Hikvision has launched a new Thermal Bullet camera (DS-2TD2117) that boasts Deep Learning capabilities and a new sensor that improves the quality of its images. This product brings thermal technology to a lower budget scenario, making it practical for smaller solutions. Developing earlier versions, the DeepinView camera is equipped with a new improved 160 x 120 pixel sensor in the Hikvision family. The camera is also more sensitive – detecting to a noise-equivalent temperature difference (NETD) of 40mk (previous models went to 50mk). NETD is an industry standard measurement of a sensor’s sensitivity to thermal radiation in certain parts of the electromagnetic spectrum. Based on deep learning algorithms, the camera also delivers powerful and accurate behavior analysis, including detections such as line crossing, intrusion, region entrance and exit. The intelligent human/vehicle detection feature helps reduce false alarms caused by animals, camera shake, falling leaves, or other irrelevant objects, significantly improving alarm accuracy. In addition, the cameras are equipped with a built-in GPU. This high-performance GPU can support updates with more complex algorithms with larger data samples in the future to further improve the intelligent effect of Video Content Analytics (VCA). Other features include: Reliable temperature exception alarm function Advanced fire detection and smoking detection algorithm 160 x 120 resolution sensor, high sensitivity sensor, support contrast adjustment Shutter adjustment in various modes 3D DNR, 15 palettes of color adjustable, image detail enhancement. The camera’s short focal length (3mm or 6mm) makes it a crucial element in smaller perimeter solutions, like yards or car parks for small businesses. Its fire protection capabilities come in handy in solutions like warehouse and rubbish dumps, where avoiding fire is a priority. In essence, this camera can reduce costs, and prevent damage but also, more importantly, can increase safety by detecting potential fires before they happen. “Our R&D Center is 10,000 strong and this is a great example of how they are pushing forward the boundaries of technology”, says Peter Guan, Director of Channel Sales and Marketing for Hikvision Europe. “Using a new thermal sensor means that we can deliver a more sensitive, and so more effective, product to customers.”
Z3 Smart Camera Home Security System is the ideal solution for the small to mid-size home owner who is looking for a comprehensive smart home security system with boundless expandability. With so many sensors and accessories out in the market, how can a user find what they need to start off with? The multifunctional Z3 Smart Camera Security System provides an all-in-one solution with built-in basics, including 1080p HD Camera, PIR motion, temperature, humidity, and ambient lux light sensors, and two-way clear voice intercom system with echo cancellation feature. Z3 is compatible with RF, ZigBee and Z-Wave accessories, supporting up to 160 wireless sensors, to create endless possibilities to help users to create comprehensive smart home security. Add on voice prompt, loud siren, and backup battery, Z3 makes it possible to provide comprehensive smart home security services, including remote management, home security, live visual monitoring, home automation, energy management and emergency monitoring, designed to bring all-around convenience, comfort and safety. Z3 brings a complete and cost-effective smart home solution for users to experience a secure, and comfortable lifestyle. Features Communication Path: IP (Ethernet), WiFi, 3G/4G Built-in Protocol Options: RF, ZigBee, Z-Wave Two area configurations, supports up to 160 zones Alarm event reporting via CID/SIA Email / SMS /Push Notification via Cloud Server Camera: 1920x1080p high-resolution with 152° diagonal wide-angle lens Temperature Sensor: detects temperature from -10°C~ 50°C (14°F~ 122°F) Humidity Sensor: humidity range 0 ~ 100%RH PIR Motion Sensor: 7m range @ 100° degrees Ambient Light Sensor: detects light lux levels Home Security capabilities Security Visual Verification and Real-time Monitoring & Reporting ZigBee and Z-Wave based home automation capabilities Energy Management capabilities 24/7 Environment Emergency Monitoring Built-in siren, voice prompt, microSD slot Remote management via Smartphone App and Web browser Specifications ZigBee Protocol: ZigBee Pro HA 1.2, 2.4GHz Z-Wave Protocol: Z-Wave 868.40MHz (EU) / 908.40MHz (US) RF Frequencies: 433 MHz / 868MHz Wi-Fi Module: 802.11 b/g/ n 4G Frequencies: 2100 / 2600 / 1900 / 1800 / 900 / 850 / 700MHz Power Supply: 12V/2A, 100~240VAC Backup Battery: 7.2V, 1600mA NiMh rechargeable battery pack Backup Battery Life: 15 hours* Siren: 95dB @ 1m Memory Card Slot: MicroSD card Operating Temperature: -10° to 45°C (14°F to 113°F) Operating Humidity: Up to 85% non-condensing
