Video surveillance solutions
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security video wall and visual display solutions experts Ultimate Visual Solutions (UVS) works on projects in 15 countries around the world since its launch nine months ago. UVS changed its name from eyevis UK last September following the acquisition of eyevis GmbH by the Leyard group. Providing turnkey solutions The rebranding has allowed the company to offer an expanded range of products and services The rebranding has allowed the company to offer an expanded range of products and services...
Arecont Vision Costar, the pioneer in network-based video surveillance solutions, announces the addition of GT Reps, LLC to its Authorized Manufacturer’s Representative Program. GT Reps will deliver pre-sales support across the US Great Lakes Region, which includes the states of Ohio, Michigan, Kentucky, and Indiana. “We’re excited to add GT Reps to our sales organization to broaden our coverage with skilled professionals,” said Kyle Parker, Vice President, Americas, Are...
Visitors to the 2019 edition of Secutech Vietnam will have plenty of opportunities to gather market intelligence, thanks to the introduction of the new ‘Smart Factory Conference’ to the show’s fringe program. As the region’s leading trade fair for the security, fire safety and smart building sectors, the fair provides a program of educational events that cover technological trends, government regulations and industry outlook. Smart factory systems “Vietnam&rs...
Security 101, one of the nation’s fastest growing security integrators, continues to expand nationally with the addition of a new office in the San Francisco Bay Area. The office will serve San Francisco and the surrounding metropolitan area, and will engineer, install, operate, monitor, manage and maintain integrated security solutions for local small, midmarket and enterprise business customers. Local tech companies Veteran entrepreneur Rob Chamberlin is the latest franchise owner to...
The threat of drones is a growing concern around the perimeter and in the airspace surrounding airports. According to a UK Airprox Board report, the number of times a drone endangered the safety of an aircraft in the UK airspace rose more than a third in 2018 compared to the year before. The highest-profile recent drone incident was at UK’s Gatwick Airport, where a drone sighting last December triggered a three-day shutdown of the UK’s second busiest airport, disrupted the travel p...
Vaion, a Ubon Partners company, is emerging from stealth mode to disrupt the physical security market by embedding the power of artificial intelligence (AI) into its complete video surveillance solution. Vaion's product line, which includes high-quality security cameras, a video management system and other intelligent solutions, premieres at IFSEC International, an event that takes place between June 18-June 20 in London, U.K. As a global company with offices in New York, London, and Oslo, Vaion is changing the traditional video security landscape with AI capabilities that make it easier for businesses and organizations to monitor their assets proactively. Detecting threats in earliest stages Vaion offers an end-to-end surveillance solution that will help companies detect threats in their earliest stagesWith embedded video and audio analytics powered by machine learning algorithms, focused interfaces, intuitive installation processes and a range of smart cameras, Vaion offers an end-to-end surveillance solution that will help companies detect threats in their earliest stages and perform fast, effective investigations with fewer resources. At the same time, Vaion vastly improves investigations by implementing the fastest, most accurate forensic searches using similarities and intelligent timelines. Initial product portfolio includes: Security cameras (Vaion vcam) with integrated directional audio analytics VMS (Vaion vcore) with embedded video analytics Security appliances (Vaion vserver) Hybrid cloud service (Vaion vcloud) Their first major premiering event will be IFSEC International, the leading security event for Europe and the U.K. There, Vaion representatives will provide an up-close look at how machine learning and integrated analytics offer a significant improvement on security deployments. Easy tracking of people and objects Businesses get instant alerts about suspicious activity and can easily track people and objects as they move through perimetersBusinesses get instant alerts about suspicious activity and can easily track people and objects as they move through perimeters. And exceptional video quality feeds from Vaion vcam Dome and Pano means that there's always a clear picture, no matter the lighting or environmental conditions. Analytics are performed pervasively, at scale and in real-time, from all the cameras in a deployment (even third-party cameras) and are embedded into the VMS (vcore). Vaion’s hybrid cloud approach makes possible the reality of remote configuration and access, instant firmware and software upgrades, and license pooling with great performance and network efficiencies. Sister company to cybersecurity innovator Jazz Networks, Vaion believes that a robust cybersecurity approach is necessary even in the physical security world. That is why its solution is secure by default with always-on encryption for recording and media transport. Vaion's products are designed in Norway, with software developed in the U.K. and cameras assembled in Taiwan. The portfolio will be available for customer trials and proofs of concept from July and generally available from Fall 2019. operational and business intelligence We deliver a solution that allows customers to react to threats before they escalate rather than just help document the damage""We believe that it’s time to move from a mainly reactive to a proactive security model, and we founded Vaion to help our customers achieve this goal. We believe that the next generation solutions will be based on smarter sensors, software, and services that, instead of record what they see, actually understand the environment they operate in to help businesses act on these insights on time. “We deliver a solution that allows our customers to react to threats before they escalate rather than just help them document the damage. It enables them to find what they are looking for in seconds instead of days and provides them with much better operational and business-relevant intelligence," said Tormod Ree, Vaion CEO. Learn more about Vaion's innovative new security products online and by visiting with Vaion representatives at IFSEC International. Interested security professionals will be able to see Vaion's game-changing security technology in action and find out why AI is the secret to better, more comprehensive protection.
