Wireless video security system
Security video wall technology experts Ultimate Visual Solutions (UVS) have signed a distribution agreement with Zodiac Investment Corp in Vietnam, who will be its exclusive partner in the region. Zodiac was founded in 1991 and is recognized as the country’s high-tech products distributor and audio visual solutions provider, with bases in Hanoi and Ho Chi Minh City. It has completed installations in various fields, including education, government and the military. Data center video...
Arlo Technologies, Inc., one of the providers of internet-connected camera brands, announced the addition of two wire-free security cameras to its Arlo Essential Series: the Arlo Essential XL Spotlight and Arlo Essential. The Essential Series delivers the peace of mind every family needs to feel protected, both outside and inside the home. The series is highlighted by the Essential XL Spotlight Camera which features an integrated, extended-life battery that works for up to one year on one charg...
Global Networking Company, D-Link Corporation has announced the release of its new DCS-8302LH Full HD Outdoor Wi-Fi Camera. Featuring AI edge-based person detection, this intelligent camera can identify human motion, thereby reducing false alarms, so that users receive more relevant detection notifications. DCS-8302LH Outdoor Wi-Fi Camera The DCS-8302LH Full HD Outdoor Wi-Fi Camera offers unlimited surveillance in vivid Full HD 1080p clarity and can capture every small detail, even at night or...
NAPCO Security Technologies is pleased to announce a new option for its increasingly popular iBridge Video Pro Doorbell. iBridge Video Doorbell Ideal for dealers looking to compete with DIY products with a professional-grade offering, this RMR-generating convenience for any account connects with true-2-way voice using either the standalone video app or integrated with iSecure Connected Home & Security System, iBridge Connected Home app & the multi-function iBridge 7 security/video/smar...
Razberi Technologies has extended its software platform to integrate deeper with video management software (VMS) from Milestone Systems, providing increased uptime assurance, cyber threat protection and faster problem resolution. Monitor security network With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network – especially relevant during these times of social distancing requirements. IT professionals can quickly review cyber s...
Customers may know it as DMP’s enhanced all-in-one system — and until now, the XTLtouch has only been available to Verizon customers. DMP is pleased to announce that the XTLtouch Wireless Control Panel with AT&T LTE is here. “We’re very excited about this,” says DMP’s Vice President of Sales Mark NeSmith. “No other all-in-one offers the same powerful and flexible solution. For areas that require AT&T service, this allows our dealers to much more...
Allied Universal®, a security and facility services company in North America, announces that their advanced artificial intelligence platform, HELIAUS®, is helping to keep facilities secure during the COVID-19 pandemic. HELIAUS® is an advanced artificial intelligence platform designed to improve safety and reduce risk by enhancing on-site guarding services. To support Allied Universal's customers' return to workplace initiatives, the company has enhanced the HELIAUS® technology platform to include a new visitor screening application. The new application is fully configurable to support different client's visitor screening procedures. Visitor screening application It offers screening questions based on Centers of Disease Control (CDC) guidelines and implements customer-specific visitor screening protocols such as instructing the security professional to take a visitor's temperature or asking the visitor to use a hand sanitization station before entry. The HELIAUS® visitor screening application includes new suggestions for workflows that help with visitor screening" "The HELIAUS® visitor screening application includes new suggestions for workflows that help with visitor screening, social distancing management, workplace signage and maintaining a safe and clean workplace," says Mark Mullison, Chief Information Officer, Allied Universal. "All of the information collected in the course of visitor screening or custom workflows is captured electronically and fed into the platform's AI engine, which makes recommendations for improving the site's condition." Social distancing guidelines For example, using GPS and Bluetooth beacons, HELIAUS® understands security professional locations in real-time, even indoors. If they approach an elevator bay, it might ask whether people are present, and if they are obeying social distancing guidelines. These answers are then recorded. Over time, based on the knowledge collected, the AI engine will make predictions about when enforcement of social distancing guidelines is most likely to be needed and will notify security professionals to inspect the elevator bays and encourage social distancing at the right times. "HELIAUS® has the ability to remotely message important updates or assign important tasks to your security professionals," said Mullison. "Clients can receive custom email / text reports in real-time."
Swann, a globally renowned provider of do-it-yourself security solutions, has announced the release of the Swann Tracker security camera as well as the Swann Enforcer camera systems in 4K resolution, a perfect indoor and outdoor security solution for any home or business. The 1080p resolution Enforcer cameras are coming soon. Swann Tracker security camera The Swann Tracker security camera was first unveiled at the Consumer Electronics Show (CES) 2020 earlier this year and was named a CES 2020 Innovation Award Honoree as the world’s first compact, non-mechanical pan-tilt security camera that includes auto-tracking. The Enforcer is Swann’s latest camera that includes motion-activated, red and blue flashing lights, spotlight, siren (on 4K variant) and additional features to deter intruders. Swann has announced two new additions to their security products line. Swann Wi-Fi Tracker security camera Compact, non-mechanical pan-tilt indoor security camera – It uses innovative auto-tracking technology to track and record moving objects without physically having to pan or tilt. Auto-zoom capability – It ensures any suspicious activity is kept targeted and in-focus for up to 2 objects at once within a second camera view while the main 180-degree widescreen full-room view remains onscreen via the Swann Security app. Infrared night vision which can see in the dark up to 32ft / 10m, automatically turning on when the lights are off. Two-way audio - Greet visitors, talk to pets or warn off intruders. Easy to install - Just plug into power and connect through Wi-Fi. Swann Enforcer security systems Motion-activated police-style, red and blue flashing lights - Deters intruders, while their spotlights, sirens (4K version only), and mobile alerts ensure intruders are left with nowhere to hide. Night2Day color night vision - Available on the 1080P model, this ensures complete protection and peace of mind 24/7. True Detect Heat and Motion technology - Sensing people and cars for more reliable security monitoring and fewer false alarms. Free local storage on DVR - Up to 180 days onto a 2TB hard drive, plus the ability to upload clips to the cloud for free. “While many of us are staying home to reduce the spread of COVID-19, the need to safeguard our homes and small businesses has never been of greater importance. These next generation Swann surveillance products offer advanced features to prevent and deter unwanted intruders outside and inside the house,” said Michael (Mike) Lucas, CEO, Swann. He adds, “Swann’s latest products continue the Swann tradition of providing consumers with easy to use, reliable, home security protection and 24/7 peace of mind.” Total security control via Swann Security app These new products are part of a complete security ecosystem that can be managed under the ‘Swann Security’ app. This gives users a unique ability to control wired and wireless security devices from multiple sites, stream live video, always receive rich notifications and know what’s happening in one place. Swann is the only vendor that offers a complete line up of inter-connectable wired and wireless security solutions that is also completely integrated with Google Assistant and Alexa.