VIVOTEK’s IB9387-LPR camera is a standalone LPR camera system, featuring built-in license plate recognition software and edge-computing capability without additional server, the IB9387-LPR can identify license plates from over 70 countries around the world. It converts number plates into Wiegand signals for use with an access control system, and also offers various APIs for integration with 3rd party systems such as parking management, toll collection, and weighbridge systems. The system is ideally applied for parking access control and Stop & Go toll systems or any LPR applications where a vehicle stops, or almost comes to a complete stop. Supported Both Simple and Complex Scenarios The IB9387-LPR camera can work as an embedded access control application based on LPR software. It can trigger digital output device on this camera when a number plate is recognized and matched the data in list such as white list. This IB9387-LPR camera can convert number plates into Wiegand signals to work with access control system. Centralized List Management With a black & white list embedded inside the IB9387-LPR, the control barrier will open the gate when a white list vehicle is detected. On the other hand, a black list vehicle will trigger an alarm and a notification will be sent to security staff. With VIVOTEK’s IB9387-LPR, security staffs of parking lots with multiple entry points no longer need to upgrade system one after another. They can simply upload these lists to a single centralized LPR camera and all the other LPR cameras will download the master list, thus significantly reducing both installation time and maintenance efforts. Easily Integrated with 3rd Party Systems Thanks to its various Application Programming Interfaces (APIs), third-party systems such as parking management, toll collection, and weighbridge systems are able to receive live LPR images with specific country, state, date, time, and confidence level from IB9387-LPR. Finally, the sophisticated camera is safeguarded by Trend Micro IoT Security, providing proactive protection in cybersecurity. Combining recognition and management technology, VIVOTEK’s IB9387-LPR offers an intelligent, scalable and highly secure standalone LPR system.
The IDIS 12MP Super Fisheye camera delivers 360° HD surveillance, with clear identification from center to edge and wall to wall. Built-in IR LEDs ensure nearly 50-ft night visibility, with support for true WDR up to 120dB. It offers camera-side and client-side dewarping (including on smartphones), giving users the widest choice of recording platforms and VMS options. And the groundbreaking ease and accuracy of IDIS's Smart UX Controls v2.0 allows for effortless dewarping, including agile PTZ in a dewarped state. The Super Fisheye also offers the benefit of IDIS Intelligent Codec with MAT, delivering up to 90% storage and bandwidth savings.
System OverviewWith advanced H.265 encoding technology, Dahua corner network camera has efficient encoding capacity, which helps to save bandwidth and storage space. The camera adopts starlight technology, intelligent IR technology, and intelligent image analysis technology; and has waterproof function, dust-proof function and vandal-proof function, complying to the standards of IP67 and IK10+50J. Functions Smart ( H.265+ & H.264+ )With advanced scene-adaptive rate control algorithm, Dahua smart encoding technology realizes the higher encoding efficiency than H.265 and H.264, provides high-quality video, and reduces the cost of storage and transmission. StarlightDahua Starlight technology mainly applies to the environment of low illuminance, and it can provide clear colorful video. Even in the environment of ultra-low illuminance, the technology can guarantee the good image effect. Perimeter ProtectionWith deep learning algorithm, Dahua Perimeter Protection technology can recognize human and vehicle accurately. In restricted area (such as pedestrian area and vehicle area), the false alarms of intelligent detection based on target type (such as tripwire, intrusion, fast moving, parking detection, loitering detection and gathering detection) are largely reduced. Distortion CorrectionWith advanced distortion correction algorithm, Dahua Distortion Correction corrects the image distortion in both horizontal and vertical directions to be consistent with the actual situation. No IR ExposureWith 94 nm IR LED, the camera will not generate IR exposure. Naked eyes are invisible. Protection (IP67, IK10, wide voltage)IP67: The camera passes a series of strict test on dust and soak. It has dust-proof function, and the enclosure can works normal after soaking in 1 m deep water for 30 minutes. IK10: The enclosure passes strict vandal-proof test, and it can stand the punch of 50J impact energy. Wide voltage: The camera allows ±30% input voltage tolerance (wide voltage range), and it is widely applied to outdoor environment with instable voltage.
