Video motion detection
Ring, whose mission is to make neighborhoods safer, announced Ring for Business to provide business owners with the ability to protect their companies with Ring Alarm and Ring Video Doorbells and Security Cams the same way that homeowners have been doing for years. Small businesses are an integral part of our communities and, thanks to Ring, they now have access to smart, DIY security that’s free from long-term commitments, hidden fees and professional installation. With Ring for Business...
Johnson Controls has updated its popular Illustra Pro camera family with a new generation of Illustra Pro Mini-Domes featuring Smart Wide Dynamic Range. Offering a choice of 2, 3, 5 and 8 megapixel models and a variety of lens options, the new Pro Mini-Domes are ideal for a wide range of deployments in both medium and large-sized facilities. Smart WDR technology This new Smart Wide Dynamic Range (WDR) technology built into the new Mini-Domes greatly improves the quality of images captured in v...
Prey Inc., provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Prey for Education, a mobile security feature-set offering developed to address the needs of K-12 and higher education environments. Co-designed with partnered schools, Prey for Education centralizes and automates mobile device security management so that hard-pressed school IT staff can delegate and automate tasks and ease their workflow. This initial featu...
Using AI to bring focus to security, Avigilon Corporation, a Motorola Solutions company, has announced that it will once again be showcasing some of its latest and most innovative products and technologies at GSX 2019. Avigilon will showcase the next generation of video analytics, artificial intelligence, access control and cloud solutions, as well as some of the integrations with Motorola Solutions. Cutting-edge video analytics and AI Avigilon will be demonstrating how these latest technologi...
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education ma...
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from in...
ExtraHop announces ExtraHop® Reveal(x) Cloud™, a Software-as-a-Service (SaaS)-based network detection and response (NDR) solution for the cloud-first hybrid enterprise. Reveal(x) Cloud provides deep and continuous visibility, enabling Security Operations (SecOps) teams to analyze every transaction, detect threats, and respond to attacks to gain control over their hybrid attack surface and protect their investment in the cloud. While the cloud has proven to be a force multiplier for DevOps and IT Ops, for SecOps teams already struggling under the burden of a sprawling attack surface and a shortage of skilled analysts, adopting cloud platforms can be a vulnerability. With SecOps taking the blame for stalled migration efforts, enterprises are recognizing the need to take a cloud-first approach to securing elastic workloads rather than trying to retrofit old practices to new technology design patterns. Investigate complex threats Without native network visibility in the cloud, enterprises have been limited to log- or agent-centric tools Without native network visibility in the cloud, enterprises have been limited to log- or agent-centric tools, making it difficult to detect and investigate complex threats in a timely manner due to lack of continuous visibility across all environments. Reveal(x) Cloud is a SaaS-based solution that provides security teams with a zero-infrastructure service for AWS that deploys quickly, delivers immediate asset discovery, and offers threat detection, investigation, and response. The solution takes advantage of new enterprise features introduced by AWS during AWS re:Inforce 2019, including Amazon Virtual Private Cloud (Amazon VPC) traffic mirroring that supports passive observation of network traffic from cloud workloads, and private network peering that allows for the secure transmission of data between AWS accounts. It also connects natively with AWS data sources, such as Amazon CloudWatch, AWS CloudTrail, and Amazon VPC flow logs. Purpose-Built solution “Today, security operations teams often rely on tools and data sources like logs that don’t provide a complete picture,” said Dave Brown, Vice President, EC2 Compute and Networking Services, Amazon Web Services, Inc. “With the introduction of Amazon VPC traffic mirroring, we’re allowing customers to extract traffic of interest from any workload in an Amazon VPC and send it to the right tools to detect and respond faster to attacks often missed by traditional log- and agent-centric tools. With Reveal(x) Cloud, ExtraHop is delivering a purpose-built solution designed to enable AWS customers to take full advantage of network traffic for better cloud visibility, detection, and response.” Reveal(x) Cloud offers a host of features designed to help SecOps teams support the shared responsibility model, protect cloud workloads by ensuring compliance, and deliver security across the hybrid attack surface. Track rogue instances Automatic Discovery and Classification: Up-to-the-minute visibility and classification across all cloud workloads allows SecOps teams to track rogue instances, prioritize investigations by risk score, and correlate malicious activity and asset criticality to focus on the highest-risk threats. Application Layer Decoding: Full support for AWS services, such as Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and AWS Elastic Load Balancing means visibility into behavior, not just activity, while machine learning at the application layer provides immediate detection of exfiltration activity. Encrypted Payload