Even the most reliable security equipment is never fully protected from false alarms. Most of the time, they occur due to simple oversights, hyperactive pets, or incorrect installation. But when the security companies react to false alarms, they risk getting late in case of a real emergency. Some send security patrols to check the unverified alarms right away. The others count the detector triggerings before responding and lose precious minutes in the result. In any case, false alarms bring stress for the consumers and the risk of suffering losses. Prime security companies found the solution in photo and video alarm verification. Both options came with serious compromises. On the one hand, motion detectors equipped with cameras provided a technical possibility to see what triggered the alarm. But the systems that support such devices required frequent maintenance (due to low battery life), delivered low-quality pictures, and were significantly overpriced. Wireless security system On the other hand, video surveillance allowed for a 24/7 monitoring but came with the new difficulties: complicated installation and configuration, total dependence on the building’s infrastructure, high risks of malfunctioning and exploits, as well as the privacy issues. Both solutions didn’t have a chance to become the new security standard. The market required the new cost-efficient solution that would unite the reliability and informing efficiency of the best security systems with the visual capabilities of the cameras. Ajax Systems was one of the first ones to develop the security system with visual alarm verification. Just like they were not the ones to invent wireless security system when launching Jeweller. Parallel transmission of alarms With Wings, the user can view the first snapshot of the situation in under 9 seconds But that fact gave them company an opportunity to rethink the experience of using the equipment from the consumer’s and the service provider’s points of view. They tested and analyzed the weak spots and best practices in the industry and eventually created a breakthrough product in terms of informing speed, communication distance, and battery life. To ensure fast and reliable transmission of the photo confirmations, the company developed a new Wings radio protocol based on Jeweller. The technologies that MotionCam and Hub 2 use to communicate, nullify the interference between channels during the parallel transmission of alarms and pictures. With Wings, the user can view the first snapshot of the situation in under 9 seconds while the alarm signals sent via Jeweller are still delivered in a split second. Camera-equipped detector Photo transmission does not shorten the MotionCam communication range. Just like the rest of the Ajax detectors, the new gadget operates at a distance of 1700 meters from the hub. This number is one of the top performance results for a camera-equipped detector. The Ajax security system still covers an area of up to 12 km², which is enough to protect the multi-story buildings but now with visual alarm verification. MotionCam features an extraordinary - for a camera-equipped detector - autonomy with up to 4 years of battery life. This is not an optimistic forecast with ideal use conditions. Instead, it is an estimate for the typical operating conditions, which includes the regular activations and changes in weather conditions. And they have considered the privacy issue. The MotionCam detectors activate their cameras only if triggered by motion when the system is armed. Indoor motion detector Without a doubt, the Wings technology sets the new standards in the security industry" The users and the security company have no way to access the camera and request to take pictures. All photos are encrypted during transmission, and as they are stored at the Ajax Cloud (just like all the events in the security system’s log). No one analyses and processes the photographs from the detectors. MotionCam and Hub 2 raise the informing quality of the Ajax security system to the next level while preserving its fundamental characteristics. MotionCam can easily replace any indoor motion detector, which makes upgrading the security system as painless as possible. It will forever change the user’s attitude to alarms, yet they still won’t be bothered with the system maintenance for years to come. Phenomenal energy efficiency “I am proud that we can make such inventions. Without a doubt, the Wings technology sets the new standards in the security industry. Fast photo transmission at a distance of 1700 meters with phenomenal energy efficiency, it’s magic that was previously unavailable on the market. We’ve managed to boost the informing quality of the system to the next level and preserve the familiar user experience at the same time”, says Aleksandr Konotopskyi, CEO Ajax Systems.
