Videotec Transmitters & Controllers(15)
Browse Transmitters & Controllers
Telemtry transmitters and controllers products updated recently
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable Entry Management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorized individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorized access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable Hardware Components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorized employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing Security Needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorizations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorizations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion Alarm Systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customized Intrusion Systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customize the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video Management System A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full Alarm And Event Management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analyzing video content over large distances Intelligent Video Analytics have the unique capability of analyzing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
The term “smart city” gets thrown around a lot nowadays, but as different technologies that strive to be defined in this way are adopted by different countries globally, the meaning of this phrase gets lost in translation. The simplest way to define a “smart city” is that it is an urban area that uses different types of data collecting sensors to manage assets and resources efficiently. One of the most obvious types of “data collecting sensor” is the video camera, whether that camera is part of a city’s existing CCTV infrastructure, a camera in a shopping mall or even a police car’s dash camera. The information gathered by video cameras can be used with two purposes in mind, firstly: making people’s lives more efficient, for example by managing traffic, and secondly (and arguably more importantly): making people’s lives safer. Live Streaming Video All The Time, Everywhere In the smart and safe city, traditional record-only video cameras are of limited use. Yes, they can be used to collect video which can be used for evidence after a crime has taken place, but there is no way that this technology could help divert cars away from an accident to avoid traffic building up, or prevent a crime from taking place in the first place. However, streaming live video from a camera that isn’t connected to an infrastructure via costly fiber optic cabling has proven challenging for security professionals, law enforcement and city planners alike. This is because it isn’t viable to transmit video reliably over cellular networks, in contrast to simply receiving it. Video Transmission Challenges Transmitting video normally results in freezing and buffering issues which can hinder efforts to fight crime and enable flow within a city, as these services require real-time, zero latency video without delays. Therefore, special technology is required that copes with poor and varying bandwidths to allow a real-time view of any scene where cameras are present to support immediate decision making and smart city processes. The information gatheredby video cameras can beused to make people’s lives more efficient, and to make people’s lives safer There are many approaches to transmitting video over cellular. We’ve developed a specialist codec (encoding and decoding algorithm) that can provide secure and reliable video over ultra-low bandwidths and can therefore cope when networks become constrained. Another technique, which is particularly useful if streaming video from police body worn cameras or dash cams that move around, is to create a local wireless “bubble” at the scene, using Wi-Fi or mesh radio systems to provide local high-bandwidth communications that can communicate with a central location via cellular or even satellite communications. Enhanced City Surveillance Live video streaming within the smart and safe city’s infrastructure means that video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. Identifying Known Criminals This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police. Facial recognition technology captures and streams live back to a controll center, matching faces against any watch lists that the control center owns In an ideal world where the police had an automated, electronic workflow, the police officer nearest to the location of the incident would be identified by GPS and would be told by the control room where to go and what to do. Most police forces aren’t quite at this technological level yet, and would probably rely on communicating via radio in order to send the nearest response team to the scene. As well as this, shopping malls could create a database from analog records of known shoplifters to identify criminals as soon as they entered the building. This would be even more effective if run co-operatively between all shopping malls and local businesses in an area, and would not only catch any known shoplifters acting suspiciously, but would act as a deterrent from shoplifting in the first place. Live Streaming For Law Enforcement As mentioned above, live streaming video from CCTV cameras can help the police fight crime more proactively rather than reactively. This can be enhanced even further if combined with live streaming video from police car dash cams and police body worn cameras. If video was streamed from all of these sources to a central HQ, such as a police operations center, the force would be able to have full situational awareness throughout an incident. This would mean that, if need be, officers could be advised on the best course of action, and additional police or other emergency services could be deployed instantly if needed. Incorporated with facial recognition, this would also mean that police could instantly identify if they were dealing with known criminals or terrorists. While they would still have to confirm the identity of the person with questioning or by checking their identification, this is still more streamlined than describing what a person looks like over a radio and then ops trying to manually identify if the person is on a watch list. The smart, safe city is possible today – for one, if live video streaming capabilities are deployed they can enable new levels of flow in the city. With the addition of facial recognition, cities will be safer than ever before and law enforcement and security teams will be able to proactively stop crime before it happens by deterring criminal activity from taking place at all.