Visibility: Reveal(x) Cloud decrypts SSL/TLS-encrypted traffic at line rate, including cipher suites supporting perfect forward secrecy, providing complete visibility into all communications, including encrypted malicious traffic. Rich Integrations: AWS CloudTrail events enrich network-based threat detection with on-box activity (disabled logging, suspicious processes, suspect file execution), while connection with Amazon CloudWatch allows granular tracking of privilege manipulation. Customers can also leverage integrations with orchestration platforms, such as Phantom, ServiceNow, and Palo Alto Networks, to automate response workflows. Complex attack surface It's time to stop retrofitting old models onto the new reality and start building cloud-first security operations" “The modern hybrid enterprise has created an expansive and complex attack surface that cannot be managed by traditional security tools or architectures," said Jesse Rothstein, CTO and co-founder, ExtraHop. "It's time to stop retrofitting old models onto the new reality and start building cloud-first security operations. With Reveal(x) Cloud and Amazon VPC traffic mirroring, SecOps teams finally have inside-the-perimeter visibility and control over their hybrid attack surface.” “With Amazon VPC traffic mirroring in Reveal(x) Cloud, ExtraHop is further reducing the barriers to cloud adoption, by giving enterprises the same level of insight they’ve always had into their on-premises traffic,” said Mike Sheward, Senior Director, Information Security, Accolade. Native security features “Visibility has always been key in security, combine Reveal(x) with the native security features you find in AWS, and you’re going to have more actionable visibility than ever. Cloud providers continue to work with security vendors and with enterprise customers to provide functionality and integrations that make it easier, more efficient, and more secure to build presence in the cloud,” said Fernando Montenegro, Principal Analyst, 451 Research. “Amazon VPC traffic mirroring is just the latest example. ExtraHop’s Reveal(x) Cloud fits within this trend, as it allows customers to use traffic monitoring to achieve better network visibility, detection and response, and to do that as a service. This is likely to assist SecOps teams making the transition to support cloud deployments. At ePlus, we believe the right technology transforms IT from a cost center to a business enabler,” said Justin Mescher, Vice President of Cloud and Data Center Solutions, ePlus. Evolving business models Pervasive enterprise digital transformation efforts are dramatically expanding the attack surface" “We’re building Reveal(x) Cloud into our CyberSecurity and Cloud practices to allow us to act quickly and accurately to improve our customers’ cloud readiness and security posture. Pervasive enterprise digital transformation efforts are dramatically expanding the attack surface, but many organizations are failing to transform their cybersecurity approaches to keep pace, continuing to use the same cybersecurity methods they have always used while attempting to support continuously evolving business models,” said Joe Vadakkan, Global Cloud Security Leader, Optiv. “Combining industry-leading technologies such as ExtraHop’s Reveal(x) with Optiv’s end-to-end services, enables us to provide clients with an approach to cybersecurity that is aligned to new business models and centered on client-focused outcomes. We believe that ExtraHop Reveal(x) Cloud will deliver great value to cloud workloads by providing the necessary visibility to more efficiently detect and respond to incidents.”
Larson Electronics, a Texas-based company with over 40 years of experience spearheading the industrial lighting and equipment sectors, announced the release of an explosion proof digital pan tilt zoom security camera for remote observation in both indoor and outdoor hazardous locations. This day/night camera is high resolution and features a mechanical infrared cut filter and motion detection with up to 64GB of internal storage. The EXPCMR-PT-IP-POE-DPTZ explosion proof digital pan tilt zoom security camera is rated for use in Class I, Divisions 1 and 2, Groups B, C and D; Class I, Zones 1 and 2, Groups IIB+H2 and IIA; Class II, Divisions 1 and 2, Groups E, F and G; and Class III, Divisions 1 and 2 hazardous locations. This unit is made of durable copper-free aluminum and operates on 12V DC while consuming a maximum of 12W per system. This unit also features two 3/4" 14 NPT drilled and tapped conduit openings, one on the top and one on the bottom, for wiring. Equipped with 1.27 mm optical lens The explosion proof security camera is equipped with a 1.27 mm optical lens and produces up to 6.0 megapixel resolutionLarson Electronics’ explosion proof security camera is equipped with a 1.27 mm optical lens and produces up to 6.0 megapixel (3072 x 2048) resolution. Operators can choose from a 150-degree fisheye, 180-degree horizontal panoramic or ePTZ quad view. The camera features two-way audio using a built-in speaker and microphone and is IP66 rated waterproof. This camera can operate in harsh environments with temperatures ranging from -22 degrees F to 140 degrees F and 0% to 95% non-condensing, humid environments. This camera has Power over Ethernet (PoE) enabling data transfers and power to be passed through a single Ethernet cable and features a pole top mount with an attached slip fit yolk for easy installation. Suitable applications for this camera include remote observation of external facilities, indoor and outdoor security, commercial buildings, and more.