BX-35ZBS bell box is a battery-operated wireless outdoor siren generating a loud 104 decibel siren sound and strobe lights during an alarm to provide visible and audible alerts. Encased in a durable, IPX5 waterproof design, easy-to-install BX-35ZBS is a premium choice for the modern smart home. The BX-35ZBS is energy saving and environmentally conscious, requiring only two Alkaline batteries, yet still has a long battery life. The BX-35ZBS generates unique alarm sounds for fire and burglary to inform users of the type of danger at hand. In addition to producing audible and visible warnings in the case of emergency, the BX-35ZBS emits beep notifications for arming and disarming of a security system, and of its low battery status. Tamper-deterrent feature Its tamper-deterrent feature protects against unauthorized removal and sabotage. The BX-35ZBS is compatible with other manufacturers’ ZigBee systems and can be integrated into new or existing ZigBee systems. Features Siren output level is 104dB at 1 meter Unique alarm sounds for fire and burglary Lightweight and flexible to install Modern and Elegant design Programmable siren duration of 3/5/10 minutes Sound notifications of arming, disarming, and low battery status Regular supervision signals to check system integrity and trouble shooting Low battery detection Tamper protection prevents unauthorized removal IPX5 waterproof and UV resistant housing Compliant with CE requirement Compatible with other’s ZigBee manufacturers’ ZigBee systems Specifications Communication Protocol - ZigBee Pro Home Automation 1.2 Frequency - 2.4GHz Power Supply - 1.5V, D Alkaline battery x 2 Battery Life - 6 years Siren Output - 104dB at 1 meter Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 223 x 223 x 68mm
SR-32 is a battery-operated wireless indoor siren, generating a loud 104-decibel siren to alert users to possible intruders, emergencies, and safety incidents. The multi-functional indoor siren can work with the control panel to emit entry and exit delay beeps. The SR-32 generates unique alarm sounds for fire and burglary to audibly inform the user of the type of danger at hand. Encased in an elegant, modish design, the SR-32 will effortlessly fit into the home decor. SR-32 is lightweight and easy to install, giving users the flexibility to install it anywhere in the house. SR-32’s tamper-deterrent feature also protects against unauthorized removal or sabotage. Features Siren output level is 104dB at 1 meter Unique alarm sounds for fire and burglary Lightweight and flexible to install Programmable siren duration of 3/5/10 minutes Sound notifications of arming, disarming, and low battery status Smaller, visually pleasing design Cover tamper protection prevents unauthorized removal and sabotage Regular supervision signals to check system integrity Low battery detection Compatible with Climax F1 Alarm Panels Compliant with CE requirement Specifications - SR-32-F1 Frequency - 433 MHz / 868 MHz Power Source - 1.5V, D Alkaline battery x 2 Battery Life - 3 years Siren Output - 104 dB at 1 meter Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 212.5 mm x 179 mm x 53 mm
OPTEX, a global provider of sensors, is launching the QX Infinity (QXI) series, a new range of general application outdoor intrusion sensors for the EMEA region. The QXI series is a family of compact, outdoor sensors that provides a 12m detection area up to 120° in width. A particular benefit of the new range is that the sensors are specifically designed to be mounted at heights of up to 2.7m, making them less obvious to intruders and out of reach from vandals. One model in the range, the QXI-DT, also has anti-blocking features (based on microwave technology) to detect intruders attempting to deliberately mask the detector. The new Quad technology features a pyro element that has been redefined by OPTEX and supports a greater performance with a double layered detection in a compact design. High-mount sensor The QXI series features improved Super Multi-Dimensional Analysis (SMDA) logic and Double Conductive Shielding for even more reliable sensing capabilities and greater tolerance against light and RFI. It allows for greater immunity against pets and can also be installed as a low mount PIR detector to create a ‘pet alley’ and further reduce the likelihood of nuisance alarms. The QXI is an all-round high-mount sensor that complements OPTEX’s existing short range outdoor PIR range such as the VXI and WXI. The sensors will trigger both intruder alarms and CCTV. Less visible to intruders The compact design not only makes the device less visible to intruders but is also less intrusive to its surroundings Masaya Kida, Managing Director of OPTEX EMEA, says the reliability of all of OPTEX’ sensors is a major strength: “By analyzing detection patterns and environmental information, SMDA improves immunity against various noise factors such as climate changes and vegetation sways and can distinguish between the cause of nuisance false alarms and genuine intrusions.” The QXI features a sleek design with an easy to open/close front cover. The compact design not only makes the device less visible to intruders but is also less intrusive to its surroundings. Other features include an Automatic Walk Test Mode which automatically starts when the cover is closed and returns to normal mode after three minutes. Shared through common battery The QXI series includes four models: two that are hardwired (QXI-ST and Dual-Tech QXI-DT) and two wireless (QXI-R and QXI-RDT). Power to the QXI-R /RDT can be shared through a common battery (CR123A) to the transmitter in the base of the device which can easily be swapped out/replaced when the need arises.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
Wireless surveillance systems are attractive to customersas they are cost-effective and easy to install Various studies, market statistics and forecasts project growth for the surveillance market from 2016 to 2020. Besides needs ranging from traditional analog cameras to IP network cameras, more and more consumers also have a high interest in intelligent surveillance systems. Along with safety, these systems provide additional details for users in applications such as people counting and object tracking. As terrorist attacks become more serious, people and governments are eager to find solutions to prevent incidents and protect safety and property. Therefore, with the increased demand for security products, surveillance companies are pushing themselves to launch more innovative and higher quality products for customers to satisfy a variety of needs. Wired vs. Wireless Surveillance System Surveillance applications can be separated into two types – wired surveillance systems and wireless systems. An original wired surveillance system requires much more equipment to complete an entire system, such as switches and cables. However, wireless surveillance systems are attractive to customers as they are easy to install and also save the cost of wiring. Hence, more and more consumers tend to search for wireless surveillance solutions for their flexibility and cost effectiveness. What Are WiFi, 3G and 4G? Before introducing wireless surveillance systems, it’s important to have a clear understanding of the differences among WiFi, 3G and 4G. WiFi is a local area wireless computer networking technology that allows electronic devices to network without cords or cables. WiFi is based on the IEEE802.11 network standard, and different protocols will provide different features. WiFi mainly uses the 2.4 GHz and 5 GHz ISM radio bands. Meanwhile, the data transfer is protected and encrypted by WPA and WPA2 security standards, and the EAP authentication standard. WiFi could be the most popular wireless communication protocol, which can be used for indoor and outdoor applications. Differences between WiFi, 3G and LTE (4G) 3G is short for third generation, which means the third generation of mobile telecommunications technology. 