Video surveillance systems
IDIS, a global security company that designs, develops and manufactures surveillance solutions for a wide range of commercial and public sector markets, has announced that the company is proud to be participating in the Global Security Exchange Plus (GSX+) virtual exhibit. Global Security Exchange Plus While most of the industry trade shows have had to opt for online experiences, GSX+ promises to deliver the high caliber of expertise, influence, and resources synonymous with this flagship ASIS...
Synology Inc. has announced the launch of DiskStation DS1621xs+ NAS, redefining performance expectations in a compact tower form-factor. Pairing a quad-core Xeon processor, together with ECC memory and onboard 10GbE, the DS1621xs+ raises the bar for high-performance data storage and management. Super-fast micro-server The DS1621xs+ shares a powerful Xeon processor found in some of the best datacenter bound devices, but now also in an 11.5L chassis. Over 3.1 GB/s seq. read and 1.8 GB/s seq. wri...
Oprema are delighted to announce a new partnership with Camect. Camect is a Silicon Valley company creating the simplest and most useful security solutions from ordinary camera installations in homes and businesses. Artificial Intelligence Camect’s state-of-the-art Artificial Intelligence (AI) understands the objects that cameras see and raises alerts for only the interesting and relevant events, thereby eliminating false alarms. Furthermore, it doesn’t eat up bandwidth, it records...
General Dynamics Mission Systems and Dedrone, the globally renowned company in airspace security and defense, has announced their strategic counter-drone partnership, providing General Dynamics' global network with access to Dedrone's complete drone detection and defeat technology. Counter-unmanned aerial systems As part of this strategic agreement, General Dynamics Mission Systems becomes a value-added reseller for Dedrone's counter-unmanned aerial system (C-UAS) capabilities and has made a s...
FelenaSoft announced the release of Xeoma software version capable of detecting people that are or are not wearing protective facial masks. With the start of the pandemic a facial mask has become an essential part of the everyday life and an integral element of the safety rules in many governments. Thanks to current technological advances, cutting-edge solutions like Xeoma can aid humanity in the struggle. Xeoma’s Mask Detector is a fully automated, artificial intelligence-powered feature...
Proven solutions for mass notification of critical information in a variety of environments, the IP-SDMF and IP-DDS IP speakers from AtlasIED were recently selected as Best Classroom IP Speaker and Best Two-Sided IP Speaker, respectively, by Singlewire. Singlewire 2020 IP Speaker contest In its third year, the Singlewire 2020 IP Speaker contest recognizes best speaker solutions in a number of categories. The entrants were judged on their ability to communicate audio alerts that grab people&rsq...
FLIR Systems, Inc. has announced a new addition to its premium Quasar line of PTZ cameras, the FLIR Quasar 4K 31x IR PTZ. The camera offers 4K visible resolution with 31x optical zoom paired with long-range, infrared illumination (IR) for low-light coverage up to 200 meters in challenging environments. FLIR Quasar 4K 31x IR PTZ camera With an expanded operating temperature range of -40 to 60 degrees Celsius/140 degrees Fahrenheit, IP66 for water and dust protection, and NEMA-4X (salt-tolerance) ratings, the Quasar 4K 31x IR PTZ camera is equipped for consistent operation in extreme weather conditions. Pan-Tilt de-icing and built-in lens wiper paired with remote-operated washer accessory systems, keep the camera functional and operational in remote or hard to access installations. Enhanced low-light visibility imaging The FLIR Quasar 4K 31x IR PTZ camera is a key addition to the Quasar premium family of products" “The FLIR Quasar 4K 31x IR PTZ camera is a key addition to the Quasar premium family of products, offering a longer-range option with excellent low-light visible imaging for critical infrastructure sites, remote facilities, or other large areas that require close monitoring in all conditions,” said Daniel Gundlach, Global Business Development, Solutions Business at FLIR Systems. He adds, “The camera is designed to withstand severe environmental conditions, while also providing the crisp images professionals need for real-time situational awareness and post-event evidentiary support.” Open platform compatibility Similar to other Quasar products, the Quasar 4K 31x IR PTZ camera maintains open platform compatibility and can be used with a large variety of third-party VMS solutions or FLIR United VMS. The Quasar 4K 31x IR PTZ camera includes industry standard security protocols and additional cyber security enhancements, including unique protection from log-in attacks, hardware and software authentication, and encryption to help keep facilities safe from cyber threats. FLIR Quasar 4K 31x IR PTZ cameras are available for purchase globally starting September 1 2020, from FLIR or authorized dealers.
Ava, a unified security company, has announced the completion of the merger between Jazz Networks, renowned cyber security insider threat detection and response firm and Vaion, an end-to-end video security solutions provider. Ava is now uniquely positioned to deliver unified cyber and physical security solutions to organizations worldwide. Tormod Ree, Chief Executive Officer (CEO), Ava Security, said “The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the dots across both domains. In April 2020, we announced the company’s vision and over the past five months, we have been connecting those dots, working with new partners and helping organizations across industries protect their most valued assets, both online and offline.” Integrated cyber and video solution Ava’s integrated cyber and video solution allows for separate analysis of data from all users, cameras, and servers Ava’s integrated cyber and video solution allows for separate analysis of data from all users, cameras, and servers. The human-centric cyber solution (formerly by Jazz Networks) employs a powerful combination of policy, education, and machine learning sensors to prevent IP theft and sabotage, improve cyber hygiene, and accelerate threat hunting. The end-to-end video solution (formerly by Vaion) delivers proactive video security, and insight including integrated video and audio analytics uniquely powered by machine learning algorithms, intuitive installation processes, and a range of smart cameras. For maximum flexibility and agility, video can be viewed from anywhere with simple web and mobile interfaces. Managing physical and information security “By identifying both cyber and physical security threats before they become incidents, organizations can take a more proactive security posture,” stated Ree. “Managing our physical and information security needs through a wider lens has become critical to protecting our entire operation,” said Bill Tom, Director of Information Technology and Cyber security of Grace Farms Foundation, whose part of its mandate is to combat modern slavery, gender-based violence and environmental crimes. Enhancing data security Bill adds, “The Foundation carries out its work through the publicly available facilities and integrated programs of Grace Farms, an 80-acre property owned and operated by the Foundation with an even larger population accessing data. Ava allows us to leverage possible insider threat information into our overall physical security picture.” The average total cost of a data breach in the U.S. has grown from US$ 3.54 million in 2006 to US$ 8.19 million in 2019, a 130% increase over 14 years. The pressure on chief information security officers (CISOs) and security teams, in general, has increased incrementally. It is imperative that organizations have a flexible, secure solution to prevent incidents from occurring rather than just documenting the damage reactively. Driving innovation in unified security market Ava is driving innovation in the unified security market. Organizations must account for the full spectrum of risk" "Ava is driving innovation in the unified security market. It is no longer enough to protect against either physical or cyber threats. Organizations must account for the full spectrum of risk," said Espen Riksa, Director and Partner Manager, Atea. As companies move toward a hybrid workforce structure with employees splitting time between working in-office and remote, organizations must reassess processes to keep IT staff from burning out, while at the same time efficiently managing distributed systems and assets. Unified security solution “You can’t build firewalls around remote employees, businesses must empower and educate staff to make the right choices,” adds Tormod Ree, CEO, Ava Security. “We are excited to partner with Ava to bring innovative unified security solutions to our mutual customers,” said Urban Jansson, Sales Manager, Cygate, adding “Ava brings a unique understanding of the market’s pain points. Beyond protecting against physical and cyber threats, Ava understands that businesses don’t always have the in-house resources to monitor operations 24/7. Ava’s cutting edge use of machine learning and the cloud eases the burden on internal resources while proactively mitigating the risk.”