Exabeam, the smarter SIEM company, announces that it has closed $75 million in Series E funding to accelerate worldwide efforts to displace legacy security management vendors. The latest round is jointly led by new investor Sapphire Ventures and Lightspeed Venture Partners, which have collectively backed nearly 40 IPOs. Other existing investors also participated. The funds will be used for expanding sales reach and to expedite new product features and configurations. In the last 12 months, Exabeam’s market perception has shifted from a user and entity behavior analytics (UEBA) vendor to a leading SIEM provider. Recognizing this, Exabeam was recently named a leader in the 2018 Gartner Magic Quadrant for Security Information and Event Management. Unique Data Sources Exabeam has a 72 percent win rate in replacement deals against incumbents During the last fiscal year, 76 percent of the company’s replacement deals eliminated legacy vendors, including IBM, McAfee, RSA, LogRhythm, Micro Focus and Splunk. In addition, Exabeam has a 72 percent win rate in replacement deals against these incumbents. Technology and services giant NTT DATA is just one example of a global deployment where Exabeam displaced multiple legacy SIEMs and the company standardized on Exabeam going forward. Since its $50 million Series D funding round in August 2018, Exabeam has also seen increased sales of its cloud offerings, on the heels of the release of Exabeam SaaS Cloud, which was launched and purchased by its first customer within the first quarter of this year. The company also expanded its sales team and Technology Alliance Partnership Program, which has already attracted more than 350 software and services vendors, representing integrations with nearly 2,500 unique data sources and APIs. Collective Guidance “Over the last year, we’ve seen our strategic value increase, and our average deal size has grown by 100 percent from just two years ago. This is because we’re listening to our customers and delivering the innovative technologies they need, including, most recently, the ability to detect threats in the cloud. With the win rates we’re seeing and market opportunity in replacement business, we’re raising money to accelerate our go-to-market and enhance our products to bring additional innovation to modern SOC environments,” said Nir Polak, Exabeam CEO. Both Lightspeed and Sapphire have an incredible combined track record of spotting up-and-comers" He added, “Having recently backed groundbreaking public companies like Box, DocuSign, MuleSoft, Nutanix and Square, both Lightspeed and Sapphire have an incredible combined track record of spotting up-and-comers that will ultimately dominate their markets. Their collective guidance and support will only further our mission to keep our customers out of the breach headlines and take over the SIEM market along the way.” Streamlined Threat Detection Alongside the influx of big data driven by cloud applications and mobile devices, as well as increasingly sophisticated insider and external threats, Exabeam is scaling to meet the needs of the largest organizations globally. As a next generation security player founded in 2013, the company continues to disrupt the SIEM market with its flat, user-based pricing model and streamlined threat detection and machine learning-powered behavioral analytics—helping security operations centre (SOC) analysts work smarter. “We’ve chosen to back Exabeam because of the momentum the company has in a very large and important market. Nir and the team are solving the problems that legacy SIEM vendors don’t seem to realize they have, and to us, that demonstrated unmistakable value. Customers are consistently buying its full platform as a replacement for the offerings that once dominated the market to improve their security posture and conquer the hurdles of outdated technology and expensive, data-based pricing,” said Anders Ranum, managing director at Sapphire Ventures. Endpoint Protection Vendors Lightspeed is excited to double down on our investment in Exabeam" “As cyberattacks, cyberwarfare and corporate espionage are on the rise, Exabeam is enabling companies to analyze user behavior and spot even the most subtle anomalies in a way no other SIEM vendor has. They’re in an ideal position to be the next big security disruptor, and we’re excited to be joining in their journey.” “Lightspeed is excited to double down on our investment in Exabeam,” said Ravi Mhatre, partner at Lightspeed Venture Partners. “Looking broadly at the security market in recent years, there have been several big exits from companies replacing legacy authentication and endpoint protection vendors. Security management is next, and Exabeam is well positioned to be the leader.” Exabeam has recently been named to Business Insider’s 30 Cybersecurity Startups that Will Blow up in 2019 and Silicon Valley Business Journal’s Best Places to Work in the Bay Area lists. It has also ranked No. 12 overall and No. 1 in security on Inc. Magazine’s 37th annual Inc. 5000, as well as No. 8 on the Wall Street Journal’s Tech Companies to Watch in 2018.
Sonitrol, the provider of verified electronic security, announces the launch of TotalGuard Smart Hub & Wireless Devices that offers a more robust security solution to the small and medium business markets. This new offering includes a variety of wireless sensors that connect to the new TotalGuard Smart Hub, expanding reach and alarm capabilities. Sonitrol’s TotalGuard solution, launched in 2018, targets the small to medium business market by offering affordable, professional security. TotalGuard is an all-in-one, edge-based device that acts as a standalone IoT panel. Each TotalGuard device includes the Sonitrol impact activated audio detection, glass break analytics, video verification and surveillance, motion and wireless connectivity that is all professionally monitored by a Sonitrol Central Station. Including many features, the solution was needed for the ability to easily connect with other alarm points as each business has different security needs. TotalGuard can also be paired with exterior thermal imagers, exterior cameras and Sonitrol Cloud Access Control AES 128-Bit Encryption The TotalGuard Smart Hub & Wireless Devices are simple, scalable and secure. These devices are easy to deploy and have a streamlined infrastructure, which reduces wire pulls and terminations and can easily be setup with a Mobile App by the installer. With the TotalGuard Smart Hub, you can enroll up to 32 wireless devices. These Zigbee devices operate over AES 128-bit encryption, are supervised and tamper protected. TotalGuard can also be paired with exterior thermal imagers, for added outside protection, and exterior cameras and Sonitrol Cloud Access Control. Working with various customer needs, Sonitrol offers integrated security solutions and is a one stop shop for small to medium businesses. Managed And Cloud Access Control Sonitrol’s ability to verify intrusion, through patented technologies in real-time, offers unrivalled credibility with law enforcementIn addition to now offering security solutions to the small to medium business market, Sonitrol is the pioneer in verified electronic security, offering Impact Activated Audio Detection, Video Verification, Managed and Cloud Access Control, Video Surveillance, and Fire. Sonitrol’s ability to verify intrusion, through patented technologies in real-time, offers unrivalled credibility with law enforcement. Sonitrol provides for some of the fastest police response times, lowest false alarm rates and the best apprehension record, over 179,000, in the security industry. Sonitrol celebrated its 55th Anniversary this year and displayed TotalGuard and the Smart Hub with Wireless Devices at ISC West booth #22015 in Las Vegas, NV.
