count customers and employees as they enter and exit the premises. Unlike traditional, imprecise methods of people counting with dedicated overhead cameras, the Wisenet P series AI cameras deliver the accuracy with people counting based on the camera’s AI object detection algorithm. Reducing Server bandwidth for analytics Wisenet P series AI cameras are equipped with a ‘BestShot’ feature which ensures that only the most suitable image of classified objects is sent to a backend server. The full video image can be up to 4K resolution to see details of objects, along with tagged attributes metadata. Users have the option to set the image resolution to less than 4K for full video streaming or use BestShot to minimize bandwidth and storage requirements for server-based analytics. Additional key features include: Digital auto-tracking: provides two simultaneous streams of video, enabling operators to see the camera’s full field of view, while simultaneously viewing a Full HD digital PTZ auto-tracked image of a person or vehicle Upgraded Business Intelligence: integration with Wisenet Retail Insight providing gender and age group counting 12V DC power supply (50mA max): provides power for external sensors including LEDs, PIR sensors, and glass break detectors, eliminating the need for an additional power supply AI Dome cameras series The new Wisenet P series AI cameras are available in the following configurations: PND-A9081RV – 4K AI dome camera with built-in IR illumination PND-A9081RF – 4K AI flush-mount AI dome camera with built-in IR illumination PNV-A9081R – 4K AI vandal-resistant dome camera with built-in IR illumination PNO-A9081R – 4K AI bullet camera with built-in IR illumination PNB-A9001 – 4K AI box camera
Senstar, a provider of perimeter intrusion detection and video management solutions, is pleased to introduce enhancements to its FiberPatrol FP1150 fiber optic intrusion detection sensor. “Initially launched in 2018, the FP1150 is a compact, rugged and highly integrated addition to Senstar’s FiberPatrol line,” said Product Manager Stewart Dewar. “Now with its extended detection range, support for a variety of deployment applications, and simplified per-meter licensing, the FiberPatrol FP1150 is a comprehensive, market-leading, multi-purpose intrusion detection solution for sites of all sizes.” Low nuisance alarm rates Senstar’s FiberPatrol fiber optic technology features low nuisance alarm rates Originally designed for fence applications and offering intrusion detection coverage up to 10 km (6.2 mi) per processor, the FP1150 can now detect intrusions up to 80 km (49.7 mi) per processor for fence, wall-top and buried applications, and up to 100 km (62.1 mi) for pipeline and data conduit Third-Party Interference (TPI) detection. As well, to simplify planning and budgetary processes, Senstar has implemented a per-meter licensing model, allowing customers to license only the sensor coverage distance they require, but with the option to add additional coverage at any time. Other enhancements to the FiberPatrl FP1150 include upgraded processing specifications (CPU, memory), software support for redundant sensor units, and sensor unit versions for backwards compatibility. Senstar’s FiberPatrol fiber optic technology features low nuisance alarm rates, distinguishes between real threats and environmental disturbances, provides true detection of simultaneous events, offers cut immune configuration options, requires no power or data infrastructure in the field, is EMI and lightning immune, provides software configurable detection zones, and integrates with a wide variety of SMS/PSIM platforms.
Facial recognition technology has come a long way since it first came to market several years ago. Initially plagued with technical challenges and widely viewed as a futuristic solution, facial recognition is now firmly implanted in numerous consumer and business products and applications. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition, further expanding its use for an increasing number of applications. From a purely business perspective, facial recognition’s powerful identification and authentication capabilities make it ideal for two primary applications: first as a security tool, and second as a workforce management solution. The touchless, accurate credential solution Facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses Even before the COVID-19 pandemic, the touchless nature of facial recognition as an access credential was gaining traction with physical and cyber security professionals. By using an individual’s face as an access control credential, facial recognition eliminates the need and expense of physical cards and proximity devices, or the need to physically enter PIN codes. In addition, facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses by offering a highly accurate touchless access control credentialing solution. As a workforce management tool, facial recognition helps preserve the health of employees checking into work, while providing management with an infallible means of documenting employee time and attendance while providing a detailed history of overall workforce activity and individual personnel tracking. Both of which have been longstanding challenges due to easily compromised time tracking systems and practices. Now, nothing is left to question based on hard data. With the growing popularity of facial recognition technology, there are many choices already available with more undoubtedly on the way. Selecting the right solution for your specific access control and/or workforce management application is dependent on a very wide range of variables. But there are a few core characteristics that you should look for when evaluating facial recognition readers. Wide and near-angle LEDs Most facial recognition terminals employ some form of IR (Infrared) technology to help ensure high visibility by the unit’s image sensor. This often limits where the unit can be installed such as outdoors or near windows due to strong ambient light. More advanced facial recognition readers employ as many as 80 wide-angle near infrared LEDs and 60 narrow-angle near infrared LEDs, allowing the unit to recognize faces even in full daylight and brightly lit environments (not direct sun). This enables installation at indoor locations near windows, lobbies and building entries. 3D pixel intensity distribution analysis Another facial recognition reader advancement to look for involves three-dimensional pixel intensity analysis. Ambient lighting contains ultraviolet rays which can negate near infrared LED lighting, and can also cast shadows making it difficult for a facial recognition reader to pinpoint the facial recognition points required for identification and authentication. Three-dimensional pixel intensity distribution analysis minimizes the effects of ambient light when acquiring facial images by minimizing lighting contrasts. As a result, it is easier for the algorithm to recognize the shape of the face, enabling it to extract more facial features and create higher quality face templates, which are critical for accurate facial recognition. Functional ergonomics This results in a faster, more comfortable, and convenient user experience The angle and position of a facial recognition reader directly impact the performance of the unit. Facial recognition readers with different viewing angles for built-in visual and infrared cameras allows users to stand at positions that are most suitable for facial recognition with little or no effort of contortions. This results in a faster, more comfortable, and convenient user experience. High performance processing Like any intelligent edge device, the performance of a facial recognition solution is directly reliant on its processing power. New advanced facial recognition readers deliver exceptional performance by employing enhanced face template extraction technology combined with powerful processor. For example, a facial recognition reader with a 1.4 GHz quad-core processor can perform up to 3,000 facial database matches (1:N) within one second. More advanced solutions also feature Group Matching functionality capable of executing up to 30,000 matches within one second. Live face detection It is most important that the facial recognition readers you evaluate are capable of analyzing faces in real time to maintain fluid entry/egress even during high volumes of employee traffic. Hardware-dependent live face detection systems employing technologies such as facial thermogram recognition and facial vein recognition require expensive hardware components, provide less accurate matches and slower authentication performance, which is counterintuitive for mainstream access control and workforce management applications. Dual authentication for added security Although the use of an advanced facial recognition reader provides the convenience, health benefits and cost-savings of touchless identification and authentication, there are many applications where more than one credential may be necessary to ensure the highest levels of security. Advanced facial recognition readers with multimodal, multifactor credentialing capabilities provide this added security benefit. For example, facial recognition readers that support multiple RFID proximity devices supporting 125 kHz and 13.56 MHz provide varying degrees of protection and greater implementation versatility. Videophone or intercom capabilities Facial recognition readers with multifunctionality can solve several challenges with one solution Facial recognition readers with multifunctionality can solve several challenges with one solution. A perfect example includes devices with SIP (session initiation protocol) videophone capabilities which effectively eliminate the need and associated expense of installing separate intercom devices while adding another layer of security to one’s facility. The COVID-19 pandemic, and hopefully soon to follow post-pandemic world, have surely accelerated the need for highly accurate, cost-efficient, and reliable facial recognition technologies to help get people back to work safely. Selecting the right facial recognition solution for your specific access control and/or workforce management is now more important than ever before, making a little extra due diligence during the evaluation process a smart decision.