Suprema, a globally renowned company in access control, time and attendance and biometric solutions, has announced the introduction of the FaceStation F2 Fusion Multimodal Terminal. The new multimodal biometric solution delivers exceptional authentication accuracy and anti-spoofing performance by the fusion of visual and infrared face recognition technology. FaceStation F2 Fusion Multimodal Terminal The FaceStation F2 can also be combined with Suprema Thermal Camera to detect users with high skin temperature, and features mask detection capabilities to help prevent the spread of infectious viruses such as COVID-19. “Suprema continues to develop new and innovative identification and authentication solutions that address emerging challenges affecting the overall security and health of personnel and business operations,” said Young S. Moon, Chief Executive Officer (CEO) of Suprema Inc., adding “Our new FaceStation F2 provides the mission critical identity management, and health and safety capabilities that organizations need today to get employees back to workplaces.” Optimizes IR and visual face recognition FaceStation F2 Fusion Multimodal Terminal optimizes IR and visual face recognition FaceStation F2 Fusion Multimodal Terminal optimizes IR and visual face recognition to produce exceptional authentication results, achieving extremely low false acceptance rate (FAR) of 1 in 10 billion. FaceStation F2’s unique deep-learning fusion algorithm provides industry-renowned face recognition and anti-spoofing performance, regardless of user ethnicity and face changes. The innovative multimodal solution offers various means of authentication including contactless facial recognition, mobile credential, fingerprint and card. The new Fusion Multimodal Terminal also supports Access-on-Card feature that enables identification with biometric data saved on cards. With massive memory capacity, FaceStation F2 can register up to 100,000 users’ fingerprints or 50,000 users’ face data. Integration with Suprema Thermal Camera To meet the increasing global demand for hygiene safety and protection, FaceStation F2 can be combined with Suprema’s Thermal Camera to detect and identify individuals with elevated skin temperature. The unit’s on-board analytics can also automatically screen and notify when an individual is not wearing a mask in areas where facial masks are mandatory. This screening feature can be used in conjunction with face recognition as FaceStation F2 is able to recognize faces with masks without sacrificing accuracy. FaceStation F2 also offers remote enrollment that allows user registration by uploading profile photos, reducing physical contact, improving convenience and safety. The new FaceStation F2 is built on the highly secure Android platform and encrypts all biometric credentials to help best protect individual’s personal information from cyber theft.
Dahua Technology, a globally renowned video-centric smart IoT solution and service provider, made new breakthroughs in the field of AI technology recently. Various indicators of its Gait Recognition Technology have once again broken the record of CASIA-B gait dataset: the average accuracy of Rank1 for NM (normal walking), BG (with a bag) and CL (in a coat) reached 97.4%, 94.0%, and 87.0% respectively, hitting another historical heights and maintaining its pioneering position. Gait recognition uses body shape and walking posture to identify a person, even if his/her face is occluded. It is one of the biometric recognition technologies with the greatest potential for long distance recognition scenarios. Gait recognition analysis Aiming to address the technical difficulties of gait recognition in clothing changing search, carrying changing search and cross-view search, Dahua Technology integrates innovation and application of multi-modal gait algorithms, local gait feature extraction, and spatio-temporal gait feature extraction technologies. Dahua Technology has been cultivating and innovating in the field of AI technology Combined with powerful model training and object recognition, it greatly improves the algorithm's robustness in special scene applications such as clothing changing, similar clothing, facial occlusion, and facial disguise, and thus making the gait recognition analysis more accurate and efficient. In recent years, Dahua Technology has been cultivating and innovating in the field of AI technology, and has continuously improved its core competencies that include algorithms and computing power. Fundamental AI capabilities So far, Dahua Technology has received numerous first-place recognitions in various global AI ranking categories including Scene Parsing, Binocular Stereo Matching, Remote Sensing Image Analysis, Person Re-identification and Visual Target Tracking Algorithms. It has accelerated the transformation of its AI technology achievements into real and actual production, maintaining its pioneering edge in the industry. Based on the construction of its fundamental AI capabilities and resources, Dahua Technology has released its new generation AI platform. It integrates computing centers, data centers and training centers in order to build its sustainable capabilities in the fully linked development of AI, including data management, algorithm training, cross-hardware platform optimization, integrated deployment, and automated testing. Intelligent business applications Dahua Technology combines industry development and diversified needs of users It provides guarantees for algorithm research and application, improves efficiency of AI research and development, and helps users build intelligent business applications and accelerate end-to-end AI industrialization. At the same time, Dahua Technology combines industry development and diversified needs of users, focusing on AI technology fields such as smart transportation, smart travel, behavior analysis, item analysis, navigation and positioning, multi-dimensional sensing, as well as smart coding and decoding. Digital and intelligent transformation It has accelerated the development and upgrade of its algorithms for application scenarios, quickly realizing the commercial coverage of smart products and solutions in the whole system, and empowering customers to innovate in a wide range of applications. These include public security, transportation, finance, communities, energy, education, manufacturing, construction sites and other industries, thus assisting users in achieving their digital and intelligent transformation. In the future, Dahua Technology will continuously adhere to the concept of "Empowering industries with AI" in promoting the in-depth integration of AI technology and various industry scenarios, fully utilizing the support and leading role of technological innovation in the sustainable development of hundreds of industries. The company will advocate popularization and application of AI and other new generation technologies in order to empower the digital transformation and upgrading of all industries.