Johnson Controls expands its PowerG technology portfolio to include the addition of several new detectors and sensors offering installers a greater variety of devices that harness the power of PowerG. Wireless Security Technology Enhancements to the PowerG portfolio include a 360-degree ceiling mount PIR detector, commercial magnetic contact, carbon monoxide detection and vanishing door / window magnetic contact, just to name a few. With the absence of wires, PowerG is able to securely perform many of the functions of a wired system, with new updates being made continuously. From long-range ceiling mount detection to smoke and heat detection, PowerG provides the power of wires without the wires. PowerG is the wireless security technology, designed with homes and businesses in mind. With the addition of new enhancements, PowerG is continuing to make end-users’ lives more secure and convenient while cutting installation time and saving money for installers. Unparalleled Cyber Protection “There once was a time where wired solutions were deemed the most secure and, in turn, were the ones chosen,” said Jennifer Doctor, senior director of Product Management, Tyco Security Solutions. “PowerG gives users the peace of mind that comes with an encrypted, wired solution, but eliminates the hassle of wires. With the added detectors and sensors, PowerG rivals that of traditional intrusion systems.” With ultra-reliable, two-way 128-bit AES encrypted communication and iron-clad protection that blocks interference, PowerG delivers unparalleled cyber protection features – ensuring reliable performance with minimum false alarms.
3xLOGIC, the provider of integrated and intelligent security solutions, has announced the availability of its pioneering VIGIL video management system (VMS) in Europe. Already enormously popular in the USA, 3xLOGIC aims to replicate this success and is targeting VIGIL at those who want all the power of integrated video and access control, without the stress and cost of a complex set-up. VIGIL’s enterprise grade VMS is the driving force behind the VIGIL range of network video recorders (NVRs) and power over Ethernet (PoE) cameras. Its easy set-up wizard guides installers and end users through the configuration process, helping to define network parameters, system identification information and camera profiles quickly and efficiently. VIGIL Central Management Software With 3xLOGIC’s VCM, it is possible to monitor server connectivity, camera status, storage details and server settingsEvents can be viewed via PC or mobile app, allowing users to respond to alarms and view live footage from any location, while SmartSearch functionality enables individuals to quickly identify and review events. With 3xLOGIC’s VIGIL Central Management software (VCM), it is also possible to monitor server connectivity, camera status, storage details and server settings; and 3xLOGIC’s RapidStream technology and SubStream motion detection functionality offers high resolution while substantially reducing bandwidth demands All VIGIL NVRs come pre-configured with VIGIL VMS software and 3xLOGIC PoE-enabled internet protocol (IP) dome, bullet, cube, 360°, thermal imaging, and pan tilt zoom (PTZ) cameras are designed to suit any application. The easy set-up wizard also provides plug and play capability for easy deployment, so no IP video experience is necessary to start recording or viewing video. Integrated With Infinias Access Control Solution Advanced reporting features including heat mapping, restricting and locking video are also possibleUsers can easily narrow down points of interest within larger playback clips by creating a SmartSearch mask over an area of an image, and surveillance data can also be routinely archived without the need to perform the task manually. Advanced reporting features including heat mapping, restricting and locking video are also possible. End users are increasingly demanding integrated VMS and access control. VIGIL can be seamlessly integrated with 3xLOGIC’s cutting edge infinias access control solution, which is designed to easily manage any size of project ranging from a single door to an enterprise-wide installation of hundreds of doors. With no wires from VIGIL to infinias, configuration is carried out through software with an automated, cloud-based programming tool. This offers a cost-effective way to create one intuitive solution where video is automatically linked with access control events and alarms. New Revenue Stream For Installers VIGIL opens up a new revenue stream for installers that work primarily with small to medium-sized enterprises Offering a level of functionality previously only available in solutions designed for larger projects, VIGIL removes the need for expensive technical labour. It therefore opens up a new revenue stream for installers that work primarily with small to medium-sized enterprises (SMEs), or who wish to start offering an integration based service. VIGIL is available through the existing PAC channel, with full access to its technical support, meaning that customers can rely on a tried and trusted supply chain that delivers products on time, every time. “The response to 3xLOGIC’s presence in Europe has been phenomenal,” commented David Hughes, the company’s global product manager. “The availability of VIGIL is the next step in our strategy to redefine the way in which security systems are designed, specified and configured across the continent. “Suitable for almost any budget, VIGIL is designed to be fully integrated to provide SMEs with comprehensive, cost effective and state-of-the-art video and access control infrastructures that are easy to manage, simple to install and can scale in line with changing needs.”
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalize the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly Competitive Landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved Customer Engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance Traditional Security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased Market Growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide Status Updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetizing smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.