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line. How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location. Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.
With the pandemic still in full swing and no certainty as to when exactly it will come to an end, the world has been battling anxiety for months now. And with each day, circumstances change quickly and almost make it impossible to predict what will happen next, how events will unfold, and what actions to take in light of a new situation. But one thing is certain: the world has been shut down and paralyzed for way too long, and the eventual reopening is unavoidable – in fact, it’s well under way. In this situation, what is possible to control is how the world will continue reopening – and specifically, how to ensure the safest possible reopening that will ensure the return of some degree of normalcy to people’s lives and business operations, while also managing the risk of COVID’s spread in the most efficient way. Our highly digitised, technologically advanced world This is when the power of technology comes to rescue the day: what truly sets the global crisis we face today apart from other calamities that humanity has encountered over year is the fact that it has developed in a highly digitised, technologically advanced world where each day brings about innovations with a sole purpose to make daily life and operations easier and more streamlined. And among these, the star of the past decade has been artificial intelligence. The world has been shut down and paralyzed for way too long, and the eventual reopening is unavoidable – in fact, it’s well under way While AI has many avenues of introducing efficiency and fast problem-solving, there is one specific application that will further fuel the reopening of the world and successfully keep the spread of the virus abate. This “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. With such a level of sophistication that can ensure uninterrupted monitoring and analysis of large public spaces, these AI technologies can ideally operate best as cloud solutions to ensure a collaborative network with maximum scalability and widespread implementation. As these technologies increase in ubiquity and find their way into daily operations of businesses globally, the cost of the smart solutions will decrease proportionally to the growth of their reach. There are some highly specific ways to create this collaborative network of interconnected safety tools in the current climate. Here are some applications that have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. Maintaining social distancing practices The most important step everyone around the world has taken to contribute to the effort of slowing the spread of the virus has been social distancing. A six-foot-distance has become a new social norm that has quickly been adopted globally and become a habit to people who are naturally used to being close to others and socialising without giving distance a second thought. The star of the past decade has been artificial intelligence So, it is natural that such distancing measures take time to get accustomed to – and it is also natural that individuals may forget about them from time to time. To help maintain the six-foot distance between people at all times and give them slight nudges to keep the rule top of their minds, AI video technology can be trained to estimate the distance between individuals in public and commercial areas and identify the cases in which people get too close to each other. By notifying local merchants or authorities about such cases, the system can help ensure the safety of everyone in the area at all times while positively reinforcing the public to gradually get more accustomed to maintaining the distance and thus helping stop the spread of the virus. Detecting the virus through facial recognition Perhaps the straightforward application of such high-level technology is using video surveillance to identify persons of interest who have tested positive for the virus. Modern AI has the ability to identify facial features and characteristics with a unique level of granularity, making it possible to identify individuals whose records show they have antibodies from those who can be potential carriers of the virus. After the initial differentiation and identification, the system can then notify the employers and employees of the facility about the results of the conducted analysis and the pursuant results, allowing them to be more vigilant and take action where necessary to ensure a safe experience for everyone. PPE reinforcement Wearing a mask or some sort of face coverage in public spaces and especially within facilities (such as stores, for instance) has been - and will continue to be - a requirement for maintaining a safe and healthy environment for people to continue with their day-to-day lives and businesses to resume regular operations. To this extent, the object detection and identification abilities of smart cameras can further reinforce this requirement and ensure that the absence of protective equipment doesn’t go unnoticed. Essentially, these cameras can easily identify if an individual has coverage at any given point of time or not, notifying the local authorities about any risks immediately and helping them maintain necessary safety measures without having to interrupt their workflow or worry about missing a visitor without a mask. Detecting high temperature One of the key (and the most widespread) symptoms of COVID-19 is a high fever - a certain indicator of whether an individual may have been infected with the virus or not. While identifying fever with a regular human eye is nearly impossible, AI can do so at a fraction of time by quickly scanning body temperatures of any incoming individuals and determine whether it’s above CDC’s recommended temperature of 100.4F in order to determine the risk factor and notify the local authorities to take action. Modern AI has the ability to identify facial features and characteristics with a unique level of granularity This technology is a good tactic to objectively assess potential risks that come with elevated temperatures - and sometimes, the people themselves might not realize they might (unconsciously) be carriers of the virus and thus endanger the safety of others in their vicinity. The technology is yet another step towards ensuring a safer reopening of the global economy and a more streamlined way of getting back on track while minimizing the risk of spreading the virus further. It’s not all about the theory We have tested the described approaches in our own R&D campus in Europe. The latest release of the IREX cloud enables remote fever detection and monitoring of social isolation and mask policies with AI. We have integrated thermal cameras to detect people with elevated temperature and CCTV cameras for identification and notifying those who potentially ill. In case of any health threat, the venue manager gets an instant message with a picture and exact location. These preventive steps helped our employees return to the office months earlier than it's happening in other countries. Moreover, personnel coming back to the office by their own wish as now they feel a virus-free environment in the campus - even safer than in their own homes. Now we are launching a pilot project for a well-known pharmacy chain in Florida, USA. With the help of a Computer Vision platform, staff will be able to divide customer traffic into those with normal body temperature and those who come in with elevated temperatures, as well as effectively monitor social distance norms. The goal of our potential client is to maximize the safety of customers in the post-pandemic period. Also, IREX is already deployed across hundreds of locations in the UK and will add health monitoring capability soon.