Panasonic Business has announced the latest addition to its PTZ camera range at InfoComm 2019, with the brand new AW-UE4 set to enhance the flexibility and usability of filming solutions for AV professionals. AW-UE4 PTZ camera In celebration of the ten year anniversary of Panasonic’s PTZ camera range, the AW-UE4WG/KG has been revealed as the successor to the popular AW-HE2 remote camera, offering upgraded features which include 4K resolution and an ultra-wide viewing angle of 111 degrees. This is set to improve the flexibility of filming across a variety of applications, with corner to corner wide-angle videos improving the quality of filming, even in the most limited of installation spaces. 4K imaging The camera offers a 1/2.5-type 8M pixels single sensor to capture ultra-high quality 4K 3840 x 2160 resolution images In addition, the camera offers a 1/2.5-type 8M pixels single sensor to capture ultra-high quality 4K 3840 x 2160 resolution images and supports a variety of video formats with 30p/29.97p/25p. Equally it provides a high level of connectivity with three video output terminals of HDMI, LAN and USB connectivity, alongside RTSP/RTMP support for direct live streaming to major platforms such as YouTube. The camera can also be powered via USB cable, enabling a single cable solution for video transmission, camera control and power supply over a LAN or USB. Professional AV The compact design and high quality feature set makes this camera well suited for application in small classrooms, meeting rooms and live events. “The AW-UE4 was designed with professional AV in mind, featuring an ultra-wide viewing angle for flexible installation in a variety of spaces,” said Andre Meterian, Director Professional Video Systems Business Unit EMEA at Panasonic. “With the addition of 4K content, high-quality connectivity, and the option to directly upload videos to live streaming services, we feel the AW-UE4 is testament to our continuous innovation that secures our market leading position in the PTZ sector.” The AK-UE4 is set for release in October 2019.
At the beginning of 2017, MOBOTIX and RealNetworks established their strategic partnership. Almost everyone has known RealNetworks since the 1990s, when the Seattle-based company introduced the first online audio streaming solution, RealAudio®. Years of continuous innovation and multiple generations of RealVideo® then gave birth to the company’s most well-known product, RealPlayer®, which is still used millions of times every day for streaming and downloading videos. More recently, RealNetworks has been steadily expanded its expertise in the area of artificial intelligence (AI) and machine learning. “Our innovative strength, quality standards and commitment to high-quality, customer-oriented solutions form the basis of our strategic partnership with RealNetworks,” explains Thomas Lausten, CEO of MOBOTIX AG. Facial and mood recognition MOBOTIX and RealNetworks see enormous market potential for further joint projects and customized solutions SAFR™, the latest solution from RealNetworks, is an exceptionally accurate, artificial intelligence-based system for facial and mood recognition that has been optimized for the challenges of live video. MOBOTIX and RealNetworks see enormous market potential for further joint projects and customized solutions. “MOBOTIX cameras have an excellent market reputation for high quality, cyber security, reliability and direct applicability for facial recognition.” “Our partnership has grown rapidly as we also share the same values, such as a commitment to quality, innovation, data security and building strategic partnerships to generate synergies for both our companies and our customers,” says Mathias Grünwald, Senior Lead Account & Service Management at RealNetworks. “The new MOBOTIX is increasingly developing into a base platform for a multitude of industry specific tasks – Beyond Human Vision,” says Lausten. Identify cyber security Since joining the company, Lausten has transformed MOBOTIX from a highly secure but self-contained product provider into an open and flexible solution and system platform that continues to identify cyber security as its top priority. This means that all MOBOTIX products are now ONVIF-compliant, there is a dedicated NAS solution and, with the MOBOTIX MOVE series, a PTZ camera has been launched on the market as a complementary independent product line. “Artificial Intelligence will play an increasingly important role in all areas of IT, meaning video surveillance as well – and with Konica Minolta, we have a leading technology partner by our side in this area,” explains Christian Heller, MOBOTIX Sales Director for Germany, Austria and Switzerland. “In conjunction with our new openness and our drive to produce cyber-safe products and solutions, we can work with our strategic partners like RealNetworks to strengthen the market and develop new solutions for a variety of vertical markets,” he adds. Video surveillance cameras SAFR facial recognition solutions based on MOBOTIX cameras are already being used in numerous vertical markets MOBOTIX's partnership with RealNetworks and SAFR demonstrates this in unique ways: “We are currently working together on an exciting project for a high-profile European museum,” says Lausten. The museum uses SAFR live analytics at the entrance and other locations within the museum to automatically count the number of people by time of day, using demographic breakdowns, such as gender and age. The same system can also analyze people’s moods. This solution is made possible by the combination of versatile, high-precision MOBOTIX cameras and the equally high-precision SAFR facial recognition platform. SAFR facial recognition solutions based on MOBOTIX cameras are already being used in numerous vertical markets. “Since MOBOTIX cameras were designed as the best video surveillance cameras and SAFR is regarded as the leading facial recognition platform for live video, together, we are able to deliver solutions that go far beyond recognition,” says Grünwald. “Beyond Human Vision means more than just monitoring video from a camera feed. Together with our selected strategic partners, MOBOTIX is creating solutions based on artificial intelligence that make events predictable and that can initiate countermeasures to protect the environment, valuables and people,” emphasizes Lausten.