3G telecommunication networks support services that provide an information transfer rate up to 700 kbps (3.5G uplink 5.7Mbps). Unlike WiFi service, which users access through networking hotspots, users of 3G must be subscribed to a service provider to get network connectivity. Most devices connect to the 3G network through their SIM card or a 3G data card. In contrast to 3G, WiFi has a distance limitation; the device must stay close to the access point to ensure network connectivity. However, 3G transmission is broader; as long as there is a signal, the device can connect to the network easily. 4G (LTE) is the fourth generation of mobile telecommunications technology. LTE stands for Long Term Evolution. It’s a term used for a particular type of 4G that delivers the fastest mobile Internet experience. 4G is ideally suited for services that demand more capacity, such as video streaming, mapping and social networking. Compared with 3G, users are able to have up-to-date information faster than ever, regardless of upload or download data. 4G means that a network offers peak data rates of at least 100 Mbps for high-mobility communication like users in cars or trains, etc., and at least 1 Gbps for low mobility communication such as pedestrians and stationary users. Wireless Surveillance System Advantages Wireless surveillance combines wireless transmission with network video surveillance to create a powerful solution that overcomes the challenges that prevent many people from installing surveillance and monitoring systems. These challenges can include distance, lack of network infrastructure, environmental conditions, and costs. Wireless systems can overcome these obstacles and work exceptionally well for monitoring separate building units or rural areas where there is a long distance between two sites. There are also numerous add-ons for wireless systems. Wireless surveillance systems perfectly protect the structural integrity and maintaina building’s beauty without sacrificing safety Cost-Effective: Wire-Free Wireless surveillance systems are an undeniably cost-effective solution for the users, not only saving the material cost but also the time of installation and maintenance. Implementing a wired surveillance system can be a massive issue for installers and also extremely time consuming due to various challenges of placement. Therefore, a wireless IP surveillance system can offer a more affordable solution for the user, and this financial benefit can continue for a couple of years after the installation through maintenance cost savings. Building Protection And Aesthetic Wireless installations keep the building’s aesthetic appearance intact as users do not have to worry about wires and the means to conceal them. Instead, users can enjoy a safe environment with an aesthetic and clean placement. Wireless surveillance systems perfectly protect the structural integrity and maintain a building’s beauty without sacrificing safety. For users who have these particular kinds of surveillance needs, wireless solutions can perfectly match their expectations. Flexible And Scalable: Less Infrastructure Limitation For an environment that lacks a complete infrastructure, it would be difficult to build a wired surveillance system. Digging and burying a fiber network may not be desirable for all locations, such as historical monuments, farms, parking lots or wilderness. However, a wireless solution can conquer this challenge by using a wireless infrastructure for connectivity. Cameras do not need to be permanently located next to a wired network; instead, they can be set up anywhere as long as the signal can be reached. Moreover, wireless solutions are available for even the largest scale deployments, and are also available in ruggedised enclosures for deployment in all weather conditions. Meanwhile, the entire wireless surveillance system setup can be moved to a new location easily and quickly. Conclusion Consumers have more and more excellent options when it comes to wireless surveillance security systems. Wireless systems now offer complete functionality, flexibility, and ease of use compared to wired system. The innovative technology promises users a better and safer living environment, and surveillance companies will continue developing more valuable products and solutions.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Open Options, based in Addison, Texas, provides a truly open access control architecture that will strengthen the ACRE portfolio and increase the breadth of solutions offered by the global provider of security systems. The acquisition of Open Options is also an opportunity for ACRE to focus on growth opportunities in North America and “balance the scales a bit,” says Joe Grillo, CEO of ACRE, which significantly grew its reach in Europe, the Middle East and Africa with the acquisition of Siemens Security Products in 2015. “Open Options is also a company that's growing, is profitable and fits seamlessly into our vision for the access control space in which we operate,” says Grillo. Independent Operations The strength of Open Options in the Southwest provides significant additional coverage for ACRE in that region of the United States The Open Options brand will continue to operate independently under the ACRE umbrella. Open Options CEO and Founder Steve Fisher will continue in his role as leader of the company, says Grillo. “There is a strong and competent management team in place that will continue to provide leadership going forward.” Open Options’ open-architecture access control solutions will add value to the solutions ACRE already offers under the Vanderbilt brand. In a market that has traditionally been proprietary, the open-platform solution offered by Open Options helps deliver more opportunity to offer customers a full-scale solution based on their needs, says Grillo. In addition, due to its origin as a Texas-based company, the strength of Open Options in the Southwest provides significant additional coverage for ACRE in that region of the United States. Technical And Financial Resources On the other hand, ACRE provides a greater level of technical and financial resources that Open Options can utilize to help them grow even faster. These resources were not as available to the company if it remained independent, Grillo notes. ACRE’s divestiture of Mercury Security in 2017 facilitated this investment. As discussions began earlier this year, ACRE realized the potential of adding to its access control portfolio in the North American market, says Grillo. Open Options and Mercury have been "partners" for 20 years; Mercury provides hardware panels for Open Options systems. Each company will manage and make decisions about their reseller channels independently “The Mercury brand continues to be a strong one, so we're interested in continuing to nurture that relationship, and in fact we have become a larger and stronger partner to Mercury as ACRE,” says Grillo. “After owning Mercury for a number of years, we had the understanding of the company, the product portfolio and the partner relationships that defined it, so we were confident that the deal would be a positive one for the ACRE brand.” Meeting Customer Needs “Open Options and Vanderbilt share some customers already and we can leverage that by gaining more share of their business while providing them with a portfolio that will meet a broader set of customer needs,” says Grillo. “Where possible, we can look for synergies in channel partners that are not currently shared to provide access to both brands. This will be a benefit to Open Options, Vanderbilt and our customer base. However, importantly, each company will manage and make decisions about their reseller channels independently.” Are there more acquisitions on the horizon for ACRE? “We're always looking for opportunities that fit into the nature of our business,” says Grillo. “Companies that have growth potential and share similar go-to-market strategies and visions for the future are of particular interest to ACRE. "We're still operating in a highly fragmented market, so we're going to see continued consolidation in both access control and beyond, which means ACRE will be looking for the right opportunities to follow along that path.”