In addition to providing the Northeast’s largest security trade show, ISC East will include free conference sessions and keynote speeches right on the show floor and several paid workshops. The Nov. 20-21 event at New York’s Javits Center will also include vendor solution sessions from Axis Communications, Hikvision and NAPCO. Wide variety of paid workshops An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees, and location of the sessions on the show floor means attendees don’t have to leave the exhibition to take in a session. The paid workshops include technology sessions about cyber terminology for physical security integratorsThe paid workshops include an Active Shooter Workshop and technology sessions about cyber terminology for physical security integrators; and basic installation and configuration of video surveillance solutions. An OSDP (Open Supervised Device Protocol) Boot Camp Short Course will also be offered. As a smaller show, the topics of ISC East conference sessions are broader and of more general interest, rather than organized into focused “tracks” as at ISC West. Attendance at sessions can provide continuing education (CE) credits with organizations that partner with ISC East – one credit for each hour-long session. Attendees can use their Certificate of Attendance from any session to self-report their education hours to relevant industry bodies: ALOA (AEU education credits), ASIS (CPE continuing professional education credits) and NICET (CPD Continuing Professional Development points). An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees Keynote sessions at the Main Stage The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management (on Day 1 – Nov. 20); and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration (FAA) (on Day 2 – Nov. 21). The two SIA Education@ISC East educational theaters on the show floor will be booked up both days with a variety of interesting topics. A new session covers penetration testing for physical security, presented by Michael Glasser of Glasser Security Group. A session on LiDAR (Light Detection and Ranging) sensors will be presented by Frank Bertini, UAV and Robotics Business Manager, Velodyne LiDAR. Another popular topic is Safe Cities, and FLIR will present a session on moving from secured to smart cities with intelligent, connected systems. New addition is Active Shooter Workshop The Active Shooter Workshop is a new addition to the ISC East program. It has been a popular session at ISC West for three years now. At ISC East, presenters of the workshop will be David LaRose, System Director Public Health, Lee Health; and Ben Scaglione, Director of Healthcare and Security Programming, Lowers and Associates. At the end of the workshop, an additional hour of programming will be the “Stop the Bleed/Save a Life” session presented by Jerry Wilkins, Co-Owner of Active Risk Survival. The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management, and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration Woman in Security event A Women in Security Forum breakfast event will be held on Nov. 21 (Thursday). It’s the second annual event and this year will focus on diversity and inclusiveness in the workplace of the future. Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”Moderator Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce.” Panelists are Lisa Terry of Allied Universal, Andrew Lanning of Integrated Security Technologies, Elaine Palome of Axis Communications and Dawne Hanks of Milestone. The Women in Security event is likely to attract up to 100 attendees. SIA’s Women in Security is an active organization, with monthly meetings and a newsletter that recognizes prominent women in the security industry. “It’s really a group for both men and women,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. “There are many programmes, recruiting efforts, and professional and networking opportunities. They are a robust group of people who are active in making a difference. It’s important to support women in the security industry, which is 95% male, and to develop a new generation of women to be a part of the industry’s future.” The keynote addresses at ISC East will also highlight two high-profile women.
ISC East continues to flourish as the Northeast’s largest security trade show. Focused on the big Tri-State market and overall Northeast sector vs. the flagship ISC West event in Las Vegas in the spring, the International Security Conference & Exposition at New York’s Javits Center will be held Nov. 20 and 21. “Anybody who has been to the show has commented and seen the growth,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. Ninety new exhibitors When the show opens, there will be around 90 new exhibitors, including Gunnebo, Mobotix, Liftmaster, Cypress Integration Solutions, SAFR from Real Networks and Security Brands. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnelLarger exhibitors at the show include Brooklyn Low Voltage Supply (distributor), Axis Communications, DoorKing Inc., NAPCO Security Technologies, and All American Monitoring. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnel eager to meet with security professionals from the Northeast corridor. ISC East will be co-located with the Infosecurity ISACA North America Expo and Conference. The combination provides a comprehensive approach to physical and cyber security products and services. Rapid growth in past three years The audience at ISC East is unique – about 90% of attendees do not attend ISC West. The show has seen rapid growth in the past three years, and attendees report a new energy and passion among exhibitors and attendees. By every measure, the show will be bigger than last year, while maintaining the intimate, smaller vibe of a regional show. A “Crack the Tap” cocktail reception will be held at the end of the first day on the show floor. A charity activity on the ISC East show floor will be presented in partnership with Mission 500, an organization that works to serve the needs of children and communities in crisis. At the Mission 500 booth which will be adjacent to the Main Stage, each exhibition attendee will be invited to create a “care package” of essential hygiene items that will be delivered to children and families in need, in partnership with Volunteers of America - Greater New York. Attendees may write a note of encouragement to be included in the package they assemble. Event will highlight security startups A Nov. 20 (Wednesday) session at ISC East will highlight startup companies in a format reminiscent of television’s “Shark Tank.” Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service. After the “Tech Tank” presentations, audience members vote live on their mobile app for their top choice, and the winner will be announced during the “Crack the Tap” cocktail reception.Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service “It’s a program that allows attendees to see and hear about cutting edge technologies,” says Nicole Miller, Senior Conference Manager, ISC Security Events. The four finalists, chosen from more than 40 exhibitor submissions, are Arrow Labs’ MIMS Smart Watch for mobile incident management; Cepton Technologies’ Helius Smart LiDAR System; SAFR from RealNetworks’ Facial Recognition system, and ZeroEyes’ Weapons Detection and Active Shooter Mitigation Platform. New partnership with ASIS New York Beginning in 2020, ISC East will be combined with the ASIS New York chapter’s annual conference and expo, which was held in May this year. Starting next year, the events will be rolled into one industry-wide expo and education event geared to serving the total security industry in the tri-state area (New York, New Jersey and Connecticut). In 2020 there will be an enhanced education program along with the combined event next fall. In recognition of the new partnership, ISC East is involving the ASIS NYC chapter in this year’s show, too, with a booth on the show floor, and promotional logos and signage. The ASIS chapter will have a table at the SIA Honors Night event on Nov. 20. “We are really involving them this year to show we are working together and partnering going forward,” says Shaughnessy.