The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. Drone Security Risks Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Currently, the most common technologies in use for drone detection are video, acoustic sensors, radio, and air surveillance radar. Each of these has advantages, but they also have flaws that make it difficult to detect drones in all conditions. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow. And while radio and air surveillance radar cover a wide area of detection, they suffer from high installation costs and limiting technical challenges, such as being unable to detect low flying drones on autopilot. Compact Surveillance Radar (CSR) Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The compact size allows the radar to be mounted on existing structures or even trees, providing extensive perimeter defense almost anywhere that you can imagine. CSR can also filter out clutter such as birds by using an advanced algorithm reducing the number of false alarms. While the use of CSR and the other detection technologies are legal in the US and in most locations throughout the world, the response mechanisms are generally not. Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies Regulations Limiting Drones Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies. This makes it difficult to stop the damage that drones can cause. The FAA has put into place new regulations that limit some uses of drones. However, in most cases it is still illegal for even state or local governments to stop or interfere with drones other than to locate the operator and have them land the drone. In 2016 the first law to neutralize a drone in the United States was passed in Utah to respond to drones in wildfire areas because of their interference with airborne firefighting. This law may very well provide a model for other states dealing with drones in situations where people’s lives are being put at risk by drones. At the federal level, much effort is being put into evaluating the regulations and technology surrounding the misuse of drones. In the 2016 reauthorization bill for the FAA, Section 2135 included a pilot program for the investigation of methods to mitigate the threat of unmanned aircraft around airports and other critical infrastructure. There are many federal agencies that are evaluating the use of a variety of technologies to respond to this threat. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow Effective Countermeasure Technologies The most effective countermeasure for drones is jamming, currently off-limits to the private sector. This includes stadiums, convention centers, and other large gathering areas. A number of companies are developing new response technologies that do not require the use of jammers or hacking. Several companies have developed net guns that shoot a net at an approaching drone. These are only effective at less than 100m and frequently miss the target, especially when the drone is approaching at high speed. Several other companies have taken this method a step further, with drones that capture other drones. Once a radar detects a drone, another defense drone is launched and flies to the point of detection. Then, using video analytics it homes in on the drone and fires a net to disable the drone and take it to a safe location. While this drone capturing technique is still in its infancy, it shows a great deal of promise and will not be restricted in the same fashion as jamming. However, even this solution is difficult under current regulations, as all commercial drones in the US must be under direct control of a human operator within their line of sight. This effectively means that a drone operator is required to be on-site at all times to protect a facility, event, or persons. One thing is for certain, technology will continue to adapt and security companies will continue to invent new methods to protect their facilities and the people they are sworn to protect.
Videotec is expanding its range of explosion-proof products with the new MBA communication box, which has been designed for optimal installation of Maximus, IP or analog cameras in potentially explosive environments. Much more than a simple junction box, this communication box provides low voltage local power and allows a fast Ethernet connection, thanks to the integrated Ethernet switch that has three RJ45 ports and an SFP port for fiber optic connection. The type of SFP module can be chosen according to the installation requirements. The internal spaces are designed to make access to cables easier and to increase user-friendliness when it comes to connection procedures. The internal circuitry also allows a bypass of analog video signals, and all inputs/outputs available across MAXIMUS Videotec products. Epoxy-powder protective coating MBA has been designed to integrate and work exclusively with the MAXIMUS range of Videotec products, and so that it can connect a PTZ camera to the associated washing kit (or two fixed cameras to their washing kits). MBA is made of marine-grade aluminum that has an epoxy-powder protective coating. This means that the unit can operate in corrosive areas, such as industrial or marine environments. MBA is the complete and competitive solution for professional installation of the Videotec MAXIMUS range of explosion-proof products.
Videotec is launching NVX, an IP FULL HD super low-light camera with high corrosion resistance. This camera incorporates the DELUX imaging and encoding technology for recording incredibly clear color video day or night. Its extremely sensitive light sensor works with the DELUX technology to provide high color rendering and maximum noise reduction in very low light conditions of 0.006 lux, or 0.0006 lux in black and white. Video images can be transmitted via network with H.264/AVC, MPEG4, MJPEG or JPEG compression, and it’s possible to have up to 3 simultaneous and independent Full HD video streams. The NVX external housing is made entirely from AISI316L stainless steel and has a compact and lightweight design that, along with the rapid connectors, helps installation and maintenance. Exceptional corrosion resistance The wiper and the modular bracket for wall/ceiling/parapet mounting come standard. NVX has exceptional corrosion resistance, a wide operational temperature range and IP66/IP67/IP68/IP69 protection. These features mean it is well suited to marine and industrial areas; such as the food industry and rail and motorway tunnels applications.