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, unified communications as service (UCaaS) with cloud-based VoIP and a secure and standardized business security systems platform. As a significant update to Thrive’s outdated legacy systems, the new Interface solution unclogs productivity bottlenecks and gives the flexibility the restaurant chain needs to address changing customer preferences. Managing multiple network and voice providers We needed a partner we could count on to manage our network, voice, and security for all locations" With 81 restaurants across the United States, Thrive found itself struggling with challenges common to many geographically distributed businesses, including managing multiple network and voice providers, dealing with outdated CCTV hardware, and a lack of accountability from vendors. “With 81 restaurants across ten states, we needed a partner we could count on to manage our network, voice, and security for all locations,” explains Brian Houchin, Director of IT for Thrive Restaurant Group. Troubleshooting technical issues When it came to managing vendors, Thrive simply had too many. Troubleshooting technical issues was challenging as it was difficult to pin accountability on a specific vendor. In addition, tracking invoices, service credits and administering multiple vendors was an inefficient and time-consuming exercise every month. Outdated hardware and changing regulations also posed a challenge. Unreliable CCTV equipment left the restaurants, employees and customers vulnerable to security risks on-premises. Constantly evolving Payment Card Industry (PCI) compliance rules meant Brian Houchin had to devote hours of his limited bandwidth to keep up with the latest changes and updates, so that Thrive could avoid major penalties and security threats. With the COVID-19 pandemic significantly disrupting Thrive’s business, restaurant staff found it challenging to handle sudden spikes in call volumes, as they had to work with a legacy phone system that was not scalable. The lack of 4G wireless coverage, outside of the restaurant premises made curbside pickup and take-out services impossible to manage. Secure, scalable network and communications Thrive turned to Interface to implement a secure, scalable network and communications backbone that would unclog the productivity bottlenecks and give the flexibility the restaurant chain needed to cater to changing customer needs. Interface implemented a next-generation secure SD-WAN architecture with network upgrades to guarantee seamless connectivity between all of Thrive’s locations. To deliver a better guest experience for customers calling in with their orders and enabling curbside pickup and payment, Interface rolled out a 4G/LTE wireless network that also doubled up as a backup when the primary network failed. UCaas with cloud-based VoIP implemented With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance. Interface also implemented unified communications as service (UCaaS) with cloud-based VoIP and auto-attendant features for Thrive’s locations to seamlessly route high volumes of customer calls to their dedicated order center. “We wanted to take the call-in experience out of the individual restaurants and put it into the hands of professionals who weren’t in a hurry to get off the phone,” explains Brian Houchin, adding “The VoIP service from Interface lets us take additional orders, dramatically improving our customer experience and increasing revenue.” Deploying secure video surveillance platform To solve the limitations of Thrive’s legacy CCTV infrastructure, Interface delivered a secure video surveillance platform with easy remote viewing from any location and simplified access management to boost restaurant security. Thrive’s partnership with Interface has allowed the restaurant group to focus more on their growth strategy and long-term plans. By consolidating their SD-WAN, UCaaS, CCTV and 4G/LTE services with Interface, Thrive gets real accountability without having to deal with the vendor run-around. Perhaps the greatest advantage is Thrive’s ability to aggressively expand, confident that Interface’s 24/7 managed services will always be ready to support their growth. “We’ve had a chance to test out multiple vendors for network, communications and business security and Interface definitely has provided us the best experience,” concludes Houchin.
Axis Communications, the provider in network video, has helped develop an innovative and clean energy solution which illustrates the potential of sustainable surveillance technologies in remote locations. In response to a request to produce a system to document part of a major program of improvements to Scotland’s A9 carriageway, Axis and its partner Camera Control UK, developed a solution which is capable of capturing high-quality 4K time-lapse imagery using entirely renewable sources. One of the main challenges was that the solution needed to be able to capture high-quality surveillance video in an area with no communication networks or local power, while coping with weather extremes and construction logistics. With diesel generators disregarded due to the pollutants they would produce, and the challenges associated with trying to lay power cables over a considerable distance along a route that twists and turns, a clean and sustainable solution was required. Video surveillance helps in better traffic flow The highways project will see a 10-mile stretch of the A9 from Perth to Inverness widened to increase the efficiency of the route and allow for smoother traffic flow. After winning a tender to document the project, local company, MB Productions Ltd, commissioned Camera Control UK to produce a solution. Camera Control UK in turn contacted Axis Communications, the provider in network video technology, to work in collaboration. The resulting video would be used for audit purposes, to provide evidence of best practice, and to serve as example material for future projects. All captured video is relayed back to a central control location using a dedicated wireless network Martin Naylor, Director of Camera Control UK, elaborates: “We realized it had to be an off-grid solution to avoid using local power; a solution that could incorporate wireless communications and utilize renewable energy sources to be environmentally friendly and sustainable over the longer term.” Bullet cameras To bring the solution to life, AXIS P1448-LE 4K short bullet cameras were chosen for their robustness and durability. The final system uses eight solar power packs, charged by a mixture of wind turbine and solar PV panels. Eight towers with mounted cameras are employed at various key touchpoints along the A9. Communications masts, installed to enable cloud connectivity, ensured that the Axis cameras, connected via the IoT, were able to deliver imagery of incredible quality. The whole solution illustrates the possibilities for innovation when utilizing the natural elements, having a virtually zero carbon footprint. All captured video is relayed back to a central control location using a dedicated wireless network. The whole system can be remotely monitored to continually check its status of operation. Remote management also enables the cameras to be fine-tuned for precision imagery of the work in progress, without the need to manually touch the cameras, or even to be on-site in person. 4K Imagery Martin Naylor commented on the relationship with Axis that has made this solution possible: “Axis really values innovation and is therefore an ideal partner, not only because the team takes the time to understand the challenges when trying to push the boundaries of what’s possible in surveillance, but also because their drive towards sustainable and ethical practices is an inspiration to other technology companies.” Matt Brown, Director, MBP, said of the solution: “We are now able to capture fantastic 4K imagery of the ongoing work on the A9. Camera Control UK has produced an entirely green solution, an incredible feat of engineering. The Axis cameras are in a completely different league, in terms of quality, to others we’ve seen. This project has been a great success.”