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a large corporate end user who represents a key demographic for show organizers – bluntly suggest that healthy skepticism was on display side-by-side with the promotional energy in play.On this floor, there are some lies being given out. Ask the tough questions, make the exhibitors show you" “On this floor, there are some lies being given out,” said Rudy A. Wolter, CTO, Security and Investigative Services for Citigroup, a financial services corporation. He advised fellow attendees to “listen for them, ferret them out, ask the tough questions. Make [the exhibitors] show you.” “Don’t be afraid to ask these men and women questions,” added Wolter. “Don’t be afraid to challenge them. If you don’t challenge them, they’re not getting any better which means we aren’t getting any better. At the end of the day, they’re the leaders; they’re the ones making change; they’re the ones touching systems; they’re the ones helping integration.” Banking security with Verint At Citigroup, Wolter oversees 1,300 bank branches in North America that use Verint systems, including 23,000 cameras tied into a single command center. Skepticism aside, Wolter also provided evidence that even tough customers can be brought around. Specifically, he is sold on Verint: “When you have a problem, this company listens,” he told attendees at a Verint gathering on the show floor. New at GSX 2019 is the Verint Video Investigator, which is software that empowers investigators to quickly find the data they need to identify security threats in near real-time. In all, Verint serves in excess of 2,300 individual financial institutions, with tens of thousands of branches. Wolter was one of several end users willing to sing their praises publicly. Other GSX exhibitors were also proud to have their own real-world success stories. Placing the emphasis on outcomes At GSX, I heard more than once that outcomes are more important than technologies. Customers don’t want to hear about technologies, but rather about what those technologies can do for them. Avigilon, now a subsidiary of Motorola Solutions, is another company that is focused on outcomes rather than technology per se. “Instead of focusing on megapixels and terabytes, the end user is focused on perimeter security, loss prevention and risk management,” says John Kedzierski, Sr. VP of Video Solutions at Motorola Solutions. “We are working to provide that outcome." The end user is focused on perimeter security, loss prevention and risk management" How operators work to ensure outcomes is another aspect that is changing, says Kedzierski. “Watching video is obsolete,” he says. Using Avigilon’s new system, the operator instead is looking at color-coded hexagons; one color means motion, another means an analytic event. Operators click on various hexagons to view video. Also at GSX 2019, Avigilon featured its new H5A camera line, with expanded object classification analytics, detailed object detection, and tracking in crowded scenes; and focused on the Avigilon Blue cloud system. They are working to make every camera capable of detecting faces, which can be matched to a watch list. How technology addresses marketplace changes Addressing the changing marketplace was another GSX theme. As the workplace changes, ASSA ABLOY Americas is adapting its technology to address new employment practices such as "hot-desking," and remote and mobile workers, says Peter Boriskin, Chief Technology Officer. Systems have to be able both to protect assets and also to provide flexibility to accommodate the changing workforce, he said. Corporate acquisitions are directly expanding the capabilities that ASSA ABLOY brings to the market. For example, they recently acquired Luxer One, a locker company that enables secure delivery of packages without customers needing to stand in line or wait for service. Deliveries can be made in seconds. Peter Boriskin of ASSA ABLOY Americas led a booth tour, including new power capabilities gained in the acquisition of LifeSafety Power Another recent ASSA ABLOY acquisition is LifeSafety Power, which is expanding the company’s capability to provide proactive data on wired systems by tracking power usage. For example, a spike in current might mean a problem with a component. Compiling “intelligent triggers” enables creation of a dashboard to provide analytics of wired systems. ASSA ABLOY has also been devising predictive analytics of wireless locks to predict battery life, for instance, and to address other maintenance challenges. “We want to know what’s going on at a door without visiting it,” says Boriskin. New exhibitors make their mark New exhibitors were part of the GSX mix. One new exhibitor was Vaion. It’s their first trade show after launching at IFSEC in London in June. Vaion combines a small camera portfolio with on-premise servers and software managed through the cloud for an end-to-end solution. Tormod Ree, co-founder and CEO, calls it a “hybrid cloud delivery model”. Vaion is also a “more proactive security model,” said Ree. Video is analyzed for anomalies, and the server “learns” what is normal and not normal. The system provides alerts and notifications, occupancy counting and traffic control, among other features. And “overlays” are employed to present information on a map. Vaion can highlight video that is more likely to be relevant and prioritize feeds that have more activity. Vaion designs the hardware, which is manufactured in Taiwan. Vaion was a first-time exhibitor at GSX 2019 with their end-to-end video system; Tomod Ree is co-founder and CEO Gunshot detection technology EAGL Technology displayed their “Firefly” gunshot detection technology at GSX 2019. Based on technology originally developed for use in the military for sniper detection, the U.S. Department of Energy adapted it to civilian uses after the Sandy Hook School shooting. Boaz Raz, CEO, said the technology is the “most advanced and affordable, wireless for use indoors or outdoors, and it can control doors and cameras”. It doesn’t “listen” for gunshots like some competitors; rather it measures energy for “6 sigma” accuracy (almost 100%). Defining, and redefining, end-to-end solutions End-to-end solutions were all the rage at GSX 2019, but Allied Universal was one exhibitor that pondered what, exactly, is an end-to-end solution? It means different things to different people. For example, a video company’s end-to-end solution would not include access control. When Allied Universal claims to offer an end-to-end solution, they mean it in the broadest definition of the term, including all security systems deployed for a customer as well as the important human element (i.e., manguarding). “The industry’s emphasis on ‘end-to-end’ doesn’t encompass a full solution,” says Mike Mullison, Allied Universal’s Chief Information Officer. “When somebody uses the term end-to-end, you have to ask: What’s at both ends?” The lines between cyber and physical threats are blurring. Clients want full-service solutions" “The lines between cyber and physical threats are blurring,” adds Mullison. “Clients want full-service solutions.” Allied Universal is adding new technology elements to its offering, and Mullison says “the next phase of growth will be fueled by technology.” Allied Universal recently introduced the Heliaus product, a smart phone app that accesses an analytics engine to predict outcomes and prescribe optimum responses. It literally puts technology in a security guard’s hand. One customer has found that use of the technology resulted in a 20% reduction in safety and security incidents. The latest in access control among exhibitors In addition to video, access control had a big profile at GSX 2019, as evidenced by ASSA ABLOY America and many other companies. Another example is SALTO Systems, featuring its new NEO cylinder for wireless access control and the SALTO Virtual Network (SVN); the SVN-Flex extends and increases the number of updating points directly to the door. The SVN-Flex extends and increases the number of updating points directly to the door The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, or sliding doors. Low energy consumption results in 110,000 cycles with just one set of batteries. Other SALTO products are SALTO KS (Keys as a Service); SALTO BLUEnet Wireless for Bluetooth RF-driven real-time control of doors; the XS4 One Deadlatch stand-alone electronic lock; and JustIN Mobile, which replaces the need for an access card by securely sending a mobile key Over the Air (OTA) to an iOS or Android device from SALTO’s ProAccess SPACE management software. The next step in integration A new company reflecting the GSX emphasis on integration is Security and Safety Things (SAST), which is still in launch mode but expects to have its first pilot customers in the Q4. The first camera vendors embracing the SAST platform will have cameras for sale at ISC West in the spring. SAST is creating an Internet of Things (IoT) platform for the next generation of security cameras. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphones.SAST is creating an IoT platform for the next generation of security cameras “SAST is a technology platform, but it is also a business platform and a relationship platform,” said Emmanuel Ventadour, VP Sales and Marketing. For app developers, SAST also provides non-technical commercial services (i.e., easing their route to market.) Hartmut Schaper, CEO, emphasizes the “openness” of the company. Even though they are a spinoff of Bosch, they are treating every camera manufacturer equally, he says. For integrators, the use of apps can expand their field of play. Apps will empower integrators to use video for more business processes – not just security – and expand their reach with customers, says Schaper. From skepticism to sales There were plenty of product claims at GSX to feed the skepticism of even the toughest of potential customers. Fortunately, product claims were only the beginning of conversations with attendees at this year’s show. No doubt manufacturers were put through their paces more than once, and a few of them even came out on the other side with potential new business to show for their efforts. That’s the true measure of success at GSX 2019, or any trade show. Click here to read our reviews from Day One and Day Two of the show.
Commenced in 2016, the large business club was built with smart infrastructure and modern amenities, in the futuristic town of Kolkata, to provide leisure-cum-business conducive atmosphere to their members and visitors. The contemporary building of business club is spread over 10 acres area and serves as a cultural, commercial, and business hub in the region. Having a beautiful landscape, it attained tremendous popularity due to its high-end specifications, green landscape, wedding lawn, tennis court, cafeteria, business center to name a few. Missing real-time video surveillance With a consistently large volume of patrons visiting the business club for various events, security is the vital component of the successful operations at the site. The customer has been relying heavily on analog video surveillance to secure its facilities and workforce. Due to its limited scalability, there was no way to do real-time surveillance throughout the premises. Moreover, every incident recorded by the video cameras required time-consuming manual investigation, therefore, causing delay in decision-making. Aiming to advancing the surveillance solution, the customer wanted to make an investment to maintain a watchful eye, manage threats/incidents proactively along with integrate existing and new system into the unified interface. Videonetics Unified Video Computing Platform Intelligent Video Analytics (IVA) is helping operators to detect vehicles wrongly parked in ‘restricted’ or ‘no parking’ zones After a thorough evaluation of various solution offered by various companies, it was Videonetics that came out on top. Thanks to Videonetics Unified Video Computing Platform (UVCP™) that blends Intelligent Video Management Software (VMS), Intelligent Video Analytics and seamless integration of existing analog system into one user-friendly solution, able to grow effortlessly with customers’ need over time. Incident response management Videonetics Intelligent VMS is managing 100+ cameras including PTZ network camera, dome cameras, fixed cameras, and bullet cameras, installed throughout the interior as well as exterior of the premises. In addition, 32 legacy analog cameras are also integrated into the unified solution, eventually providing centralized control of the cameras to the security operators. The in-built failover and redundancy features of Intelligent VMS ensure the operators to always have access to live and recorded video. This means if any incident occurs, they can always have evidence of it. Zero Blind Spot at Entrance The Intelligent Video Analytics (IVA) is helping operators to detect vehicles which are wrongly parked in ‘restricted’ or ‘no parking’ zones, at the outside of premise. For the perimeter security at entry & exit gates, the PTZ camera tracking helps in detecting unusual behavior of the person and provides alert to security operators for faster action. At the entrance, face capture has been installed to detect a person in the scene and locates his/her face, which is saved in the database, indexed and time stamped. In addition, vehicle capture is deployed to track and record license plates of vehicles along with time and date, entering the premise. Zone monitoring Operators will be notified if a person stays beyond a certain duration in a user-marked zoneThe business club needed a solution that could help it identify theft, intrusion and trespassing throughout its facilities. In the first phase of the project, Videonetics along with stakeholders of business club and system integrator identified sensitive areas, that requiring immediate security system. To monitor suspicious activities, zone monitoring has been enabled at the fence of tennis court, lawn, emergency gates and open field area. Operators will be notified if a person stays beyond a certain duration in a user-marked zone. To combat unauthorized entry in generator room, operators gets alert if any intrusion happens in a marked area. Similarly, unusual activities are also being monitored in this area through loitering detection. Trespassing detection Operators can handle alarms and manage events, reducing manual checks of cases and helping to expedite investigationsAt the peripheries of the business club, trespassing detection has been deployed to detect if any person intrudes into a premise. The system is well capable to trace trajectory of the trespasser and prevent incident before it occurs. The authorities wanted to have alert in case any mob formation happens at the field area, known as forbidden region, of the club. Crowd formation detection has been deployed that estimates density of people in a scene and generated an alert as soon as the density in any defined area crosses a certain limit. Empowering with Cellphone application The ease of use of Videonetics unified solution has been instrumental to the business club. The operators and senior authorities are efficiently accessing videos anytime and anywhere, thru an intuitive interface of IVMS web and cellphone applications. At the time of incidents, operators can handle alarms and manage events, therefore, reducing manual checks of cases and helping to expedite investigations. After various phases of implementation, installation, and testing, the Videonetics unified solution went into live operation. Since upgrading to Videonetics unified solution, the business club has been able to better handle incidents of thefts/intrusion and apprehend suspects. Therefore, the level of security has been lifted by allowing the early detection of incidents and monitoring the premises round-the-clock, even in the harsh environmental condition. Furthermore, the added layer of security has been significant in business club’s efforts to attract more members and sustain business relations with existing members. Detecting patterns Now the operators use the information being collected in the unified interface to better understand the environment. They are successfully detecting patterns on how visitors/members access and move through the club. Thus, using these insights to develop strategies that maximize the use of space and keeps everyone safe. The open architecture of Videonetics unified solution allows customer to integrate with third-party systems such as access control, emergency system and much more. “To go from conventional to a professional and scalable surveillance system was a huge improvement for our client. It has enhanced our client’s reputation for providing safe and secure environment to visitors, employees, and members. Commendation to Videonetics for providing their unified video computing platform that empowered security operators by improving their efficiency in monitoring the premise and handling threats swiftly. I deeply appreciate their dedication and untiring efforts for making it a reality”, said Gaurav Das, Director, Webdesk Technologies Private Limited.