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Apex Technology Sales, Inc. (Apex) to its Authorized Manufacturer’s Representative Program. A proven and experienced representative agency, Apex will provide expert pre-sales assistance for Arecont Vision Costar’s Total Video Solution offerings across the US North Central Region, including Minnesota, both North and South Dakota, and Western Wisconsin. “Mike Pride and his team at Apex are outstanding additions to our sales organization,” said Kyle Parker, Vice President, Americas, Arecont Vision Costar. “Their commitment to their customers, demonstrated industry knowledge, and multi-faceted product experience will be of significant benefit to customers, industry consultants, and systems integrators seeking to learn about and deploy Arecont Vision Costar’s Total Video Solution.” Superior service and technical expertise Arecont Vision Costar and its Total Video Solution are the perfect video offerings for our clients"Established in 1992, Apex Technology Sales, Inc. is a multi-line manufacturer’s representative agency for the leading manufacturers in the data communications, data center, and security markets. The company is committed to providing customers with superior service and technical expertise for the products that they represent, now to include Arecont Vision Costar. “Apex is extremely excited about representing Arecont Vision Costar in Minnesota, North and South Dakota, and Western Wisconsin,” stated Michael Pride, Owner, Apex Technology Sales, Inc. “As the security industry moves further into the networking world, Arecont Vision Costar and its Total Video Solution are the perfect video offerings for our clients. The company is well known for its innovation and in leading the industry with cutting-edge technologies in video surveillance.” Cloud-Enabled video surveillance solutions Participants in the program extend the reach of Arecont Vision Costar by providing expert pre-sales assistanceBen Barry, Regional Sales Director for Arecont Vision Costar agrees, “I look forward to working with Mike and his team, engaging together to demonstrate the ease of use, unmatched capabilities, and reliability of Arecont Vision Costar’s wide range of Made in USA, world class, and cloud-enabled video surveillance solutions.” Mr. Barry directs the entire Central Region, which includes the states represented by Apex and those by other Manufacturer’s Representative Partner Program member firms. Apex and the other members of Arecont Vision Costar’s Manufacturer’s Representative Partner Program are focused on bringing the industry’s best, cyber-secure video surveillance offerings to their assigned regions. Participants in the program extend the reach of Arecont Vision Costar by providing expert pre-sales assistance while interfacing with and educating customers, system integrators, and distributors on available solutions for even the most challenging video surveillance requirements.
DICE Corporation announced the launch of an all new Video Verification App at the Electronic Security Expo (ESX) in Indianapolis last week. The Video Verification App is a completely mobile browser-based tool used in conjunction with DICE’s CloudEye cloud video recording solution. If an event triggered by an alarm system occurs, app users have more control of how alarm center interaction is handled by viewing live video surveillance and other essential account information. Video Verification App The app process is simple. When an alarm is tripped, users receive an immediate notification through SMS text messages, simplifying the dispatch process and giving customers the information, they need to know to proceed. Users are then able to view live streams, determine if the alarm should be dispatched or canceled, and also speak to an operator for further assistance. Additional camera locations can also be selected from a dropdown menu to provide a well-rounded view of the premises and aid the customer in determining the best course of action. The Video Verification App can be used with most monitoring software that supports the product’s APIs Compatibility is also far-reaching with this solution. The Video Verification App is capable of being used with most monitoring software that supports the product’s APIs, including DICE’s Matrix Monitoring. Giving users more options and accessibility, central stations are able to reduce expenses from handling low priority alarms, improve operator efficiency, and encourage meaningful customer engagement through enhanced end-user communication. Compatible with video monitoring software “With over 75 percent of Americans now owning smartphones, consumers are more engaged and accessible than ever before,” said DICE Corporation President and CEO, Cliff Dice. “Advancements in new technology are opening up exciting ways to keep users connected while also offering central stations significant opportunity for growth while reducing expenses.” In addition to launching the app at ESX, the new technology also received an Innovation Award for mobile apps. “We’re pleased to bring home an award and be recognized by our peers for developing outstanding products that drive the electronic security and life safety industries,” Dice said. “By offering new products like the Video Verification App and CloudEye cloud video recording solutions, we’re cementing our reputation as one of the leading developers of video surveillance solutions for the alarm industry and beyond.”