Coming off a successful ISC West show, Honeywell is sharply focused on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine Learning-Based Analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralize decision making, and allow customers to manage it all from anywhere. Solutions For Vertical Markets Honeywell Commercial Security is focused on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalized systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behavior as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing Technology For Sports Security The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
The National Health Insurance Fund (NHIF) is a Social Health Insurance Scheme established by CAP 395 with the main objective of ensuring accessibility of health care services to all Tanzanians. The Fund has managed to expand its coverage to include councils, private companies, religious and educational institutions, private individuals, children under 18 (TOTO Afya) as well as mutual groups, whereby all members can equally access health services in all accredited health facilities. The Fund is also administering the Bunge Health Insurance Scheme, on behalf of the National Assembly. NHIF is a prestigious public institution that serves people all over Dar es Salaam and Tanzania. It has multiple sites spread over these regions. Their current surveillance platform had a few limitations of integrating third-party cameras and was not facilitating centralized monitoring for multiple locations. Matrix Sataya Samas is designed to meet diverse needs of large enterprises connected to a central location or a single site This posed a problem in managing and monitoring all sites from a single location. For this, they needed a surveillance platform that could easily integrate with multi-brand cameras as well as facilitate multi-location monitoring. Moreover, they needed a system with monitoring capacity of over 500 cameras with the facility of remote management for real-time security. Specifically designed solutions To the above challenges, Matrix Offered Sataya Samas Video Management System. It is a Video Surveillance management solution specifically designed to meet the diverse and complex needs of large enterprises having multiple sites connected to a central location or a large, single site. The system was able to integrate with 56 AXIS cameras available at its Head Quarters and other 16 cameras available at its district branch offices. All the cameras were managed at a single central server located at the NHIF HQ office. Matrix VMS provided real-time security with Intelligent Video Analytics such as Motion Detection, Intrusion Detection, Trip Wire etc. Additionally, VMS enabled monitoring and managing video surveillance from mobile phones and tablets remotely by using Matrix Mobile Application: SATATYA VISION. These features made monitoring much more reliable and easier for them. Project highlights : VMS Simultaneous User Licence - 3 Qty Mobile App (SATATYA VISION) Intelligent Video Analytics Benefits : Retention of existing Security infrastructure Reduces storage consumption with cost-saving features Centralized monitoring and management Real-time security
Thermal imaging is a technology that can provide many benefits in a wide range of applications. In particular, thermal imaging cameras have been deployed successfully as highly affordable solutions in the security industry. Accepted throughout the industry as the best 24-hour visual surveillance imaging solutions available, thermal security cameras are vital tools in securing borders, airports, sea ports, nuclear facilities, and other critical infrastructure. Today these affordable solutions are also protecting homes, corporate campuses, industrial facilities and retail businesses. Infrared-Illuminated cameras They can easily detect intruders and other potential hazards in any weather Thermal security cameras let people see what their eyes can’t: invisible heat radiation either emitted or reflected by all objects, regardless of lighting conditions. Because they see heat, not light, thermal cameras are effective tools in any security setting. They can easily detect intruders and other potential hazards in any weather, as well as day and night. Cameras that create images based on visible light—such as conventional CCTV or infrared-illuminated cameras— have the advantage of creating images that are familiar and easy to interpret. Unfortunately, the ability of a given detector, whether the human eye or a camera sensor, to create these images relates directly to the amount of light available. At night, for instance, when there isn’t much visible light, objects appear faint, or not at all. Thermal imaging cameras In contrast, thermal cameras make pictures from heat, not light, having nothing whatsoever to do with reflected light energy. They see the heat given off by everything under the sun. Everything we encounter in daily life creates or reflects heat energy, called a ‘heat signature,’ which thermal cameras can see clearly. Another limitation of relying on visible-light detection is visual contrast. Regular cameras that capture only visible light can be fooled by visual camouflage, or situations where similar colors or patterns blend together and, thus, obscure objects or people that need to be detected. Thermal imaging cameras don’t suffer this same problem. For example, an intruder standing under a densely-branched tree may be hard to detect using an IR-illuminated camera, but with a thermal imaging camera, the intruder would be clearly visible. Providing constant protection One of the biggest benefits of thermal imaging comes in the domain of security These advantages over visible cameras have led to the wide spread use of thermal to detect the presence of people in restricted or suspect areas, assess the tactical situation, and respond accordingly. No one within the view of a thermal camera can hide their heat. Thermal security cameras are the best tool to determine how many intruders are present, and, consequently, how many officers or agents should respond to meet the threat. One of the biggest benefits of thermal imaging comes in the domain of security. Security cameras have become a staple of protection for many (if not all) major businesses across the globe. In such a domain, the need to produce images of surrounding perimeters is critical to providing constant protection against potential intruders. False alarms experienced No matter what you need to see, or what perimeter you need to protect, thermal security cameras let you see clearly, even in total darkness, and through camouflaging foliage, smoke, dust, and light fog. Another reason why thermal imaging cameras often prove cost-effective is that they help reduce the number of false alarms experienced in a business protection scenario. Visible light cameras can be easily fooled by many naturally-occurring phenomena, such as blowing trees, shadows, insects, birds, or oncoming cars. In terms of motion detection, microwave, fence sensors, motion sensors, RAFID, and radar can all detect a possible intrusion, but they are essentially ‘blind’ technologies compared to thermal imaging. When a motion sensor is triggered, a user still needs