Airports are transportation hubs often located within close proximity to hotels, eateries, retail stores and sports venues. For this reason, large airports can have thousands of people approach their perimeter each day. With such a high throughput of people, security technology that detects and deters external threats is essential. When it comes to intrusion detection systems, there are several technology options, including buried pressure sensor cables, fiber optic sensors and behavioral analytics. However, an effective solution seeing increased adoption recently are thermal imaging cameras with built-in analytics. Lessons can be learned from integration firms like Ojo Technology, who oversaw the deployment of a FLIR perimeter intrusion detection system (PIDS) at Norman Y. Mineta San Jose International Airport (SJC) in 2017. Here are four advantages of thermal cameras that Ken Castle, vice president of business development at Ojo, described based on the SJC deployment. Video analysis and monitoring Thermal cameras produce images based on heat signatures rather than light. Consequently, thermal cameras capture video in total darkness, see through foliage and perform in adverse weather conditions like rain, wind and smoke. Thermal cameras provide a significant advantage for airports. As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images “The combination of darkness and distance demands a different solution, one that can be provided by thermal imaging cameras,” said Castle. “These need no auxiliary illumination, and their field of view can extend for hundreds of feet.” low false alarm rates As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images ideal for video analytics, detection and classification. “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement,” Castle explained when discussing the PIDS project at SJC. Visual proof to provide qualified alerts Deploying thermal cameras in a PIDS project provides video verification for each alert. Thermal cameras provide the data and visual confirmations that are lacking from traditional fiber-based ‘shaker fence’ systems" “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fiber-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle said. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds — none of which pose security threats. Those incidents then need to be independently confirmed by cameras. That takes extra steps and therefore consumes what could be valuable time.” Long-range detection and flexible coverage Airport perimeter solutions must have the ability to monitor vast exterior areas, from the parking lot to the terminal to the tarmac to the hundreds of portals in between. Thermal cameras provide that long-range monitoring capability. Castle reiterated this point when describing the FLIR solution deployed at SJC. “The FLIR perimeter camera system is designed to identify any attempted breaches by individuals who might try to gain access to the tarmac or aircraft from outside of the airport boundaries,” Castle said. “It also provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter. Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced.”
When it comes to airport security, there is a critical need for technologies that detect exterior threats and protect the perimeter. By using an advanced FLIR perimeter intrusion detection system, airports receive unmatched threat recognition, target tracking, perimeter defense and response capabilities. The result is greater efficiency, exceptional safety and enhanced customer experience for passengers, employees, aircraft and facilities. Norman Y. Mineta San Jose International Airport (SJC) is the gateway to Silicon Valley, providing transportation to 15 million passengers annually. SJC is recognized within the industry as one of America’s fastest‐growing major airports over the past four-year period, based on percentage increase in passenger seat capacity. Perimeter security upgrade Located in San Jose California, SJC is a robust engine of economic stimulus, transportation and international commerce. The airport is within an 18-mile radius of 6,600 technology companies in Silicon Valley and serves travelers employed by many of the world’s Fortune 500 enterprises, including Apple, Google, Facebook and Intel. Ensuring secure operations is critical to the success and customer experience of SJC users. The airport occupies 1,050 acres of land and its perimeter spans six miles. With such a vast property and a high throughput of traffic, protecting the perimeter from external threats is essential. Driven by high-profile intrusion incidents, perimeter security has become a top priority for airports in recent years. From 2004-2016, there were 345 perimeter breaches at 31 major U.S. airports, according to a report by the Associated Press. Like many airports around the country, SJC also faced challenges and crises of illegal trespassing of unauthorized individuals, despite the airport meeting all federal security regulations. This raised concerns about passenger safety. Mineta San Jose International Airport With a heightened need for better perimeter protection, SJC launched a multi-million dollar, three-phase initiative to upgrade its entire outdoor perimeter security system. The first two phases focused on physical upgrades to the fence line, raising 10,000 linear feet of fence from seven feet to 11 feet in critical areas of the airport. FLIR Elara FC-Series ID, ioi HD Analytics, Triton PT-Series cameras with FLIR Latitude Network Video Management System FLIR Elara FC-Series ID, ioi HD Analytics and Triton PT-Series cameras with FLIR Latitude Network Video Management System provide multiple layers of protection. Phase three was designated for fence technology enhancements through state-of-the-art video surveillance and detection systems. “In response to the cluster of perimeter breaches within a relatively short time period, our evaluation showed that the airport perimeter, with its seven-foot-tall fence, was indeed technically in compliance with current federal security requirements,” said Airport Deputy Director of Operations Bob Lockhart. “However, we also recognized some opportunities to improve the effectiveness of our perimeter, both from a perception perspective, as well as an actual strengthening of some of our perimeter,” he continued. Trial with various security solutions To find the best fence line analytic detection technology, SJC consulted National Alliance for Safe Skies, Inc. (Safe Skies), which is a federally funded non-profit organization that assists airports in the research, testing and evaluation of security technologies. SJC’s partnership with Safe Skies began in 2014 when the non-profit first discussed the airport’s perimeter security needs. Safe Skies was later tasked to review a variety of perimeter defense systems to determine what solutions would be most effective at SJC. Safe Skies tested and evaluated six different types of technology on-site including, thermal cameras, thermal cameras with video analytics, behavioral video analytic systems, pressure sensor buried cables, laser detection systems and wireless cameras. Each system was tested for two weeks, and Safe Skies presented a performance report to SJC for each one. After a detailed analysis, SJC selected an end-to-end perimeter intrusion detection system (PIDS) from FLIR Systems