Johnson Controls announces that its flagship access control and event management system Tyco Software House C•CURE 9000 is supported on Infrastructure as a Service (IaaS), enabling customers to take advantage of the many benefits of cloud computing with the choice of best-suited service providers. With C•CURE 9000 deployable in the cloud, integrators and end users can leverage cloud service providers such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform, to reduce server infrastructure and maintenance costs with greater business continuity options. Physical security operations Beyond IT modernization and cost management, organizations are approaching cloud adoption strategies through the lens of broader enterprise business efficiency and growth objectives. Companies are aggressively moving to the cloud to maximize their IT spend" As organizations identify and migrate critical application workloads to the cloud, physical security operations are able to increase C•CURE 9000 application availability by leveraging redundancy and disaster recovery infrastructure that geographically extends well beyond their on-premise constraints. “Companies are aggressively moving to the cloud to maximize their IT spend while improving their agility to respond to business needs and market changes,” said Jason Ouellette, general manager of Enterprise Access & Video Solutions, Building Technologies & Solutions, Johnson Controls. Artificial intelligence “When moving infrastructure to the cloud, learning how to provision the right type and size of resources required for customer specific environments is critical to optimize performance and cost. Customers who take this approach in their C•CURE 9000 cloud migration planning can easily avoid overspending while maintaining flexibility to quickly scale resources based on actual need.” To assist customers seeking C•CURE 9000 cloud deployment support, the Software House Professional Services organization provides a broad range of consulting and implementation services, including technical guidance on best practices and system architecture considerations regarding customer specific cloud strategies. Cloud solutions are an integral part of the strategic focus of the Tyco Access Control and Video Solutions unit of Johnson Controls, along with artificial intelligence, unification and cybersecurity, comprising of four key technology pillars.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratization of AI in the IP camera market.Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding The Global IP Camera Market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analyzed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-Processor-Enabled Video Analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most timeMicroprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognize how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast Processing For Rapid Response At City Level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyze traffic situations Quick local decisions on the video cameras are also used to help analyze traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-Time HD Video Monitoring And Recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-Gen IP Cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognized in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyze the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalization. Each camera at the edge can be personalized to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recognizer on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI At The Edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the check. What First Brought The Issue Of Alarm Verification To Your Attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What Is The False Alarm Rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why Did This Issue Resonate So Strongly With You? When I first investigated this issue, I was sure that the security industry would have already recognized this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who Is Affected By This? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a check for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What Is The Average False Alarm Fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why Do You Believe Audio Is The Ideal Technology For Secondary Source Verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How Would A Secondary Source Verification System Work With Audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are There Any Additional Resources You Would Suggest Looking Into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionizing the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energized market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customized to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimized for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognized persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customized for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognize VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centers value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American market, where there was ‘positive year-over-year growth’ in 2018 and ‘strong’ sales in Q1 this year, according to Eric Chen, General Manager of Hikvision USA and Hikvision Canada. HikCentral Central Management Software The company’s U.S. focus is shifting from products to solution sales, with emphasis on ‘mid-market’ small- and medium-sized businesses (SMBs). The largest verticals are retail and education, and there are emerging opportunities in the cannabis market. Launch of the HikCentral central management software (CMS) is a component of the company’s solution-sales approach. Launch of the HikCentral central management software is a component of the company’s solution-sales approachMr. He acknowledges the growth of ‘anti-China sentiment’ in the United States and other parts of the world, which he says will impact Hikvision’s operations globally. Specifically, in the U.S., ‘political’ elements impacting Hikvision’s business include ongoing tariffs and a trade war, Congressional calls for export controls and sanctions, and a provision of the National Defense Authorization Act (NDAA) that bans use of Chinese video surveillance products in government applications. Specifying Cybersecurity Initiatives At ISC West In spite of it all, Hikvision’s message at the recent ISC West show was overwhelmingly positive, and the company also detailed cybersecurity initiatives they say put the Chinese company ahead of many competitors in the industry. Eric Chen came in as General Manager last year; he previously spent a decade working for Hikvision in China. Chen reports solid 18.8% year-over-year growth for Hikvision globally, totaling $7.4 billion last year. He notes the company saw 40% compounded growth between 2010 and 2018. Globally, there are 34,000 employees, 16,000 of whom are research and development (R&D) engineers. Hikvision’s expanding global footprint includes 46 international branches. There are three manufacturing facilities in China, in addition to one in India. HikRewards Program For HDP Customers At ISC West, Hikvision’s theme was ‘Focus on Your Success’, including introduction of the HikRewards program that provides rebates to HDP (Hikvision Dealer Partner) customers, their core dealer base. A new online Hikvision Knowledge Library for HDPs provides training and reference materials dealers can share with employees. A new tech center, introduced in December, provides data sheets, product information, and support resources. There is also a North American R&D team headquartered in Montreal. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls A customer satisfaction survey launched in March provided good feedback from customers. “They know who to call if they have a problem,” says Chen. “We want to focus on making customers successful.” The success theme also extends to Hikvision employees, who are featured in videos describing their jobs and enthusiasm for Hikvision. There are some 400 employees in the North American operation. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls. Half of the booth was focused on solutions, especially retail and education, and also gaming and commercial real estate. Security Products Displayed At ISC West A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS systemProduct highlights at the ISC West booth included the 32-megapixel PanoVu multi-sensor dome camera, whose 180-degree panoramic image was displayed on a 65-inch monitor. A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS system. Some products new to the North American market, including intercoms, turnstiles, emergency call stations, and under-vehicle inspection, were displayed. Hikvision’s deep learning products are moving into their second generation, including the ability to obscure private information on videos to comply with GDPR/privacy requirements (previewed at ISC West and released later in the year). Algorithm components of Hikvision’s DeepInMind artificial intelligence are being adapted into a platform called AcuSense for value-priced products, which can recognize a human or vehicle and help filter out false alarms. Also being adapted to products with lower price points are the ColorVu system that incorporates visible light LEDs to provide color images at night, and DarkFighter low-light capabilities. Penetration Testing Of Cameras And NVRs As a global manufacturer, Hikvision faces a high level of scrutiny about cybersecurity, which Mr. Chen says is “a good thing for us,” enabling them to highlight the steps they are taking to improve cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity In September 2017, Hikvision began working with third parties (including Rapid7) for penetration testing (ethical hacking) of its cameras and recorders. That same month, Hikvision set up a Cybersecurity Hotline open to anyone with questions about cybersecurity, including white-hat hackers and researchers. Even before that, Hikvision had an open-door policy on cybersecurity and a program for patching and disclosing responsibility. In February of 2018, Hikvision released a 40-page Cybersecurity White Paper describing cybersecurity testing and processes built into the software development lifecycle. That same month, Hikvision launched an Opened Source Code Transparency Center and offered an open invitation to anyone wanting to inspect Hikvision’s source code and let them know of any vulnerabilities. FIPS 140-2 Certification By NIST Hikvision has also become a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA), which ensures their patching and incident reporting programs have been reviewed by a CNA partnering company. Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVRsIn August, Hikvision received Federal Information Processing Standard (FIPS) 140-2 certification, a U.S. government encryption standard created by the National Institute of Standards and Technology (NIST). Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVR products. Davis said the FIPS 140-2 certification process began before the NDAA ban on use of Hikvision products in the U.S. government, and in any case is a standard that ensures a high level of encryption. “We wanted to make sure we had the same level of technology,” he says. “It was not to win over the government.” Making Industry More Cybersecure “We are really trying to have third parties test and certify our equipment,” adds Davis. “We are trying to be open and transparent. Education and awareness are key.” “We need the trust of customers in the security community,” says Mr. He. “No matter what, we have to follow the highest standards to offset the concerns and accusations.” In April 2018, Davis became a member of the Security Industry Association (SIA) Cybersecurity Advisory Board to help make the entire industry more cybersecure through education, awareness and standards. Hikvision has also joined the Forum of Incident Response and Security Teams (FIRST at first.org), a global cybersecurity incident response consortium that cooperatively handles computer security incidents and promotes incident prevention programs. Davis has presented Cybersecurity Road Shows in 22 cities in the United States and Canada, and also in Australia and New Zealand. The 90-minute presentations focus on education awareness around cybersecurity and seek to get attendees engaged and aware about cybersecurity in business and also in their homes.
Lack of cybersecurity of video systems made headlines in 2016. The Mirai cyberattack that year impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cybersecurity attacks later in the day were more global in nature. The cyberattacks were carried out by a botnet, a network of bots, which are software applications (in this case, computer viruses) that communicate with each other and run tasks automatically over the Internet. IP-Enabled Cameras Bots can infiltrate unprotected computers and then use the computing power of their ‘hosts’ to carry out various kinds of cyber-attacks on other Internet targets. In the case of the Mirai attacks, a hidden army of bots worked together to bombard various websites with so many bogus requests that the sites became overwhelmed by the volume of traffic and could not respond to legitimate requests. It’s called a denial of service (DDS) attack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders (DVRs). In other words, the bots used the computing power of our industry’s video products to launch the headline-grabbing cyberattack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders Safeguarded Communication Since 2016, awareness of cybersecurity for video systems has grown. Today, it is understood that video solutions should be designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted, and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS). Some basic best practices can go a long way to improving the cybersecurity of video systems. A small change is to remove default passwords from products and software, and to avoid using ‘guessable’ passwords. All firmware should be encrypted to reduce the possibility of it being downloaded from the manufacturer’s website and deconstructed. Use of a secure operating system that is regularly updated can protect against video tampering, altering, spoofing and snooping. Video Surveillance Systems Another precaution is to avoid remote login using Telnet or FTP, which are less secure. Finally, use of digital certificate provides assurance that data from a third party is true and not falsified. All data should be encrypted with digital certificates. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats Free downloadable guides and other resources provide specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives. For example, the OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices, collaboration with IT and HR departments and how to apply software and firmware security updates. Hardware-Level Encryption It also includes standard, advanced and enterprise cybersecurity best practices for cameras, servers and workstations and networks. Another cybersecurity requirement is data-at-rest encryption to ensure that data, such as stored video, is secure right down to the storage medium in which it is held. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Despite the clear benefits, data-at-rest encryption lags other areas, such as network and endpoint security, in terms of the investment it currently receives. A Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security.