an additional method of assessing the nature of the alarm, in order to determine the most appropriate response. For example, is it a person climbing the fence or just a harmless squirrel? CCTV security system Because of thermal security cameras’ high-contrast video output, security professionals have found that they work very well with video analytics. They can provide more reliable alarming with fewer false reports than visible-light cameras, even during the day. Thermal imaging security cameras offer both alarming capabilities and reliable images – two solutions in one. Prices for thermal imaging cameras have come down substantially in recent years Thermal imaging cameras are an affordable option for many businesses that want to ensure they have the best security and protection available. Prices for thermal imaging cameras have come down substantially in recent years, to the point where they are on par with regular visible-light cameras, while providing the superior ability to capture images that in many situations regular cameras simply cannot match. In addition, the total cost of ownership of a security system with thermal imaging cameras is, in general, much lower than a CCTV security system, for two main reasons. Monitor multiple areas First, a business would require fewer thermal imaging cameras than if deploying CCTV cameras, thanks to the excellent range performance of thermal imaging cameras. Since each camera needs only a mast for mounting, power, and a video feedback connection, fewer cameras are required. Business can keep their infrastructure simple, minimizing maintenance costs. Another area of cost savings is that thermal imaging cameras work perfectly in complete darkness and don’t require any lighting to maintain security and protection. Not only is lighting expensive to install, it also requires a great deal of electricity to keep those lights on all night. Businesses that wish to monitor multiple areas of their premises would be wise to deploy one or more thermal imaging cameras to provide the best protection against potential intruders, especially at night, when visible light is either low or non-existent. In short, any business that wants to achieve the maximum level of security and protection of their intellectual and physical property should consider deploying a thermal imaging solution.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernization, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralized security service control center offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernization project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognizing person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customized to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimize the percentage of false responses. With this intelligent system, it is possible to immediately recognize a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customized to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced it was selected to help protect the security of Independent Express Cargo Ltd. (“Independent Express Cargo”) in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. Avigilon Control Center VMS To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine-acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras — including the H4 Pro, the H4 Multi-sensor and the H4A Bullet with self-learning video analytics — were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. Incorporating advanced AI technologies By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, director of Independent Express Cargo. “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority: our customers.” Intelligent video security system “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, chief executive officer of Usee.ie. “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”
The power grid is a modern engineering marvel, providing us widely available and affordable energy for not only our day to day lives, but also highly critical infrastructure elements for which we rely on personally, and as an economy. However, our reliance on the grid also makes it highly susceptible to adverse events, including physical attacks. All parts of the grid can become victims of malicious events, but substations are particularly vulnerable due to their role in power distribution and the nature of their equipment. Power utilities’ security The challenge power utilities worldwide are facing is finding an affordable solution The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-104 specifically calls for implemented security plans which include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Fortunately, there are many solutions to help power utilities address these security concerns, one effective choice is the use of intelligent video. Intelligent video analytics solution Intelligent video, or video analytics, is a popular choice for the protection of critical facilities given its ability to detect, provide instant visual confirmation of the event and subsequent event forensics. The capability of this technology is increasing at a rapid rate, while decreases in hardware cost make such solutions affordable for owners or operators of critical bulk-power system sites. This case study looks at the issue of substation vulnerability and how to best use video to address, keeping in mind requirements of CIP-014. Such a system consists of fixed cameras, pan-tilt-zoom (PTZ) cameras, a deterrence device and data communication capability. Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc. In most cases, substations can benefit from a simple “camera-following” design, which includes surveillance of a potential breach at the fence line, as well as, the ability for early detection for some distance beyond the physical perimeter. Camera-Following design In a camera-following design, in addition to its own coverage, each camera is responsible for covering the blind spot of the adjacent camera. That camera is then responsible for covering the blind spot of the next camera, and this pairing continues around the perimeter until the final camera covers the blind spot of the first. This type of coverage design is very effective and affordable for locations with well-defined perimeters, such as substations. Using this layout, the video feed from the fixed cameras are then enabled with video analytics algorithms to alert when predefined conditions are met. This is done by inputting the video signal into a server, edge device or NVR, located at the site, or remote to the location. Intelligent video technology Today’s intelligent video technology provides for very specific alarm criteria Today’s intelligent video technology provides for very specific alarm criteria, which in addition to only alarming when a target enters in a specific region, can also discriminate, or classify, by the type of target: human, vehicle, etc. Furthermore, the alarm can be restricted by specific actions taken by the target, such as loitering in an area, dropping or throwing an object, more than one target entering with a valid badge swipe (tailgating) or even the speed at which a target is entering an area. This level of discrimination provides the ability to address very