Inc. FLIR PIDS solution The FLIR PIDS solution is composed of 57 FLIR Elara FC-Series ID thermal analytic cameras and 50 FLIR ioi HD Analytics Bullet cameras along the fence line. The system also includes four FLIR Triton PT-Series dual sensor cameras with thermal and visible light sensors with pan-tilt tracking. For the SJC deployment, Latitude VMS integrates with the Software House’s C-CURE access control platform All of this technology fully integrates into the existing FLIR Latitude Network Video Management System, which is part of the FLIR United VMS family of products. As an ONVIF Profile S compliant platform, Latitude VMS enables seamless integration with edge devices and third-party systems. For the SJC deployment, Latitude VMS integrates with the Software House’s C-CURE access control platform. Distinguishing between an animal and human “The additional thermal and infrared camera coverage has greatly enhanced our abilities to detect unauthorized activities around the perimeter of our airfield,” Lockhart explained. Ken Castle, Vice President of business development at Ojo Technology, the systems integrator for the project, also described the advantages of the FLIR thermal technology. “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fiber-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle explained. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds—none of which pose security threats.” Castle continued, “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement. The viewing trajectory can be narrowed to cover just the fence, or widened to include territory in front of or behind the fence. The bottom line is that thermal analytics provide definitive visual information and virtually eliminate unnecessary or inconsequential alerts.” Thermal cameras continue to be the industry standard for 24/7 perimeter monitoring and the technology is a key part of SJC’s PIDS solution. Installation of a perimeter fence technology system In September 2016, the U.S. Department of Transportation and the Federal Aviation Administration awarded SJC an $8.1 million grant for the design, purchase and installation of a perimeter fence technology system. Deployment of the FLIR PIDS solution began shortly thereafter. The project had an initial 150-day or a five-month turnaround with work beginning around the holidays in December 2016. As the systems integrator, Ojo Technology oversaw the phased commissioning of the project. Ojo engineers preconfigured the cameras and servers, programmed the analytics for all thermal cameras, tested the functionality of each camera under a variety of lighting conditions, and worked with the airport security command center and its systems subcontractor to incorporate the new cameras into the existing network. Installation was completed in the fall of 2017, and, afterward, Ojo worked closely with FLIR and SJC to fine-tune the system for optimal functionality. Integrator for PIDS “With such an aggressive schedule, Ojo Technology was instrumental in seeing the PIDS solution deployment through,” said Daniel Gundlach, Vice President and General Manager of security at FLIR. “Likewise, the collaboration, technical skill and ingenuity among the FLIR, SJC and Ojo teams was remarkable and a key reason why the project is such a success.” Upon detection of an object approaching the fence line, the FC-Series ID thermal camera, initiates an analytic alarm hand-off “The success of a technical solution like the San Jose Airport PIDS project is dependent upon a strong partnership among all participants—from FLIR as the manufacturer to the integrator to the end user,” said Neil Roberts, FLIR security director for the PIDS deployment. “In this case, all parties were committed to seeing this project through to the end and addressing any technical needs that arose along the way.” Threat recognition and response The advanced FLIR PIDS solution is designed to deliver superior threat recognition and response. Upon detection of an object approaching the fence line, the FC-Series ID thermal camera, initiates an analytic alarm hand-off to the PT-Series camera for auto-tracking. The FLIR HD cameras provide a color visual of the target for identification and verification. Through Latitude VMS, security operators manage response capabilities such as alarm functions, notifications and real-time interactive alarm maps. Video monitoring with perimeter intrusion detection “SJC has used FLIR cameras and Latitude products for many years,” said Lockhart. “We appreciate our FLIR end-to-end solution and the ability to expand our current camera system with new perimeter cameras to enhance our current video monitoring and provide additional perimeter intrusion detection.”The safety of passengers, airline employees and service workers is greatly enhanced" A defining feature of the airport’s PIDS solution was that all technology components were provided by FLIR, which created an advantage for integration and solution performance. Open platform software management system “An all-FLIR system provided a tight integration to accomplish the goal of heightening security for the airport,” Castle said. Castle continued, “In theory, an open platform software management system can accommodate a variety of camera manufacturers and models in addition to ancillary security systems such as access control, intrusion alarms, public address and intercom systems, and blue light emergency phones. However, in actuality, the integration of various third-party components can be challenging as different brands of firmware in varying camera models and manufacturers don’t always provide consistent levels of performance, such as resolution and other features. This can be avoided entirely by deploying one end-to-end solution from a single manufacturer.” “The upfront and early design services that FLIR offers through sales support engineers and through our Raven Site Planning Tool help reduce the risk of non-conformance and ensure design stays on budget. The end result is optimal system performance and peace of mind,” Roberts from FLIR explained. “At FLIR, we strive to be the airport’s trusted partner not just for today’s security needs, but also for the future.” Enhanced security and safety at the airport “The solution provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter,” Castle said. He added, “Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced, and the expanded situational awareness gives the airport more options for responding to potential areas of concern.” Having successfully implemented a robust FLIR PIDS solution to protect the airport perimeter, SJC plans to execute more security improvements on the interior side of the airport. Future upgrade SJC has a robust network of security cameras throughout ticketing areas, Transportation Security Administration entry points, terminals, concourses and additional newly built airport areas. The airport is continually evaluating camera locations for upgrades to newer equipment to provide increased coverage or higher resolution camera views. Storage archivers and updated client workstations are also planned for as budgets get approved. By partnering with FLIR, SJC is able to utilize the advanced technology available on the market to provide safety and security and ensure the airport remains a thriving transportation hub that attracts new travelers.