Dahua Technology, the globally renowned video security and smart IoT solutions provider, is helping businesses reopen amid the COVID-19 pandemic. Thermal imaging, face detection, and other technologies play key roles in screening for skin temperature and determining whether someone is wearing a mask or not. Thermal temperature monitoring “Since the start of the COVID-19 pandemic, Dahua has been devoted to providing an array of solutions to help keep businesses running wherever possible,” remarked Jennifer Hackenburg, Senior Product Marketing Manager of Dahua Technology USA. Jennifer adds, “Our offerings reflect the varied needs of different business environments – we strive to provide options for every budget and application.” SafetyTemp Thermal Temperature Station Compact and simple, the SafetyTemp Thermal Temperature Station is ideally suited for small installations Thermal temperature monitoring lets business owners get fast, accurate readings of the skin temperature of employees and customers. People pass through a checkpoint where a monitoring station measures the temperature of their skin, while no physical contact is made and the traffic flow remains smooth. Compact and simple, the SafetyTemp Thermal Temperature Station is ideally suited for small installations. It takes measurements from up to six feet away and in only 0.2 seconds, raising audible alerts if a person’s skin temperature is above a user-defined threshold. It can also help determine whether a person is wearing a mask. Dahua Thermal Temperature Monitoring Solution For medium and large installations, the Dahua Thermal Temperature Monitoring Solution is a more robust option that incorporates a hybrid network thermal camera, an NVR, and a blackbody calibration device for highly accurate skin temperature measurements (±0.54° F). Like SafetyTemp, this is a contact-free solution that makes screening fast and efficient. As people pass through the checkpoint, their skin temperatures are captured and the system can send alerts about temperature or mask status via the 4K 16-inch 1U NVR (DHI-NVR5216-16P-I) or a mobile app (DMSS). Thermal cameras deployed Two different camera options are available, including a new model (DH-TPC-BF3221-T), which is well-suited for medium-sized businesses due to a lower price point. It offers accurate readings from up to 16 feet away. The high-end model (DH-TPC-BF5421) has a higher resolution thermal lens, lower NETD, and large aperture, resulting in more pixels and less noise in the image. This, in turn, means more data points for the system to analyze and lets the camera obtain readings from up to 23 feet away. Handheld Thermal Temperature Monitoring Device Handheld Thermal Temperature Monitoring Device, DH-TPC-HT2201 features a 3.5mm camera For a portable solution, the Handheld Thermal Temperature Monitoring Device, DH-TPC-HT2201 features a 3.5mm camera that can be aimed directly at the subject from a safe distance. AI temperature measurement facilitates high accuracy (±0.9° F), and an alarm sounds when a person’s skin temperature exceeds a user-defined threshold. This simple to use, cost effective device is best employed in small applications with a dense customer or personnel base. A built-in, rechargeable, lithium-ion battery lasts more than eight hours in between charging. Smart Motion Detection and Face Detection When mask detection is the top priority, a new 5MP dome camera (N55DY82) gives users an active alarm message when it detects people without masks within its field of view. A wealth of other features, including perimeter protection, people counting, heat mapping, Smart Motion Detection (SMD) and face detection, make this high-performing camera an excellent security solution as well. Highly accurate, it can be paired with a thermal temperature camera for a complete solution. Floor-Standing Digital Signage Dahua’s 55-inch Floor-Standing Digital Signage (DHI-LDV55-INDOOR) complements digital monitoring checkpoints. It offers a 1080p display screen that is customizable to display safety requirements, provide instructions for those preparing to have their temperature measured, or simply point people in the right direction. The digital signage can also be deployed as a component of Dahua’s new flow control solution It supports a wide range of audio and video encoding formats and has built-in media player software and a USB player for displaying advertisements. The digital signage can also be deployed as a component of Dahua’s new flow control solution. This solution helps businesses maintain social distancing protocols and avoid overcrowding while streamlining efforts and reducing manpower for facilities where occupancy is regulated. People-counting camera installed A people-counting camera installed at a restaurant entrance, for example, keeps track of how many people have entered and exited. Working in tandem, the display tells customers when they may enter the restaurant, grocery store, or retail store, or when it is at capacity and they need to wait. The entire solution can integrate with the mask detection camera and thermal temperature solutions for large applications needing to manage a complex set of safety and health requirements. “Convenience and accuracy are important to our customers as they reopen their businesses,” stated Hackenburg, adding “Dahua has risen to the challenge by providing flexible options for a variety of needs and budgets, supporting a more seamless transition into this new way of doing business.”