The high-performance Predator Ultra HD PTZ video surveillance camera from UK CCTV manufacturer, 360 Vision Technology, has entered service at the National Coastwatch Institution’s (NCI) Felixstowe lookout station, to help protect lives along the coastline of the River Deben estuary. Felixstowe Coastwatch is a charity funded, volunteer-based organization with over 50 highly trained volunteers available to man lookout shifts. It’s also part of the NCI, a voluntary organization established in 1994 to restore a visual watch along UK shores, after many small Coastguard stations had been closed. Maritime navigation Felixstowe Coastwatch took over operations at the Lookout in April 1996 Under Felixstowe Coastwatch’s territory is the Deben estuary, whose treacherous shifting shingle banks and bar can present quite a challenge for maritime navigation, as Ian Clarke of Felixstowe Coastwatch explains: “Half of all call outs from the RNLI Harwich Lifeboat Station during 2016/17 were to attend incidents in this area, so it was clear that additional observation of the area would be beneficial and help to make it safer.” Felixstowe Coastwatch’s Lookout is built on top of Martello Tower ‘P’, one of the famous ‘Martello Towers’, built in the early 1800s as a defense against a possible invasion by Napoleon. The first lookout was originally built by HM Coastguard (replaced in 1979 by the current structure), who operated the Lookout until 1994. Felixstowe Coastwatch took over operations at the Lookout in April 1996. Experiencing CCTV cameras “Originally, the first idea to tackle the maritime issues at the River Deben estuary was to build an additional lookout tower,” says Ian. “That would have been a prohibitively costly exercise for a charity-based organization. However, after a visit to the NCI Station at Portland Bill, I was inspired by the use of CCTV there and interested to establish if video surveillance could be deployed to monitor the remote Deben estuary from our existing lookout station.” “The first task was to experience CCTV cameras in action, so we visited the Port of Felixstowe, the Felixstowe Town CCTV system and the Great Yarmouth Port Authority, where we saw the 360 Vision Predator in action. Impressed by the quality of its images, I contacted 360 Vision Technology for a demonstration, at which we were able to record video from the proposed location of the camera mast.” Comprehensive business case 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom" “After the demonstration of the camera’s capability, I was able to prepare a detailed report to our trustees, setting out a comprehensive business case as to why a CCTV camera would offer the best solution to the issues we were facing at the mouth of the River Deben. I was able to use the recorded footage of the demonstration to produce a video highlighting the impressive capability of the imaging technology.” From Ian’s report, approval of the project was granted and the 360 Vision Predator Ultra HD was installed by STC Solutions Ltd, after funds were raised from council-allocated budget and fundraising events organized by Felixstowe Coastwatch volunteers. “When we placed the order, 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom,” Ian continues. Wireless transmission solution “This was an important factor for us, as the entrance to the River Deben is expansive, and identifying vessels and individuals there would be greatly assisted by the optical zoom of the 360 Vision Predator camera.” With no line of sight from the camera to the lookout tower, an innovative wireless transmission solution was employed, using a belfry tower at a midway point in Felixstowe, where the signal is relayed to enable control and recording of the high definition images back at the lookout station. “Now operators can view superb live images of the River Deben, to confirm the identity, position and situation of vessels in the mouth of the river and if necessary, contact HM Coastguard if we observe any problems,” Ian explains. Seamless ONVIF integration Thanks to the broad integration capability of 360 Vision’s Predator Ultra HD, all surveillance video is archived for retrospective investigation, and controlled via a QVIS Viper NVR recorder. In addition, seamless ONVIF integration into Cambridge Pixel’s ‘RadarWatch’, a flexible client display application for radar display and target tracking, allows Felixstowe Coastwatch’s operators to set up virtual tripwire lines across dangerous areas of the river and shallow waters close to the main shipping channel. The trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location Once crossed by a vessel, the trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location, along with high-definition visual verification from the Predator camera. Also displayed as an overlay on screen, via the Predator Ultra camera and Cambridge Pixel technology integration, is Automatic Identification System (AIS) ship transponder information for each vessel, including a compass bearing supplied by the Predator camera’s head, which indicates which way the camera is pointing. Innovative installation “This means we can instantly identify and position any specific vessel we’re seeing with the camera,” says Ian. “We can also view the banks of the river and its beaches, to ensure that no members of the public are in danger.” Taking advantage of 360 Vision Technology’s any color and any finish design offer, the Predator Ultra camera was supplied in a Marine Grade white paint finish, and along with its powerful 40x zoom lens, is equipped with a ½” Ultra camera module to ensure maximum imaging performance, even in low-light conditions. This innovative installation has been so successful that Felixstowe Coastwatch are currently looking at other areas of the coastline where high-definition 360 Vision Predator Ultra HD cameras could assist with their daily operations, to protect the public and maritime traffic.