OPTEX Teams up with Mobile Pro Systems to create a Rapid Security Deployment Solution for a high-end condominium builder in Extreme Weather Conditions. The solution was required for a large construction site for Cove Properties, one of Alberta, Canada’s premier luxury condo builders. Weather conditions With many developers and construction companies building throughout the year, they're forced to battle a myriad of different weather conditions including rain, sleet, snow and extreme cold. On top of this, they still face the inevitable problem of theft and vandalism. Theft of tools, machinery, new materials and scrap material cost contractors millions of dollars per year and leaves the construction companies and their sub-contractors with the effect of having to deal with their losses. The general contractors and developers feel the chain reaction as well, as they have to deal with higher insurance premiums and weeks and months of project delays. To avoid the major effects of construction site theft, Cove Properties turned to 2020 Digital Security Solutions of Alberta, Canada for help. Cove’s requirements included a mobile solution capable of wireless communication that could be moved from site to site with surveillance, motion detection, lighting and remote monitoring capabilities. In addition, it had to survive the harsh outdoor elements of Northern Canada. Powering network and surveillance solution 2020 Digital Security Solutions took all of Cove’s requirements into consideration and found the perfect solution in the PowerSentry by Mobile Pro Systems. The PowerSentry is a self-sufficient, temporary, semi-permanent or permanent surveillance solution. Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole Built as a “power platform”, it can power anything from surveillance, security, communications and/or network technologies. And with its universal mounting options, the PowerSentry can be mounted to a pole, a wall or tripod or can be easily hooked over a fence or roof parapet for superior mobility. It accepts 90-277VAC to minimize re-wiring and is equipped with a high quality Lithium-Ion battery pack as a backup power source due to loss of power or power outages. In addition, the PowerSentry has a unique remote system status and control software called Power Broker, which monitors the PowerSentry’s battery voltage, current power usage, displays active map GPS monitoring, intrusion detection reporting, warning and flood lighting control and horn/speaker control. Motion-activated floodlights To help solve the limited daylight obstacle, 2020 DSS had two 8,000 lumen LED flood lights mounted to the chassis of the PowerSentry. The LED floodlights are motion activated and have a pre-determined setting of how long they will stay on. The lights can also be turned on and off manually through the Power Broker software. “Due to the short amount of daylight during the winter months, the flood lights will help light the site in the evening hours and after hours if there is a breach in the perimeter,” said Gene Telfer, president of 2020 DSS. The perimeter and the interior of the construction site is protected by an Optex RedScan laser perimeter detection device which was connected to the PowerSentry and mounted 8’ below providing a 200’ horizontal area of detection. “We decided to mount the RedScan below the PowerSentry instead of on it because we will get a wider detection range and a firmer detection trigger,” Telfer said. Optex Redscan laser detectors With abnormal cold temperatures hitting the Northern United States and almost all of Canada, the first test was in late December into early January when normal temperatures fell to -40°F and -60°F with the wind chill. “The systems are working great and we haven’t had a system go down at all,” Telfer said. According to Telfer, Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole that made installation very quick and easy. They are using Milestone video management software that integrates with the cameras and Redscan laser detectors for visual verification and event response in one platform.
From simple thefts of copper wire from light fixtures, to substantial damage to rooftop HVAC systems, copper continues to be stolen from everywhere that it is readily available. When a church in Georgia began feeling the effects of copper theft, the integrator associated with the property's interior security once again turned to OPTEX for help. The church utilized both rooftop and ground level HVAC systems, with easy access to each. Changing security needs Because of labor and cost associated with wiring, along with the difficulty bringing power to the rooftops, the Regional Sales Director for OPTEX recommended the iSeries line of battery-powered, wireless PIR's. The iSeries detectors offered spot and curtain protection for all HVAC units while also securing all access points to each. For future consideration, the addition of the wireless feature also allows the integrator to relocate and easily adjust the detectors based on changing security needs. With the system in place, copper and other related thefts have been eliminated and the end user can now respond quickly before any damage is done. All of the battery-powered, wireless detectors from OPTEX come with an empty backbox and work with most manufacturers' wireless transmitters. Narrow detection areas OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter When one selects the iSeries version, OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter. One less time consuming step to do for the installer! The iSeries HX-80NRAMi is an 80' x 6' high mount, battery-powered, outdoor passive infrared detector with Anti-Masking. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. The iSeries BX-80NRi is a 3' x 80' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. With it's long, narrow detection areas that extend from both sides, the battery-powered BX-80NRi is specifically designed to be wall-mounted centrally on a building or HVAC unit. Passive infrared detector The iSeries VX-402Ri is a 40' x 40' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed, and the dual PIR's create two detection areas (upper and lower) that must be compromised simultaneously in order to go into alarm. OPTEX has addressed and met the need for a line of easy to install, stable outdoor detectors that will deter and ultimately prevent copper theft.
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilizing indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
In the analog era, videotape was the storage media of choice for CCTV systems. Since the advent of digital video, and of IP-based systems, a variety of other storage formats have come to the fore, including hard drives, flash drives, SD cards and others. Now we are in the age of the cloud, which offers new opportunities to store vast amounts of video and presents challenges such as bandwidth and cybersecurity. For a current perspective on storage, we asked this week's Expert Panel Roundtable: How are new developments in video storage impacting the video surveillance market?
Video motion detection: Manufacturers & Suppliers
- Avigilon Video motion detection
- Dahua Technology Video motion detection
- Axis Communications Video motion detection
- Bosch Video motion detection
- eneo Video motion detection
- IDIS Video motion detection
- REDWALL Video motion detection
- Hanwha Techwin Video motion detection
- Climax Technology Video motion detection
- Panasonic Video motion detection
- Dedicated Micros Video motion detection