A substantial focus of the security industry is on the selection and installation of security systems, and there is no doubt that this is a critical element of the process. However, in order to ensure that security systems such as access control, video surveillance, intrusion detection and panic alarms deliver on ‘game day’, an equal if not greater emphasis has to be put on the actions that are taken after the installers have closed the doors on the truck and driven away. This article covers some important issues that were covered at the 2019 International Association of Professional Security Consultants (IAPSC) annual conference in Miami, Florida, where Frank Pisciotta, CSC, Business Protection Specialists, Inc. and Michael Silva, CPP, Silva Consultants, facilitated a discussion among security professionals on the topic. Backwards compatibility in access control solutions David Barnard of RS2 security highlighted the importance of backwards compatibility in access control solutions David Barnard of RS2 Technologies LLC highlighted the importance of backwards compatibility in access control software solutions. Reputable manufacturers are constantly evolving software products and it is critical that software continues to work with all installed hardware or owners will find themselves purchasing equipment a second time, which is never good news. An example, a case study with a client where the video management software upgrades were not backwards compatible through the mobile app and a small manufacturing site was looking at a US$ 75,000 price tag to upgrade cameras to make them compatible with the ‘updated software’. Risks of failures in door hardware products Jim Primovic from ASSA ABLOY cautioned about the risks of failures in door hardware products resulting in a failure to attention to detail in the selection and, in particular, the installation process. He explained the importance of using certified installers to avoid operation problems. In light of constantly evolving software revisions, how often does one see any additional training provided to end users when software updates are released? Charles Johnson of Open Options raised this important point and it is an excellent one. As organizations think about structuring maintenance agreements, it might be wise to consider ongoing training to cover software updates and ensure that end users can continue to optimize the features and benefits of software revisions. Software Support Kim Kornmaier of Honeywell mentioned another element of security system lifecycle consideration, which is ‘Software Support’. Maintenance agreements are available and will likely be offered from every installer and come in a variety of flavors. However, care needs to be exercised to ensure that whatever services and support are included, in the scope of a maintenance agreement, have a clear correlation between service and software upgrades versus the fee charged. Software upgrades and system testing Maintenance agreements should be avoided that simply guarantee the free replacement of parts (which may or may not ever get used, even after you pay for it). Services that should be considered include software upgrades, system testing and replacement of consumable parts, like back up batteries. Another key issue ties directly to periodically measuring and ensuring the risk reduction results of security systems, for example, with an access control system, there are several actions recommended for system owners, including: Conduct periodic door and alarm testing - This presumes users have installed all of the necessary parts to enable alarm monitoring). These tests should include the mechanical testing of doors and confirming door-held-open-too-long and forced-door alarms are properly reporting to the alarm client. Importance of harnessing door alarming capacity Excessive door alarms are an indication of either a user or system problem Excessive door alarms are an indication of either a user or system problem or all alarms should be investigated to determine root cause and corrective action needed. Organizations who fail to harness door alarming capability are giving away up to 50 percent of the system's potential benefit. Ensuring the integrity of the access control database is of prime importance. The failure to manage this can lead to unauthorized access and serious security incidents. This can be achieved in a variety of ways, but in the majority of risk assessments they have conducted over the years, it is common to find separated employees and contractor records with active credentials in the database. Ways to mitigate this risk include: Integrating your access control database with active directory (works for employees, not so well for contractors); Utilizing expiration dates on contractor credentials; Periodically manually auditing contractor and employee active badge reports for anomalies, which may indicate process weaknesses in the change management process; Utilizing the ‘use it or lose it’ feature in many software programs that automatically disable a credential after a set period of non-use (e.g., 90 days); and Establishing processes to limit the removal of certain badges from the site (e.g., those issued to contractors or temporary employees). ‘First Card Unlock’ feature Irregular schedules, holidays and natural disasters can result in access vulnerability. For instance, if access-controlled doors at a site are programmed to open on a timer and something prevents persons from arriving at work (e.g., snowstorm), a site may be left exposed. A mitigation technique against this type of risk would be to employ a concept called ‘First Card Unlock’. Under this feature, a lobby entrance to an office, for instance, would not enter into an unlocked state, until the first authorized employee presented a card and entered the workplace. Changing holiday programming in security systems Holiday programming in some systems needs to be changed on an annual basis Holiday programming in some systems needs to be changed on an annual basis. Managing holidays in an access control system results in doors staying secure which would otherwise be unlocked on a normal business day. Similarly, intrusion detection, duress devices and video surveillance systems can let users down without the proper care and feeding. Examples would include: A panic device fails to communicate an emergency situation because it was not properly reset or the wiring has been damaged due to poor installation. Panic devices should be regularly tested and ideally the activation during testing should be by a person who would be required to use the device in an actual incident. The objective here is to build competency in the persons who may need to activate a device discretely. Similarly, intrusion detection systems should be carefully tested to ensure that all devices are properly reporting to the panel and that the panel is communicating properly to the central station. If there are redundant communications channels, each should be verified. In the same way someone would conduct audits of active credentials in an access control system, it is strongly recommended that users perform a similar review with PIN codes, which have been assigned and would allow for an unauthorized person to disarm a system. Utilizing the failure-to-close feature to ensure that through collusion or negligence, if the last person out of a restricted area fails to arm the panel, the central station will notify a responsible party about the omission. Further, reviewing opening and closing reports might well detect inappropriate entries by authorized personnel which are indicative of suspicious or illegal activity. These features and reports will likely be at an additional cost, but they are important insurance to protect against insider threat. It is not uncommon to hear about an incident happening and during the investigation, the owner of the system discovers that the needed camera was not recording. Where video is not under routine observation, it is recommended to determine if your video management system can send an alarm in the event of video loss. This would allow for rapid remediation before the video loss is discovered in the course of an investigation. Avoiding degraded video quality over time In almost every case, degraded video quality is directly related to resource saturation With respect to video surveillance, as systems grow and evolve over the life of the system, organizations may experience degradation. Darren Giacomini of BCDVideo has studied this issue extensively and concludes that in many cases, installers or others are simply putting too many devices on a VLAN, which results in latency and other conflicts. Degraded video quality has a finite number of potential root causes. In almost every case, degraded video quality is directly related to resource saturation. The resources on a surveillance network consist of IP cameras, network switches, network uplinks, viewing stations, database management and archives. Resource depletions According to Giacomini, each of the resource shares a common thread. And, at the basic level, each of those items is nothing more than a purpose-built computer with limited CPU, memory and network capacity. When any of these resources exceed their capacity, the quality of service delivered will degrade. The following are common resource depletions that can degrade video quality and require a much deeper dive, but are included here as a starting point: IP camera CPU utilization is in excess of 85 percent; CPU elevation in the decoder or workstation decoding the video; and Network congestion or CPU elevation in the network switch. Maintaining the integrity of archived video data Giacomini indicated that the majority of the time degraded video is associated with resource depletion Giacomini indicated that the majority of the time degraded video is associated with resource depletion in one of these key components. Investigation of the potential causes can save time and effort, and prevent a video management software application from unduly being blamed for poor performance during its lifecycle. Also, on the topic of video, John Kampfhenkel, Director of Technical Sales at Veracity discussed the challenges that organizations face when video management system storage is undersized and the need to carefully plan for video retention of existing recorded data when the video system has to be expanded. This can be a problem organizations face and when they do, it is best to involve a video storage expert to determine options, costs and potential legal requirements for maintaining the integrity of archived video data. Selecting the right security technology Dependent on the level and type of integration between various systems, another challenge may be to preserve the integration between the two systems. System owners will need to coordinate carefully with installer(s) to ensure that a software revision to one system will not result in a disruption to a software level integration. This type of integration may require a delay in being able to upgrade one or the other application software versions until the integration can again be certified. Selecting the right security technology is an important element of an organization's security risk management. However, experts would argue that in terms of getting measurable results from technology, there needs to be a keen focus on sustaining activities after the installer closes the doors and drives away. By adhering to the consultant and manufacturers' guidance in this article, organizations can substantially reduce the risk to people, assets and information, and prevent criminal and terrorist incidents in the workplace.