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernization process, the company decided to deploy new centralized CCTV systems to enhance the security level of passengers and drivers. First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command center in real time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command center. Customized mobile solution To help ARST revamp its bus security system, a customized Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras is integrated in the control room via DSS4004, where emergency calls, geo-localization of vehicles and statistics can be managed. Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are: data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board and geo-localization via DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. High performance sensor It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via wireless network - 3G/4G/WIFI. In addition, the device can also support connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than city bus, this device can be used in various applications, such as school bus, taxi, police car, train, truck, etc. The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high quality images and ensures real-time transmission. Also, it adopts a high performance sensor to provide incomparable performance even under extreme lowlight environment. Manage mobile devices The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses The Starlight feature allows capturing of more details and recognizing accurate colors at night or in scenes with limited illumination. At the control room, Dahua DSS platform was utilized to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimize driving route to generate more profit. High-definition monitoring With upgraded Dahua system, the command center can communicate with every single vehicle of ARST Bus Company in real time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command center in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses, and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operation. The Dahua mobile solution mounted on board has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
When it comes to airport security, there is a critical need for technologies that detect exterior threats and protect the perimeter. By using an advanced FLIR perimeter intrusion detection system, airports receive unmatched threat recognition, target tracking, perimeter defense and response capabilities. The result is greater efficiency, exceptional safety and enhanced customer experience for passengers, employees, aircraft and facilities. Norman Y. Mineta San Jose International Airport (SJC) is the gateway to Silicon Valley, providing transportation to 15 million passengers annually. SJC is recognized within the industry as one of America’s fastest‐growing major airports over the past four-year period, based on percentage increase in passenger seat capacity. Perimeter security upgrade Located in San Jose California, SJC is a robust engine of economic stimulus, transportation and international commerce. The airport is within an 18-mile radius of 6,600 technology companies in Silicon Valley and serves travelers employed by many of the world’s Fortune 500 enterprises, including Apple, Google, Facebook and Intel. Ensuring secure operations is critical to the success and customer experience of SJC users. The airport occupies 1,050 acres of land and its perimeter spans six miles. With such a vast property and a high throughput of traffic, protecting the perimeter from external threats is essential. Driven by high-profile intrusion incidents, perimeter security has become a top priority for airports in recent years. From 2004-2016, there were 345 perimeter breaches at 31 major U.S. airports, according to a report by the Associated Press. Like many airports around the country, SJC also faced challenges and crises of illegal trespassing of unauthorized individuals, despite the airport meeting all federal security regulations. This raised concerns about passenger safety. Mineta San Jose International Airport With a heightened need for better perimeter protection, SJC launched a multi-million dollar, three-phase initiative to upgrade its entire outdoor perimeter security system. The first two phases focused on physical upgrades to the fence line, raising 10,000 linear feet of fence from seven feet to 11 feet in critical areas of the airport. FLIR Elara FC-Series ID, ioi HD Analytics, Triton PT-Series cameras with FLIR Latitude Network Video Management System FLIR Elara FC-Series ID, ioi HD Analytics and Triton PT-Series cameras with FLIR Latitude Network Video Management System provide multiple layers of protection. Phase three was designated for fence technology enhancements through state-of-the-art video surveillance and detection systems. “In response to the cluster of perimeter breaches within a relatively short time period, our evaluation showed that the airport perimeter, with its seven-foot-tall fence, was indeed technically in compliance with current federal security requirements,” said Airport Deputy Director of Operations Bob Lockhart. “However, we also recognized some opportunities to improve the effectiveness of our perimeter, both from a perception perspective, as well as an actual strengthening of some of our perimeter,” he continued. Trial with various security solutions To find the best fence line analytic detection technology, SJC consulted National Alliance for Safe Skies, Inc. (Safe Skies), which is a federally funded non-profit organization that assists airports in the research, testing and evaluation of security technologies. SJC’s partnership with Safe Skies began in 2014 when the non-profit first discussed the airport’s perimeter security needs. Safe Skies was later tasked to review a variety of perimeter defense systems to determine what solutions would be most effective at SJC. Safe Skies tested and evaluated six different types of technology on-site including, thermal cameras, thermal cameras with video analytics, behavioral video analytic systems, pressure sensor buried cables, laser detection systems and wireless cameras. Each system was tested for two weeks, and Safe Skies presented a performance report to SJC for each one. After a detailed analysis, SJC selected an end-to-end perimeter intrusion detection system (PIDS) from FLIR Systems Inc. FLIR PIDS solution The FLIR PIDS solution is composed of 57 FLIR Elara FC-Series ID thermal analytic cameras and 50 FLIR ioi HD Analytics Bullet cameras along the fence line. The system also includes four FLIR Triton PT-Series dual sensor cameras with thermal and visible light sensors with pan-tilt tracking. For the SJC deployment, Latitude VMS integrates with the Software House’s C-CURE access control platform All of this technology fully integrates into the existing FLIR Latitude Network Video Management System, which is part of the FLIR United VMS family of products. As an ONVIF Profile S compliant platform, Latitude VMS enables seamless integration with edge devices and third-party systems. For the SJC deployment, Latitude VMS integrates with the Software House’s C-CURE access control platform. Distinguishing between an animal and human “The additional thermal and infrared camera coverage has greatly enhanced our abilities to detect unauthorized activities around the perimeter of our airfield,” Lockhart explained. Ken Castle, Vice President of business development at Ojo Technology, the systems integrator for the project, also described the advantages of the FLIR thermal technology. “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fiber-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle explained. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds—none of which pose security threats.” Castle continued, “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement. The viewing trajectory can be narrowed to cover just the fence, or widened to include territory in front of or behind the fence. The bottom line is that thermal analytics provide definitive visual information and virtually eliminate unnecessary or inconsequential alerts.” Thermal cameras continue to be the industry standard for 24/7 perimeter monitoring and the technology is a key part of SJC’s PIDS solution. Installation of a perimeter fence technology system In September 2016, the U.S. Department of Transportation and the Federal Aviation Administration awarded SJC an $8.1 million grant for the design, purchase and installation of a perimeter fence technology system. Deployment of the FLIR PIDS solution began shortly thereafter. The project had an initial 150-day or a five-month turnaround with work beginning around the holidays in December 2016. As the systems integrator, Ojo Technology oversaw the phased commissioning of the project. Ojo engineers preconfigured the cameras and servers, programmed the analytics for all thermal cameras, tested the functionality of each camera under a variety of lighting conditions, and worked with the airport security command center and its systems subcontractor to incorporate the new cameras into the existing network. Installation was completed in the fall of 2017, and, afterward, Ojo worked closely with FLIR and SJC to fine-tune the system for optimal functionality. Integrator for PIDS “With such an aggressive schedule, Ojo Technology was instrumental in seeing the PIDS solution deployment through,” said Daniel Gundlach, Vice President and General Manager of security at FLIR. “Likewise, the collaboration, technical skill and ingenuity among the FLIR, SJC and Ojo teams was remarkable and a key reason why the project is such a success.” Upon detection of an object approaching the fence line, the FC-Series ID thermal camera, initiates an analytic alarm hand-off “The success of a technical solution like the San Jose Airport PIDS project is dependent upon a strong partnership among all participants—from FLIR as the manufacturer to the integrator to the end user,” said Neil Roberts, FLIR security director for the PIDS deployment. “In this case, all parties were committed to seeing this project through to the end and addressing any technical needs that arose along the way.” Threat recognition and response The advanced FLIR PIDS solution is designed to deliver superior threat recognition and response. Upon detection of an object approaching the fence line, the FC-Series ID thermal camera, initiates an analytic alarm hand-off to the PT-Series camera for auto-tracking. The FLIR HD cameras provide a color visual of the target for identification and verification. Through Latitude VMS, security operators manage response capabilities such as alarm functions, notifications and real-time interactive alarm maps. Video monitoring with perimeter intrusion detection “SJC has used FLIR cameras and Latitude products for many years,” said Lockhart. “We appreciate our FLIR end-to-end solution and the ability to expand our current camera system with new perimeter cameras to enhance our current video monitoring and provide additional perimeter intrusion detection.”The safety of passengers, airline employees and service workers is greatly enhanced" A defining feature of the airport’s PIDS solution was that all technology components were provided by FLIR, which created an advantage for integration and solution performance. Open platform software management system “An all-FLIR system provided a tight integration to accomplish the goal of heightening security for the airport,” Castle said. Castle continued, “In theory, an open platform software management system can accommodate a variety of camera manufacturers and models in addition to ancillary security systems such as access control, intrusion alarms, public address and intercom systems, and blue light emergency phones. However, in actuality, the integration of various third-party components can be challenging as different brands of firmware in varying camera models and manufacturers don’t always provide consistent levels of performance, such as resolution and other features. This can be avoided entirely by deploying one end-to-end solution from a single manufacturer.” “The upfront and early design services that FLIR offers through sales support engineers and through our Raven Site Planning Tool help reduce the risk of non-conformance and ensure design stays on budget. The end result is optimal system performance and peace of mind,” Roberts from FLIR explained. “At FLIR, we strive to be the airport’s trusted partner not just for today’s security needs, but also for the future.” Enhanced security and safety at the airport “The solution provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter,” Castle said. He added, “Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced, and the expanded situational awareness gives the airport more options for responding to potential areas of concern.” Having successfully implemented a robust FLIR PIDS solution to protect the airport perimeter, SJC plans to execute more security improvements on the interior side of the airport. Future upgrade SJC has a robust network of security cameras throughout ticketing areas, Transportation Security Administration entry points, terminals, concourses and additional newly built airport areas. The airport is continually evaluating camera locations for upgrades to newer equipment to provide increased coverage or higher resolution camera views. Storage archivers and updated client workstations are also planned for as budgets get approved. By partnering with FLIR, SJC is able to utilize the advanced technology available on the market to provide safety and security and ensure the airport remains a thriving transportation hub that attracts new travelers.