Wellington is the southernmost capital city in the world and is the center of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organization employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centers, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilizing a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardize our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilizing Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorized entry, to the integration of panic buttons at each site, WCC is utilizing Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software Maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced it was selected to help protect the security of Independent Express Cargo Ltd. (“Independent Express Cargo”) in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. Avigilon Control Center VMS To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine-acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras — including the H4 Pro, the H4 Multi-sensor and the H4A Bullet with self-learning video analytics — were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. Incorporating advanced AI technologies By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, director of Independent Express Cargo. “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority: our customers.” Intelligent video security system “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, chief executive officer of Usee.ie. “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorized entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorized students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorized entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognizes and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorization.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has achieved significant cost savings through the prevention of vandalismThe college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customizing and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focused on learning.
Senstar, global provider of video management solutions and perimeter intrusion detection systems, has published a case study detailing how its Senstar Symphony video management system (VMS) and video analytics are helping Ferretería Ochoa secure spaces and gather business intelligence. Senstar Symphony vMS Ferretería Ochoa is a hardware and home improvement retail chain that has been operating in the Dominican Republic for over 45 years. Symphony was first installed at one of its retail stores in 2013 and is now being used at six locations, including a storage facility and a manufacturing facility. Ferretería Ochoa also uses several of Senstar’s video analytics to better understand customer and employee behavior. One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control. This not only refers to shoplifting by customers, but also to errors – accidental or intentional – made during shipping and receiving. Employees are aware they are being monitored at all times and understand the system’s ability to capture incidents and provide proof. Central video monitoring “It dissuades deceitful and malicious situations such as shipping more items than ordered or a more expensive item,” said Mr. Gomez. “The deterrence factor Symphony provides is probably the most important result we have achieved.” Symphony has also enabled Ferretería Ochoa to utilize security personnel more efficiently and has reduced costs by having video from all sites managed from one central location. Retail security “Senstar Symphony and analytics are ideal for retailers looking to deter theft, protect staff and customers and improve the overall customer experience,” said Senstar’s Director, North America Business Development Anthony Hackett. “We are happy to be helping Ferretería Ochoa achieve such results.”
The power grid is a modern engineering marvel, providing us widely available and affordable energy for not only our day to day lives, but also highly critical infrastructure elements for which we rely on personally, and as an economy. However, our reliance on the grid also makes it highly susceptible to adverse events, including physical attacks. All parts of the grid can become victims of malicious events, but substations are particularly vulnerable due to their role in power distribution and the nature of their equipment. Power utilities’ security The challenge power utilities worldwide are facing is finding an affordable solution The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-104 specifically calls for implemented security plans which include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Fortunately, there are many solutions to help power utilities address these security concerns, one effective choice is the use of intelligent video. Intelligent video analytics solution Intelligent video, or video analytics, is a popular choice for the protection of critical facilities given its ability to detect, provide instant visual confirmation of the event and subsequent event forensics. The capability of this technology is increasing at a rapid rate, while decreases in hardware cost make such solutions affordable for owners or operators of critical bulk-power system sites. This case study looks at the issue of substation vulnerability and how to best use video to address, keeping in mind requirements of CIP-014. Such a system consists of fixed cameras, pan-tilt-zoom (PTZ) cameras, a deterrence device and data communication capability. Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc. In most cases, substations can benefit from a simple “camera-following” design, which includes surveillance of a potential breach at the fence line, as well as, the ability for early detection for some distance beyond the physical perimeter. Camera-Following design In a camera-following design, in addition to its own coverage, each camera is responsible for covering the blind spot of the adjacent camera. That camera is then responsible for covering the blind spot of the next camera, and this pairing continues around the perimeter until the final camera covers the blind spot of the first. This type of coverage design is very effective and affordable for locations with well-defined perimeters, such as substations. Using this layout, the video feed from the fixed cameras are then enabled with video analytics algorithms to alert when predefined conditions are met. This is done by inputting the video signal into a server, edge device or NVR, located at the site, or remote to the location. Intelligent video technology Today’s intelligent video technology provides for very specific alarm criteria Today’s intelligent video technology provides for very specific alarm criteria, which in addition to only alarming when a target enters in a specific region, can also discriminate, or classify, by the type of target: human, vehicle, etc. Furthermore, the alarm can be restricted by specific actions taken by the target, such as loitering in an area, dropping or throwing an object, more than one target entering with a valid badge swipe (tailgating) or even the speed at which a target is entering an area. This level of discrimination provides the ability to address very specific vulnerabilities, as well as, avoid nuisance targets, such as wildlife, debris or moving