The coronavirus pandemic has brought about an unprecedented crisis for businesses and individuals. It has also created a new normal, notwithstanding the disruption to our lives, ultimately changing life as we knew it. However, our resilience as humans will ensure that we survive and become better, stronger, and more determined than ever before. As I mentioned, both businesses and individuals have struggled significantly to balance the need for safety versus survival. But at AxxonSoft, we remain committed to keeping our people safe, while ensuring that our support and commitment to our clients are not compromised. Ensuring business continuity At AxxonSoft, our vision has always been to ensure business continuity through enhanced safety and video surveillance offerings. Adhering to the COVID-19 regulations, we are prescribing to social distancing to slow the spread of the virus. As such, we are utilising this time to ensure that our service offering is optimized to afford our clients the ability to repurpose and extend their remote working viabilities. As an essential service provider, we have ensured that we are providing the right tools to our clients to comply with regulations. Our video analytics and face recognition services have no reliance on on-site control rooms and, therefore, clients’ security solutions and personal safety are not compromised. Innovation reimagined During these precarious times, our focus remains on support and service. Our development team continues to work tirelessly to ensure that you can use our software during the lockdown and have accelerated innovation to this end. While we must maintain social distancing, we can and will still be of service to our community Therefore, we are proud to present version 4.11 of the Intellect PSIM, which offers our clients a neural network-based analytical tracker which recognises specific types of objects, such as humans and vehicles. We have also equipped this version with video wall management interface, automatic object tracking and a web reporting subsystem. Behavioral analytics generates data by detecting specific postures, like crouching, shooting or any potentially dangerous scenario. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement, offering a comprehensive bird’s-eye view to clients. This upgrade also upholds mandated social distancing measures and keeps any face-to-face meetings to a minimal. The silver lining is that you can even use this technology when the pandemic is over. Now that’s what I call experiencing the next with AxxonSoft! Finding solutions to the challenges Our specialist technology and frontline technical support staff will ensure that your business is protected during and post-lockdown. We will continue to ensure that we provide solutions to the new challenges that the coronavirus brings, ensuring that our clients can emerge stronger and more responsive to any changes in the future. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement While we must maintain social distancing, we can and will still be of service to our community. After all, change is not just about technology but about mastering mindsets. The COVID-19 disaster has demanded that businesses embrace tech disruptions as early as possible and apply technology in imaginative ways to define the new world of work. Until next time, stay safe!
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand For Video Surveillance And Security Products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable Video Monitoring Solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Industry experts predict that sensors in the home will reach a level of sophistication never considered in early versions of Smart Home. These devices will know when the house is empty and be able to shut off heating and cooling systems. Smart phone with geolocation will then tell it when the owner is on their way back so it can start adjusting the temperature to a comfortable level. And, it won’t just be lights that turn on and off. Sensors in washing machines will know that clothes have been put inside and will start the cycle at a time when costs are at a lower level. The Smart Home market is also driving innovation in the form of Bluetooth low energy (BLE)-enabled locks for external doors on homes and adding mobile credential use to their offering. This in turn is driving volume in the wireless lock sector and having a positive impact on volumes and pricing in the commercial locking market. Data capture form to appear here! Wireless home automation As the home automation industry has expanded with an ever-growing number of devices and services, companies are placing bets on which wireless protocols will dominate. The past few years the leaders have been Z-Wave and ZigBee. Companies are also using a variety of other standards including Crestron’s Infinet, Insteon, and proprietary technologies such as Lutron’s ClearConnect. The home automation industry has expanded with an ever-growing number of devices and services The popular ZigBee and Z-Wave short-range wireless technologies have proven ideal for the kinds of home-area networks that are becoming prevalent. Based on the IEEE’s 802.15.4 personal-area network radio standard, ZigBee is an open wireless standard. Z-Wave was developed by Zensys (later acquired by Sigma Designs) as a proprietary wireless standard. Z-Wave’s wireless mesh networking technology allows nodes to communicate with each other directly or indirectly through available relays if they’re within range. Out of range nodes can link with each other to access and exchange information. A Z-Wave network can have up to 232 nodes. Some companies have sought to hedge their bets out of a desire to be more “manufacturer agnostic.” Bluetooth and Wi-Fi are gaining popularity with new low-power variations of these standards. Smart doors and their benefits Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities. Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace. While smart video surveillance solutions that can impact home automation are still in nascent stages, the potential is immense. Modern video analytics and surveillance technology have the capability to offer convenience to the connected homeowner and lower energy consumption. By determining the optimum lighting, heating and cooling needs of a connected home, smart video surveillance technology can drive down energy-related costs significantly. Smart cameras will also have an impact on the need for DVR/NVR products in an automated home, as analytics-driven video surveillance solutions that generate large amounts of data will reduce the need for these devices. Another emerging element in home security is the use of drones The resolution of an advanced radar sensor Smart video surveillance technology can drive down energy-related costs significantly Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in an elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in the wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimization of home devices. A radar sensor’s accuracy and its ability to support wide functionality and applications are determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model: As the resolution is ever improving, the sharper and more detailed is the image. Drones as a security mechanism Another emerging element in home security is the use of drones. An Amazon patent outlines how its unmanned aerial vehicles (UAVs) could perform a surveillance action at a property of an authorized party. It would be “hired” to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorized locations and provide information back to the homeowner. The idea is to deploy Amazon’s previously proposed (but not yet realized) “delivery drone” to provide surveillance of customers’ homes between making deliveries. In a “surveillance as a service” scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. Catch up on part one and part two of our smart home mini series.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Center, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Center (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Center (RTCC) The Real Time Crime Center (RTCC) already uses Security Center to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Center’s IT department also set up an event-to-action rule in the Security Center platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Center, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Center (RTCC). Bill adds, “We love working with the Genetec Security Center security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