Future residents at Kebbell Homes’ new prestigious development, Wintersbrooke will be able to receive and answer door entry requests via cellphone or Amazon Alexa voice control, thanks to Comelit’s WIFI connected monitors. Set in Ascot, Berkshire, Wintersbrooke is a grand, new gated community featuring just six spacious and exclusive 2-3 bedroom apartments within mature, secluded communal gardens. Kebbell Homes has used Comelit’s specification team on previous developments and again called upon its services, together with chosen installers R&M Bailey, from the initial design process, through the work’s program to project completion. Door entry, via Comelit’s mini handsfree WIFI monitors, will enable new residents to respond to door entry requests from their cellphone, and also integrates with Amazon Alexa for voice announcements and control of the gate/front door to the block. Facial recognition technology The monitors provide facial recognition technology for authorized guests to gain access and video memory, to record any missed calls. Says Andrea Fawell, Sales and Marketing Director at Kebbell Homes: “With high expectations for Wintersbrooke’s indulgent design to deliver gracious living for our discerning buyers, every element had to be considered to offer the highest level of luxury and specification. And to ensure all feels safe and secure.” All the smart home security systems installed had to be equally stylish and futureproof" “We had worked previously with Comelit and knew its systems were able to achieve the level of style intended to complement Wintersbrooke’s dignified presence. The additional benefits of WIFI connected monitors provide our soon to be residents with latest integrated smart security technology, seamlessly installed, enabling them to instantly respond to door entry requests, at their choice and from wherever they are.” Smart home security systems Mat Bailey, Director from R&M Bailey added: “Wintersbrooke has the look and feel of a private country home, which epitomizes Kebbell Homes’ well-known flair for grand architecture. All the smart home security systems installed had to be equally stylish and futureproof. Comelit’s Mini Handsfree WIFI was the natural choice for door entry, easy to install via wireless technology and simple to integrate. Just the one solution presents future homeowners with user friendly bespoke options that can connect seamlessly with their home security, and be controlled by cellphone and Amazon Alexa, at their own choice.” Each home at Wintersbrooke has been fitted with a Mini Handsfree monitor complete with integrated WIFI, operating through Comelit’s renowned Simplebus 2 wire. At the striking gates to the development is Comelit’s premium stainless steel flush mounted, 316 Sense digital entrance panel. Door entry system Up to fifteen smart devices can be connected to each and every property’s individual WIFI monitor The system enables new residents to grant access through the vehicle gates or adjacent pedestrian gate using the internal monitor or a dedicated mobile app. A second is fitted on the front door of the development itself. Up to fifteen smart devices can be connected to each and every property’s individual WIFI monitor. Daniel Wood, Southern Sales Manager at Comelit UK concluded: “Once again, it was a pleasure for Comelit to work closely with Kebbell Homes to ensure the complete door entry system installed at Wintersbrooke, achieved the desired balance between timeless style and latest technology." Alexa voice control "From the gated entry using our Sense panel, which at only 3 mm thin, blends in with any building due to the panel's slim profile, to the chic WIFI monitors, the combined solution, provides aspiring residents with a powerful door entry system and the convenience of audio and visual communication, together with ease of use via mobile or Alexa voice control in everyday life.” Comelit’s official website can be visited for more information on Comelit’s ViP System, Mini handsfree WIFI Monitor Door Entry Solutions or range of products.
Vera Cadillac, a renowned automotive dealer in the Fort Lauderdale area of the US State of Florida was looking to install an advanced security system to counter the growing threat of sophisticated thieves - sophisticated enough to know how to circumvent the current security system and steal parts, tires and in some cases, complete cars. Vera’s current security system included inexpensive CCTV cameras with video motion sensors that proved ineffective in deterring theft at the dealer’s showroom. The sensors were installed on the outside of the fenced perimeter, making them susceptible to being vandalized. When the sensors were disabled, the thieves were able to penetrate the perimeter and strip cars for parts. The speed in which the thieves were stealing car parts and accessories was another tough obstacle to overcome. Tyco - Optex integrated security solution Vera chose Tyco Integrated to come up with an improved, flexible system that takes into account the many obstacles within the perimeter. This includes wildlife, vegetation and other physical obstacles. In addition, the system needed to be as vandal proof as possible. Tyco Integrated and Optex teamed up to provide a flexible, effective system of detection that would use high-mount, zone detectors as trigger devices for the American Dynamic Illustra IP400 CCTV system. SIP infrared sensors - Inovonics wireless network integration The team created a design that would easily integrate Optex’s REDWALL Wireless SIP infrared sensors into Vera’s current Inovonics wireless network (used for building automation systems). The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection. The result will capture and record any intrusion within the sensor’s zone. The intrusion event is now tracked by ADT’s Central Monitoring Station and alerts the authorities along with a Vera contact. Masking of surrounding obstacles The REDWALL SIP sensors allowed Tyco Integrated to easily adjust and account for wildlife, vegetation and other physical obstacles by simply masking those areas. Masking deletes these obstacles within the protected perimeter of the detector. Because the old system was susceptible to vandals, the team had to address this. The team installed the sensors behind the fence and over 9 feet high on the side of the building in accordance to specification. Effective intrusion detection All-in-all, the plan included 12 SIP units mounted on four buildings, which were installed in a single day. Vera Cadillac effectively maintains a secure perimeter that detects intruders from stealing auto parts and other property. In addition, the system was easily integrated into Vera’s current wireless network and is vandal proof. It provides Vera Cadillac peace-of-mind that a system is in place to prevent such incidents from happening during the night-time and can respond with quick efficiency to catch criminal activity.