vegetation. Another key feature with significant value to substation protection is the geospatial aspects available with some video analytic solutions. This capability maps each pixel of video to its real-world latitude, longitude and elevation. This results in further assessment of the target, including the actual location, the real size of the target, the real speed and the current track. It also affords the opportunity to provide a real-time display of this information to the security operator through an easy to understand map-based user interface. Autonomous PTZ cameras Geospatial video analytics provide the benefit of knowing the exact map-based location of the target Another key assessment aspect of this substation protection scheme is the use of autonomous PTZ cameras. These are typically placed at the corners of the perimeter where they can service detections from multiple fixed cameras. As previously mentioned, geospatial video analytics, provide the benefit of knowing the exact map-based location of the target. Knowing the location of the target is extremely valuable to the security officer, but it is also the basis for a feature known as “slew to cue,” whereby PTZ cameras armed with video intelligence can be automatically steered to the same location for instant confirmation of the target. In most cases, “slew to cue” functionality also includes an “intelligent zoom” feature, which uses the target size information from the alarm, the PTZ camera location and the target location to adjust the zoom level of the PTZ for an instant view of the target that can provide identification details (clothing color, car type, etc) without the need for the operator to further adjust the zoom. Target detection and response Once a target is detected, a security approach leveraging intelligent video can continue with a coordinated response Once a target is detected and confirmed, a security approach leveraging the use of intelligent video can continue with a coordinated response to the event. When video analytics is applied to pan-tilt-zoom cameras, it has the ability to automatically follow a defined target, freeing the operator to take other actions, such as coordinating with law enforcement officials. This feature, referred to as camera auto follow or PTZ following, can be automatically engaged as the result of a detection event, or subsequent to a slew to cue action. The system will continue to follow the target until it reaches a pre-defined system time-out, the operator takes manual control, or the camera can no longer view the target. The system can then provide the resulting PTZ video as a component of the detection alarm, for a more complete understanding of the intrusion for the operator to review. Effective deterrence At this point, the system has detected the target, classified its type and verified it has met alarm conditions. As part of the alarm it has also included dynamic indication of its location on a map, autonomously steered a PTZ to the target to allow for gathering of more detailed target information and a PTZ has locked on and is now following the target without any required user interaction. Total elapsed time to this point in the security response is typically less than 5 seconds. Deterrence is often realized as a fence, physical barriers or access controlled gates This level of automated response addresses many vulnerabilities typically identified as part of a CIP-014 security assessment, but with minimal extra cost, it can be extended to help with the aspect of deterrence. Deterrence is often realized as a fence, physical barriers or access controlled gates. These are physical items and should certainly be included in a substation security plan. Intrusion detection However, another form of deterrence, which can be enabled through the use of intelligent video is the idea of audio talk down. This is the use of live or pre-recorded audio, which is activated upon an intrusion to deter the intruder. Different from a general alarm warning audio, audio talk down uses information about the location of the intruder and their actions to select appropriate pre-recorded audio to deter the intruder. Worse case, the understanding that they are being actively monitored may hasten their plan. Video-Based security and alarm system A common concern when deploying such a system is the amount of bandwidth required A common concern when deploying such a system is the amount of bandwidth required. Substations are almost always unmanned, which means the intrusion information must have a means to get communicated back to the main monitoring location. From a design aspect, this is typically the case, but it is important to know that it is not a requirement in order to gain security benefits from a video based system. The system described in this case study has the capability to detect, assess, respond and deter without any communication back to a main command and control. Alarms, events and system actions can be logged and stored remotely for review at a later time. In reality, utilities will want to be notified and react in real time. In these cases, video systems can adjust to the available bandwidth – from a low bandwidth situation where a textual alarm is provided with an image of the detection, to a high bandwidth installation where feeds from multiple cameras can be monitored and controlled in real time. Web-Based, mobile access In each case, complete alarm information, including meta data, images and video can be readily available to the security operations center, which can then take action based on their security response plan, including contacting and coordinating this alarm data with local law enforcement through web-based access or mobile phones. This case study outlines the effectiveness of utilising video analytics to address the physical vulnerabilities of a typical substation. The study outlines how recent technological advances can autonomously address assessment, response and deterrence This case study outlines the effectiveness of utilizing video analytics to address the physical vulnerabilities of a typical substation. Further, the study outlines how recent technological advances allow such a solution to extend beyond the mere detection of events, but can also autonomously address assessment, response and deterrence. Key capabilities Of intelligent video include: Advanced Detection – Accurate alarming based on specific targets types and actions Situational Awareness – The ability to quickly convey the critical details of a security event in an easy to understand map-based format. Real-time Target Location – Real-time location information of events and real-time location tracking of potential intruders. Autonomous Sensor Control – Automated steering of cameras to an event location and subsequent hands free video tracking of a suspect. Although each utility and substation may encounter different vulnerabilities, this case study outlines how video can be considered to address NERC guidelines for protecting critical substation assets by providing situational awareness of a potential threat and initiating an appropriate and timely response.
Round table discussion
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
How to Choose the Right Solution for Video Data to Enhance Security and Operational IntelligenceDownload