specific vulnerabilities, as well as, avoid nuisance targets, such as wildlife, debris or moving vegetation. Another key feature with significant value to substation protection is the geospatial aspects available with some video analytic solutions. This capability maps each pixel of video to its real-world latitude, longitude and elevation. This results in further assessment of the target, including the actual location, the real size of the target, the real speed and the current track. It also affords the opportunity to provide a real-time display of this information to the security operator through an easy to understand map-based user interface. Autonomous PTZ cameras Geospatial video analytics provide the benefit of knowing the exact map-based location of the target Another key assessment aspect of this substation protection scheme is the use of autonomous PTZ cameras. These are typically placed at the corners of the perimeter where they can service detections from multiple fixed cameras. As previously mentioned, geospatial video analytics, provide the benefit of knowing the exact map-based location of the target. Knowing the location of the target is extremely valuable to the security officer, but it is also the basis for a feature known as “slew to cue,” whereby PTZ cameras armed with video intelligence can be automatically steered to the same location for instant confirmation of the target. In most cases, “slew to cue” functionality also includes an “intelligent zoom” feature, which uses the target size information from the alarm, the PTZ camera location and the target location to adjust the zoom level of the PTZ for an instant view of the target that can provide identification details (clothing color, car type, etc) without the need for the operator to further adjust the zoom. Target detection and response Once a target is detected, a security approach leveraging intelligent video can continue with a coordinated response Once a target is detected and confirmed, a security approach leveraging the use of intelligent video can continue with a coordinated response to the event. When video analytics is applied to pan-tilt-zoom cameras, it has the ability to automatically follow a defined target, freeing the operator to take other actions, such as coordinating with law enforcement officials. This feature, referred to as camera auto follow or PTZ following, can be automatically engaged as the result of a detection event, or subsequent to a slew to cue action. The system will continue to follow the target until it reaches a pre-defined system time-out, the operator takes manual control, or the camera can no longer view the target. The system can then provide the resulting PTZ video as a component of the detection alarm, for a more complete understanding of the intrusion for the operator to review. Effective deterrence At this point, the system has detected the target, classified its type and verified it has met alarm conditions. As part of the alarm it has also included dynamic indication of its location on a map, autonomously steered a PTZ to the target to allow for gathering of more detailed target information and a PTZ has locked on and is now following the target without any required user interaction. Total elapsed time to this point in the security response is typically less than 5 seconds. Deterrence is often realized as a fence, physical barriers or access controlled gates This level of automated response addresses many vulnerabilities typically identified as part of a CIP-014 security assessment, but with minimal extra cost, it can be extended to help with the aspect of deterrence. Deterrence is often realized as a fence, physical barriers or access controlled gates. These are physical items and should certainly be included in a substation security plan. Intrusion detection However, another form of deterrence, which can be enabled through the use of intelligent video is the idea of audio talk down. This is the use of live or pre-recorded audio, which is activated upon an intrusion to deter the intruder. Different from a general alarm warning audio, audio talk down uses information about the location of the intruder and their actions to select appropriate pre-recorded audio to deter the intruder. Worse case, the understanding that they are being actively monitored may hasten their plan. Video-Based security and alarm system A common concern when deploying such a system is the amount of bandwidth required A common concern when deploying such a system is the amount of bandwidth required. Substations are almost always unmanned, which means the intrusion information must have a means to get communicated back to the main monitoring location. From a design aspect, this is typically the case, but it is important to know that it is not a requirement in order to gain security benefits from a video based system. The system described in this case study has the capability to detect, assess, respond and deter without any communication back to a main command and control. Alarms, events and system actions can be logged and stored remotely for review at a later time. In reality, utilities will want to be notified and react in real time. In these cases, video systems can adjust to the available bandwidth – from a low bandwidth situation where a textual alarm is provided with an image of the detection, to a high bandwidth installation where feeds from multiple cameras can be monitored and controlled in real time. Web-Based, mobile access In each case, complete alarm information, including meta data, images and video can be readily available to the security operations center, which can then take action based on their security response plan, including contacting and coordinating this alarm data with local law enforcement through web-based access or mobile phones. This case study outlines the effectiveness of utilising video analytics to address the physical vulnerabilities of a typical substation. The study outlines how recent technological advances can autonomously address assessment, response and deterrence This case study outlines the effectiveness of utilizing video analytics to address the physical vulnerabilities of a typical substation. Further, the study outlines how recent technological advances allow such a solution to extend beyond the mere detection of events, but can also autonomously address assessment, response and deterrence. Key capabilities Of intelligent video include: Advanced Detection – Accurate alarming based on specific targets types and actions Situational Awareness – The ability to quickly convey the critical details of a security event in an easy to understand map-based format. Real-time Target Location – Real-time location information of events and real-time location tracking of potential intruders. Autonomous Sensor Control – Automated steering of cameras to an event location and subsequent hands free video tracking of a suspect. Although each utility and substation may encounter different vulnerabilities, this case study outlines how video can be considered to address NERC guidelines for protecting critical substation assets by providing situational awareness of a potential threat and initiating an appropriate and timely response.