South Africa conservationist, Brett Barlow needed a robust security solution to protect Munu, a blind, South Western Black Rhinoceros, whose species is critically endangered. FLIR video solution Barlow deployed an all FLIR solution, comprising thermal cameras, visible cameras and an NVR, for around-the-clock monitoring, early detection and real-time response. FLIR technology has played an instrumental role to protect Munu’s life and livelihood. Throughout the 20th century, big-game hunters, settlers and poachers have decimated Africa’s black rhino population. In the early 1970s, there were approximately 65,000 black rhinos, and by 2018, that number was reduced to 5,630. In 2020, there are three remaining subspecies of the black rhino, one of the most vulnerable being the South Western Black Rhinoceros, also known as Diceros bicornis bicornis, of which there are only 254 left in South Africa. FLIR thermal and visible security cameras deployed Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes Munu, a 20-year-old blind male rhino, is one of these critically endangered species. When Munu was in danger, South Africa conservationist, Brett Barlow stepped in to save Munu’s life. Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes, detecting threats, increasing safety and enhancing his overall quality of life. In 2019, rangers working at a South African National Park found a black rhino walking in circles and visibly disoriented. They knew they had to do something. After safely tranquilizing him, an ophthalmic surgeon confirmed that the rhino, known as Munu, had suffered two detached retinas and was completely blind, likely as a result of disputes with other rhinos in the area. Protecting endangered rhino, Munu As soon as he heard about the situation, renowned South African conservationist, Brett Barlow spoke with the South African National Park and offered to permanently house and protect Munu. “Every rhino matters,” Barlow adamantly affirmed, adding “You wouldn’t put down a blind child, so why would you put down a blind rhino?” The South African National Park later transferred Munu to Barlow’s care. However, Barlow wasn’t the only one who wanted to help Munu. Relocating Munu to the Mantis Founder’s Lodge Adrian Gardiner, globally renowned conservationist famous for founding the Shamwari Game Reserve and the Sanbona Wildlife Reserve in South Africa, extended the invite for Munu to stay on one of his properties, the Mantis Founder’s Lodge. Wasting no time at all, Barlow relocated Munu to the lodge, knowing it would increase his quality of life. The property, spanning 850 hectares, is home to five white rhinos, as well as other animals, including a zebra and giraffe. The White Lion Foundation, in which Gardiner and Barlow are both executive board members, donated funds to construct Munu’s boma, comprising a secure covered boma and a five-hectare open grazing area. American Humane funding Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats Additional support came from a local internet provider, who donated free internet services for the project. American Humane, a non-profit organization committed to ensuring the safety, welfare and well-being of animals, funded one year of feed for Munu. All donations for Munu go directly to the project with no administration costs deducted. Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats because of his highly valuable horn. He remained a prime target for illegal poaching. Much of Munu’s horn was removed to protect him, but the amount of horn that remained is still worth thousands of dollars. Experts say that one pound of rhino horn is worth at least US$ 3,000 universally and ten times that, on Asian black markets. Thus, even with much of his horn removed, Munu was still in danger. Self-harm was a risk should Munu charge into the boma. Munu’s next door neighbor, Rodney, a white bull rhino, was also a concern should a territorial fight occur. For all these reasons, Barlow looked for ways to enhance Munu’s safety. Video surveillance for enhanced security Previously, the Mantis Founder’s Lodge employed two guards for Munu’s security. However, Barlow believes guards should only be a second line of defense, a visual deterrent that responds to threats. “I wanted to go down to the electronic security system route,” Barlow said, adding “Technology doesn’t sleep.” The first security manufacturer Barlow hired charged high prices for their security products. More than this, once installed, Barlow discovered that these devices were unable to deliver quality images in extreme weather conditions, such as mist or rain, both of which are commonplace at the Lodge. As such, he decided Munu’s security required for a more robust and reliable video security system. In 2019, Wilke Pretorius, Distribution Sales Manager for Sub Sahara Africa at FLIR Systems, was working with Brett Barlow on a separate project. When Barlow told Pretorius about Munu, Pretorius informed the FLIR team who immediately got involved. FLIR end-to-end video surveillance system FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras, in order to protect Munu from poachers. FLIR’s powerful thermal and visible imaging cameras deliver intrusion detection at much longer ranges and complete, 24-hour perimeter protection, regardless of weather conditions. "Other camera manufacturers don't compare. Their cameras can't see through mist or rain. FLIR delivers images 24/7, rain or shine, darkness or light,” Barlow said, adding “technology like FLIR thermal cameras allow for early warnings for perimeter breaches. Even though rhinos have weak eyesight, without any sight, they are basically defenseless. So, in essence, FLIR became Munu’s eyes.” Beyond FLIR’s high-performing technology, Barlow loved working with the FLIR staff. Barlow said, “What drew me to FLIR were the people involved. Wilke and the rest of the FLIR team have been so passionate and resourceful, always available and willing to help when issues arise.” “When I started working at FLIR, Chief Executive Officer (CEO) Jim Cannon said our mission is to save lives and livelihoods,” Pretorius explained, adding, “These words stuck with me. Working on the Munu project, it was clear that saving lives and livelihoods are indeed a passion of FLIR employees. I am proud to be a part of a company so eager and passionate to produce solutions and technology that make a positive impact in the world.” Installation of FLIR cameras Installing the new security system was not an easy task. Merely two days prior to the arrival of FLIR cameras, in March 2020, South Africa was ordered into an immediate lockdown, due to the COVID-19 pandemic. But Barlow was eager to begin the installation process, so he set out to do it himself. By early May 2020, a two-person crew had manually dug over 600 meters of trenching to run cable and conduit through the lodge’s hard African soil. Barlow also installed a solar array to power the system. He cut bushes, installed polling and connected the entire system to FLIR’s central network video recorder (NVR), to view the camera feeds both inside and surrounding Munu’s boma. The result is a fully functioning, comprehensive video security system. FLIR Elara FB-Series ID thermal security cameras deployed Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system based on a two-tier model. The perimeter is shaped as a big triangle about 110 yards away from the boma enclosure. Six FLIR Elara FB-Series ID thermal security cameras, which use onboard analytics to classify human or vehicular intrusions, are installed to monitor the outer perimeter or the first tier. There are also 11 Ariel Full HD IP Bullet cameras deployed, which deliver 1080p video for high motion, complex and low-light scenes. FLIR Saros Dome DH-390 cameras deployed For effective surveillance of Munu’s boma, six FLIR Saros Dome DH-390 cameras, designed to deliver actionable alerts and alarm data, surround the enclosure. One FLIR Saros DM-Series camera is mounted inside the boma to capture every minute detail of Munu’s movement in all conditions. To manage the video from all the cameras, FLIR also supplied its Meridian TM product, a compact, all-in-one network video recorder (NVR), specially designed to support dozens of channels. Meridian also features a FLIR United VMS EZ Client web interface, which simplifies viewing capabilities and saves the cost of additional workstations. Powering, processing and managing this system are six edge servers, FLIR’s USS Edge Appliances, containing 12TB of storage and preloaded with United VMS software, built to seamlessly manage multiple, varied devices. Heightened perimeter protection Thanks to FLIR’s technology, Barlow is confident that Munu can be an ambassador for his species. He hopes Munu’s story may inspire future conservancies around the world to partner with manufacturers, like FLIR, for heightened perimeter protection. Case in point, actress Shannon Elizabeth, founder of the South Africa-based Shannon Elizabeth Foundation that is focused on wildlife conservation, was deeply moved by Munu’s story. She later asked Barlow to participate as an advisor to her foundation’s Ranger Relief Fund. Importance of early warning technology FLIR could prove invaluable to the efforts of rangers all over the African continent to protect endangered animals" In a time where conservation funding is down because of declining tourism due to the COVID-19 pandemic, the Ranger Relief Fund supplies money and much needed equipment to ensure conservation first responders remain employed and properly resourced. With early warning technology being more critical than ever, the need for conservancies to partner with technology manufacturers like FLIR is urgent. “FLIR could prove invaluable to the efforts of rangers all over the African continent to protected endangered animals,” Barlow explained, adding “With Munu being the proof point, FLIR could be more than Munu’s new eyes, but indeed the eyes of an industry desperate to protect the world’s natural heritage from the burgeoning poaching crisis.” Picking the optimal security solution When asked what advice Barlow would give to other conservancies considering similar security technologies, he said “Speak to the right people. Make sure you talk to someone who understands the product. See the solution in action. View a live site and see how it works. Work with the right people to implement that for yourself.” The longer Munu lives, the more good he’ll do. Barlow plans to expand Munu’s boma, once he has acclimatized to his new home. And he has already begun using the FLIR Saros DM-Series’ live stream capabilities to invite learners around the world to observe Munu up close. The plan for Munu is to mate with a female within his own subspecies, thereby directly contributing to the survival of his kind. If Munu does sire a calf, Barlow plans to donate the calf back to the South African National Park that Munu came from to help with the genetic diversity for the reserve. The future for Munu is bright and, with his new eyes, he will see through to the end.