Cybersecurity is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions; however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cybersecurity. Explosion-proof rated cameras Customers are currently overwhelmed by the perpetual advertisement of products related to cybersecurity. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cybersecurity. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. For software, similar requirements exist but there is less clarity than with their counterparts The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist: in general, it is possible to universally define safety requirements for installation in special environments, such as a drilling rig, a marine vessel or along a railroad. For software, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Video management software Furthermore, a device's firmware and video management software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever-changing conditions. Other aspects of security, such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements, such as gases or dusts, and deducting the product requirements. Video surveillance equipment During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. Several certification options are currently available on the market, and these can be placed in two main groups The result of the lack of certainty that characterises software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap, by pursuing certifications and stamps or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Cybersecurity certification Several certification options are currently available on the market, and these can be placed in two main groups: System certification Product certification As the name suggests, system certification addresses cybersecurity at a system level. This group includes ISO27001, NIST SP 800-53° ISA/IEC62443-3 for example. In these frameworks, risks related to information management are evaluated across every aspect of the organization: information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Video surveillance system Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organization willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/IEC 15408, also known as Common Criteria. It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Cyber secure surveillance Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products: developing safe products for all possible tasks - mechanical, electrical, electromagnetic and software - according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. New security feature Software architecture must be flexible enough to guarantee integration into very different products Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalog. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. Accomplish video acquisition For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Secure video surveillance Every night, the validation tools embedded into the continuous integration process automatically test each product to verify that no regression was unconsciously added while the company proceed with software development. Every time Videotec adds a new feature in response to a suggestion for improvement by the company's customers or identification of an issue, it also updates the testing tools to increase the reliability of the company's products. Videotec has yet to definitively choose a certification scheme for the DeLux technology Videotec believes that its products, and the continual updating of these, actively contribute to maintaining the safe operation of secure video surveillance system, helping IT departments and system administrators by keeping their systems balanced and by not requiring excessive mitigating actions or protections due to future issues. At Videotec, they call this cyber-sustainability. System-level security requirements At the time of writing this white paper, Videotec has yet to definitively choose a certification scheme for the DeLux technology. Several options are being evaluated, as the company search for a solution that will create value for the company’s customers without sacrificing the addition of new features on all products that make up the DeLux technology range. Although Videotec is still exploring the best certification scheme for its software, this does not prevent the company from having a clear and active development path for the cybersecurity in their products. At Videotec, the following five principles are the basis for implementing cybersecurity in products: Hardened software architecture to minimize the attack surface of the cameras Constant updates and availability of new features, even on old products Removal of predefined credentials in the products, to strongly indicate to customers that, as a minimum, a new username and password combination must be defined by the user during installation according to the system-level security requirements Contribution to the ONVIF Security Service specification, to push the industry shifting from usernames and password to X.509 certificates Clear communication to customers, by avoiding fake marketing claims Security service specifications Videotec had an active role in the development of the ONVIF Profile Q specifications. Among other activities, it contributed to driving the standard towards the removal of predefined credentials. The security market must teach installers and users that using pre-defined usernames and passwords is equivalent to not having credentials at all. Videotec is proposing extensions to the ONVIF Security Service specifications Defining the factory-default state of Profile Q compliant devices, where no authentication is required, is the strongest reminder a vendor can provide to its customers. Similarly, with regard to the commitment for the ONVIF Profile Q, Videotec is proposing extensions to the ONVIF Security Service specifications that will include the widespread the adoption of X.509 certificates to replace the usage of credentials. Video surveillance market Moving towards this new way of handling authentication between devices and VMSs will not only impact devices, but it will require a leap forward for the whole video surveillance market. Beyond implementing the functionality in its devices, Videotec is already planning the actions that will be necessary to make its customers effective at selling, installing and maintaining video surveillance systems based on this technology. Last, but not least, trustworthy communication to customers is a key value for Videotec. For this reason, Videotec will never exploit the unintuitive requirements of system certifications of international privacy rules to send wrong messages to the market. As an example, Videotec added to all its IP products an instruction about performing a safe installation according to the General Data Protection Regulation (GDPR), similarly to the instructions given for mechanical, electrical of environmental safety. IP-based device In the last ten years, the video surveillance industry has vigorously shifted from analog to IP products These instructions are meant to teach customers and stimulate their attention to aspects related to cybersecurity. As such, instructions will never be turned into unreliable market claims, such as claims for conformance to the GPDR or any other rule. Cyber threats started menacing video surveillance systems from the day the first IP-based device was put into the market. At that time, the number of digital systems was low and video surveillance was not as pervasive as it is today. In the last ten years, the video surveillance industry has vigorously shifted from analog to IP products and, at the same time, it has witnessed a constant growth in market demand. As a result, digital video surveillance systems are everywhere nowadays and attract attention not only from professionals but also from malicious users. Risk assessment analytics Keeping these systems safe from cyber-threats is an activity that cannot be performed just by performing a risk assessment analytics during the commissioning phase - maintenance and recovery plans must be operative during the whole lifespan of the systems. These activities have a cost; also managing the effects of a system violation has a cost. Integrators and users must find the correct balance, to minimize expenses while keeping video surveillance systems updated and secure. In order to make reduction of expenses related to maintenance and recovery plans easier, Videotec bases the development of its products on the concept of cyber-sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle and assist integrators and customers keeping their systems protected.
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload
- Everbridge Wins Contract To Support Deployment Of Australia’s Nation-Wide Early Warning System
- Idesco Security Key Management Service Secure Evotec’s Systems Against Cargo Thefts
- Siklu’s Etherhaul MmWave Radios Enhance Surveillance Network For Burnley Town Centre
- Siklu MmWave Technology Deployed In Cambridge City Center For CCTV Surveillance System