Dundee’s rejuvenated waterfront has breathed new life into the city, and not far from the new V&A Museum building is Foxlake Dundee, an exciting new water sports facility. Taking advantage of the regenerated docks area, Foxlake Dundee offers cable wakeboarding – where boarders are propelled by an electric cable rather than a boat – paddle boarding and Scotland’s first urban Aqua Park. Hikvision Thermal Video Solution Foxlake Dundee was the second Foxlake water park to open, following the very successful adventure park in Dunbar, East Lothian, on the Scottish coast. The Dundee facility, which opened fully in summer 2018, includes a large floating assault course, which has proven hugely popular with visitors, featuring huge obstacles, slides and rafts, and a giant 3.5m inflatable tower known as ‘the Mountain’. Unfortunately, due to its city center location, the assault course and the wider facility was likely to be something of a magnet for unauthorized activity, primarily of the inebriated variety, explains Zak Hegarty, Foxlake Dundee’s manager. “Because of our location, right in the heart of Dundee city center, we’re quite near a lot of pubs,” Hegarty adds. “And sometimes a 3.5m floating inflatable tower looks pretty inviting to someone with a quantity of ale in their system – it looks like an irresistible challenge.” Remote HD CCTV MonitoringI introduced myself as I saw they were opening and was invited initially to look at a CCTV system" The concern was that accidental or deliberate damage or vandalism to the equipment was a real risk – and along with that came the danger of injury or worse to those attempting to exploit the park, at night, in the dark, unsupervised on the water. Hegarty’s first instinct was to investigate the option of manned guarding: having a security officer on-site during those out of hours periods overnight when the facility was at its most vulnerable. But an approach from Brian Davidson of Webster Security & Fire was to change his mind. Davidson had noticed the development in the docklands with interest. He approached Hegarty to see if Webster Security & Fire might be able to help with securing the site. “I introduced myself as I saw they were opening and was invited initially to look at a CCTV system,” Davidson says. “This then blossomed during further conversations into a proactive, remotely monitored CCTV solution. They were looking at going down the route of employing manned guarding for when the site was closed, but we thought this would provide a cost-effective and workable solution that offered the same level of protection.” GJD Motion Detectors The challenges presented by the Foxlake Dundee site were not insignificant. The system needed to be remotely monitored and based on some form of movement detection – on a site which itself was constantly moving, due to the changing tidal water levels. Davidson and Webster Security & Fire got in touch with Hikvision in Scotland and together they designed a solution to meet all of Foxlake’s needs. The centerpiece of the system proposed by Davidson and Webster Security & Fire was the use of Hikvision thermal cameras to detect activity on the jetties. This is complemented by the use of GJD motion detectors and Hikvision cameras to pick up movement on approach areas, further Hikvision cameras which monitor the internal office reception areas, and additional Hikvision cameras providing a security, health and safety and management overview of the both the assault course and the paddle and wakeboarding facility areas. A public address tannoy system is also connected to the surveillance solution. Hikvision Thermal Bullet Cameras The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view – so a human body is always visible as hotter than its surroundings, particularly in a marine or waterfront environment. Hikvision’s thermal cameras also utilize behavior analysis technology, so figures moving into specific zones in the image can automatically generate alarms. The advantage of thermal cameras for a water-based site like Foxlake is that they can operate in all weather conditions – they’re not impeded by fog, mist, heavy rain, snow or other environmental factors, the sorts of conditions which could severely impede even the most advanced of conventional cameras. Hikvision 8-Channel DeepinMind NVRs The other cameras in the Foxlake Dundee system benefit from Hikvision’s Darkfighter technology, allowing for video monitoring and recording in even the lowest of light conditions. And the whole solution records to a Hikvision 8-channel DeepinMind network video recorder, which utilizes powerful AI technology to learn to filter out false alarms and accurately raise alerts. In the evening, after normal operating hours, the site is locked up and alarms are set. It’s then remotely monitored by the Corps of Commissioners, who are alerted when the thermal cameras or motion detectors pick up any movement on the site. Operators check the live cameras to confirm that intrusion has occurred. If an intruder is detected, they immediately contact Foxlake management via phone, and are also able to contact police if required. At the same time, the Corps operatives can use the PA system to issue warning announcements to allow the intruders to know they are being monitored. The effect is almost instantaneous, Hegarty says. Enhanced Intrusion Detection The overall reception for the video surveillance solution has been extremely positive “We’ve had three incidents since the system was installed,” he says, “and the response by the intruders is pretty remarkable. I’ve reviewed the footage and compared it to the time notification I’ve received a missed call on my phone: you can see the intruder on the video footage hear the warning, and then they’re off. They just leave straight away. It’s amazingly effective.” The overall reception for the video surveillance solution has been extremely positive. “We’re really happy with the system,” Hegarty says. “The video footage quality is very high and we’re glad we haven’t had to go down the manned guarding route, as similar facilities have done. We appreciate that Webster and Hikvision took the time and thought to design something that would work for us in our specific circumstances. Of course, the proof is in the performance, and the fact that a number of intruders have been quickly and effectively warned away is evidence that it is doing the job it was designed for.”
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
In the analog era, videotape was the storage media of choice for CCTV systems. Since the advent of digital video, and of IP-based systems, a variety of other storage formats have come to the fore, including hard drives, flash drives, SD cards and others. Now we are in the age of the cloud, which offers new opportunities to store vast amounts of video and presents challenges such as bandwidth and cybersecurity. For a current perspective on storage, we asked this week's Expert Panel Roundtable: How are new developments in video storage impacting the video surveillance market?
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?
Video motion detection: Manufacturers & Suppliers
- Dahua Technology Video motion detection
- Bosch Video motion detection
- eneo Video motion detection
- IDIS Video motion detection
- REDWALL Video motion detection
- Hanwha Techwin America Video motion detection
- Climax Technology Video motion detection
- Panasonic Video motion detection
- Dedicated Micros Video motion detection