Peake ReLeaf is a local and independently-owned medical cannabis dispensary facility, located in Rockville, Maryland. Through its recently-opened, 4,200-square-foot facility, the company provides a wide range of cannabis and cannabis-infused products to patients with a valid medical marijuana certification, to treat a variety of qualifying conditions such as anorexia, cachexia, chronic or severe pain, glaucoma, PTSD, seizures, severe nausea, and severe or persistent muscle spasms. Installing an efficient video surveillance system While Peake ReLeaf faces the ordinary challenges of any small business as a cannabis dispensary, it is also subject to a number of stringent Maryland Medical Cannabis Commission (MMCC) regulations, which include strict requirements for video surveillance that dictate video quality, system performance, storage and other factors. After much research, they decided to contract Skyline Technology Solutions for their surveillance system because of their transparency, robust IT background and previous experience with medical marijuana facilities. Wisenet QND-6010R dome cameras for indoor surveillance Skyline recommended that PeakReleaf install cameras from Hanwha Techwin America Based on the regulatory needs and many conversations about how they wanted their business to operate, Skyline recommended that PeakReleaf install cameras from Hanwha Techwin America to secure both the interior and exterior of the facility. For indoor use, Skyline installed Wisenet QND-6010R vandal-resistant dome cameras that offer picture clarity so facial features could be easily identified. Wisenet QNV-7080R cameras for outdoor surveillance For outdoor use, Peak ReLeaf chose the Wisenet QNV-7080R cameras that provide 4-megapixel image quality with true wide dynamic range (WDR), motion detection, defocus detection and tampering detection at an affordable price. Both camera models, Wisenet QND-6010R and Wisenet QNV-7080R cameras come integrated with WiseStream II compression technology that can reduce bandwidth by 50%. WiseStream II compression technology WiseStream II compression technology dynamically controls encoding, balancing quality and compression according to movement in the image resulting far less bandwidth and storage requirements. This allowed Peake ReLeaf to meet the MMCC storage requirements in a cost-effective manner. Since the dispensary’s opening, Hanwha cameras have continuously provided the performance and capabilities to ensure Peake ReLeaf remains in compliance with the strict MMCC requirements, even as they continue to evolve moving forward. Cameras featuring onboard video analytics The Hanwha cameras have made it easier to identify and view video thanks to their ability to flag video based on motion or other factors using onboard video analytics. “Hanwha cameras offer us the video quality we need, and the cameras’ video analytic and other capabilities provide us with the flexibility that will allow us to quickly adapt to the inevitable regulatory changes that will come as we navigate this very new industry in Maryland,” said Nate Miller, one of the founding members and Peake ReLeaf’s Executive Vice President.
Protecting commercial properties is complicated and goes beyond safeguarding people and property. Security professionals respond to the needs of the business, staff, contractors, and visitors and deal with the realities of property damage, theft, and disgruntled employees. Vaion helps team react to anomalies and policy enforcement in real-time. Instead of merely investigating incidents, organizations can take the necessary steps to prevent them. Why Vaion? Real-time detection and analysis - Spotlight brings relevant feeds to the operator’s attention and triggers real-time alerts to address threats before they escalate. Leverage integrated video and audio analytics to give an enhanced understanding of the camera feeds. It helps respond to loitering challenges, access anomalies, theft incidents, fires, and more. Increased situational awareness - To gain occupancy insights, operators can leverage Vaion vcore’s unique Map view with Smart Presence. By adding floor plans and maps of premises, people and vehicles appear as dots in their precise on-site locations. Operators can see live footage as they move on the cameras’ fields of view. It can be combined with access control to identify tailgating or fire or active shooter scenarios. Accurate search within minutes - Smart Search allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, identifying suspicious people like unescorted visitors, investigating health incidents or damage to the property, performing cleaning crew inspections now take minutes instead of hours. Secure remote access and link sharing - Connect Vaion vcore to Vaion vcloud to achieve easy and simple deployment and access from anywhere in the world. Share links of recorded video with team members, claim investigators, and law enforcement, regardless of whether they have admin access to Vaion vcore or not. Get a secure download of video files in a standard mp4 format with digital watermarking for authenticity. Key benefits delivered include: Build from existing investment while retaining privacy Integrate with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Save storage and money Automatically decrease storage demands from all recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what is needed, when needed, without the hassle of complicated licensing Up to 200 cameras per Vaion vserver appliance, small footprint support for larger facilities Enhance operational insights Increase operational productivity and reduce facility costs Distribute heat and cooling efficiently, optimize cleaning and workplace productivity through hot-desking insights Use people flow insights to manage people and vehicle ques efficiently Collaborate securely and fast One-click Vaion vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons Simple and flexible licensing With a simple licensing model, Vaion always includes services and software upgrades. Users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services. Vaion exists as the company believes that they can create a better, smarter way to deliver video security. They inject intelligence in their approach to security and all our products. They help organizations monitor, understand, and act on their surroundings to protect their people and assets in real-time.
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure. Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threats proactively, improve operational efficiency, and provide surgery documentation for educational purposes. Why Ava? Anomaly detection and analysis in real-time Ava’s pervasive, integrated video analytics use self-learning to give an enhanced understanding of all of the user’s cameras’ feeds. The staff can use the dynamic Video view with Spotlight that brings only the relevant feeds to their attention. In unusual activity cases, the operators can immediately respond when a high-risk patient leaves his room unattended or visitors are wandering in prohibited areas. Increased situational awareness Add maps of the user’s facilities and rooms to keep track of high-risk patients, visitors, and staff and their exact location. Maps include Smart Presence, a capability that lets the users track them as they move through their facilities. Combine with access control to locate patients and staff in critical moments. Administrators can also have a clear picture across their locations to improve patient care and daily operations. Quick search within minutes for insurance claims Operators can find visual evidence to prove or disprove liability claims fast and accurately or if hygiene protocol compliance is followed correctly. Smart Search allows personnel to search by appearance, events, objects, similarity, or image. The vcore VMS integrates with access control systems through the generic access control API. It is possible to get a clear picture of historical entries and exits of patients and staff and the video associated with it. Sharp images and integrated audio analytics Equipped with directional acoustic sensors, Ava vcam Dome and Pano notify security and healthcare professionals instantly when loud noises, screaming, glass breaking, and gunshots occur. The cameras also deliver unmatched video quality required to provide recordings for scientific presentations, research, and education. vcam is suitable for different settings, from parking lots and storerooms to patient wards and operating rooms. Key benefits, delivered: Build from existing investment while retaining privacy Integrates with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video and metadata storage remain securely on-premises Full site survivability and local access Safe and reliable environment Capture every detail at all times with discreet security cameras Monitor high-risk patients at all time with remote monitoring Enable preventative action through immediate response time Improve operations and services Save storage and money Automatically decrease storage demands from all of the user’s recordings Reduce bandwidth consumption on critical links with AI-based optimization Support both on-premises and cloud within a single deployment Up to 200 cameras per Ava vserver appliance - small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons Simple and flexible licensing With a simple licensing model, Ava always includes services and software upgrades. The users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, has announced that Army and Navy Academy, a college preparatory military boarding school in California, has upgraded its security infrastructure with Hanwha security cameras. Located on a 23-acre beach-front property, the Army and Navy Academy is home to more than 300 students and employs more than 140 faculty and staff members. Two-fold surveillance upgrade According to Jeffrey Gibson, a system with analytics to keep a close watch on the campus could act as a force multiplier With a commitment to continuously adapt and improve, the Academy developed a strategic plan that focused on supporting the long-term success of their cadets. When the school began building and renovating facilities, they included an upgrade to their technology and physical security system. With a two-fold approach, the school first needed to replace their existing, out-of-date analog camera system. Second, they needed a system that could keep up with current technology. According to Jeffrey Gibson, Assistant Commandant, Operations, Safety, and Security at the Academy, a system with analytics to keep a close watch on the campus could act as a force multiplier. Hanwha security cameras with Wisenet WAVE deployed After an extensive vetting process, the school deployed a video surveillance solution comprised of Hanwha cameras integrated with Wisenet WAVE, a highly customizable and reliable IP-based video management system (VMS). Integrating the Hanwha security cameras using the Wisenet WAVE IP-based VMS made it possible to create a video surveillance solution that was exclusively tailored to the campus’ specific needs. The Academy was able to quickly train security personnel as required, considering the WAVE video management system (VMS) is extremely intuitive and easy to use. Multi-sensor, multi-directional PTZ cameras installed The Army and Navy Academy now has a total of 141 cameras, including PNM-9081VQ multi-sensor, multi-directional cameras for covering wide areas, which allows them to use fewer cameras while seeing more. They have also installed PNM-9320VQP multi-sensor, multi-directional PTZ cameras for zooming in and for covering long distances. Additionally, to be able to effectively monitor between buildings and cover their coastline, the Academy chose PNM-9020V multi-sensor 180° cameras. In-camera and VMS analytics features By taking advantage of the in-camera and VMS analytics available in their new system, the security teams at the Academy can now monitor internal and external areas with high precision and efficiency. The primary cameras installed focus on higher priority, greater risk areas, while the VMS analytics keeps track of the rest of the areas in the campus. Perimeter protection with line crossing analytics With the surveillance system upgrade, most of the campus perimeter is now protected using line crossing analytics As a result of the surveillance system upgrade, most of the campus perimeter is now protected using line crossing analytics. With Hanwha cameras installed above the fence, the system sends an alert to the Security Operations Center (SOC), if it detects something crossing the fence in either direction. Once the system pulls up the camera feeds, operators can see if it’s a false alarm and then decide whether or not to dispatch a security team or call local police. Enhanced students, faculty and staff safety The security team has developed a strategy for inside the fence as well that allows them to focus on specific areas that have higher traffic at specific times of the day. The in-camera analytics looks at the low-traffic areas. If the camera detects movement, the Security Operations Center is alerted and can then determine whether or not to send personnel. Because the new Hanwha security system provides both coverage and analytics, the Army and Navy Academy’s security team is able to focus on what matters most, the safety of students, faculty and staff.
Round table discussion
New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?
Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?
Video surveillance systems: Manufacturers & Suppliers
- Dahua Technology Video surveillance systems
- ComNet Video surveillance systems
- NVT Video surveillance systems
- Hikvision Video surveillance systems
- Hanwha Techwin Video surveillance systems
- Panasonic Video surveillance systems
- Pelco Video surveillance systems
- BCDVideo Video surveillance systems
- Bosch Video surveillance systems
- DRS Video surveillance systems
- Teleste Video surveillance systems
- VIVOTEK Video surveillance systems
- OT Systems Video surveillance systems
- LILIN Video surveillance systems
- Vicon Video surveillance systems
- Arecont Vision Video surveillance systems
- TruVision Video surveillance systems
- Milestone Video surveillance systems
- IDIS Video surveillance systems
- Vanderbilt Video surveillance systems