The Evolution 180 Indoor camera is built upon Oncam’s expertise and heritage on 360-degree technology. It’s been specifically designed for applications that require a dewarped panoramic view of a scene, without blind spots, from a single sensor camera. The 5:2 Panoramic+ stream provides a perfect balance between image quality and bandwidth efficiency. In addition, when mounting on an angle, Oncam’s Angle Compensation Technology (ACT) corrects the view, straightening vertical lines in the scene. The true day/night functionality allows images to be produced in all lighting conditions, including additional IR lighting. The camera is provided with three different mounting back boxes (0°, 25° and 45°), which also double up as pendant mount. EVO-180-WID (White) / EVO-180-WJD (Black)
Dahua AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables the Dahua AI series to offer various advanced applications such as Face Recognition, ANPR, Metadata, People Counting, traffic data statistics, etc.The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and platform management products. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way. System Overview Pro AI series contains Face Capture, Perimeter Protection and People Counting functions.Powered by deep-learning Artificial Intelligence algorithms, significantly improved accuracy. Meanwhile, the series features starlight and smart IR technology. This series fully protected from dust and water, certified to IP67 standard. Functions Face CaptureFace capture is a software application that automatically captures faces from within a digital image or a video frame from a video source. Dahua cameras use advanced deep learning algorithms and are trained by a large number of face data sources, enabling the camera to locate faces quickly and accurately from the video source and capture facial images. Perimeter ProtectionDahua’s Perimeter Protection functions significantly improved accuracy. Perimeter Protection reduces false alarms and decreases pixel count requirements for object detection. Perimeter Protection features custom tripwires based on object type for automation in limited access areas such as pedestrian or vehicle-only zones. This combination of advanced AI analytics and real-time alerts to a desktop or to a mobile client reduces system requirements and resources resulting in greater surveillance system efficiency. People CountingPeople Counting function uses advanced image processing technology to capture depth information from within images. The camera pairs this information with deep learning algorithms to analyze and detect humanbodies and track target objects in real time. The camera provides statistics for separate individuals’ entrance and exit with up to 95% counting accuracy. Full-color StarlightThe camera adopts F1.6 large aperture lens and 1/1.8" high performance sensor. With higher amount of absorbed light and advanced image processing algorithm, the camera presents an impressive lowlight performance with an exceptional balance between noise reduction and the blur of moving object. Warm Supplemental lightsWith two warm supplemental LED lights, the camera is able to provide a colorful and vivid image even in total darkness. It also provides visible By default, the camera is set to smart light mode, in which the camera can automatically adjust the exposure time and light sensitivity simultaneously to avoid overexposureing of the objects in the image center. Also, the sensitivity and intensity of the LED lights can be remotely controlled by OSD menu. Protection(IP67, wide voltage)The camera allows for ±30% input voltage tolerance, suitable for the most unstable conditions for outdoor applications. Its 6KV lightning rating provides effective protection for both the camera and its structure against lightning. Subjected and certified to rigorous dust and immersion tests (IP67) , the camera is the choice for installation in even the most unforgiving environments.
The FUJINON SX800 camera system marks FUJIFILM's successful entry into the surveillance systems market. FUJIFILM presents the new long-range camera module FUJINON SX800 to the surveillance systems market. With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality. Thanks to its powerful 1/1.8" image sensor, the long focal length range of 20 mm to 800 mm and state-of-the-art image processing technology, the FUJINON SX800 is ideally suited for aerial surveillance. In modern society, the security needs of citizens are constantly increasing. Surveillance cameras with long focal lengths are not only used to address sensitive issues such as border security but are increasingly being incorporated into public infrastructure such as airports, seaports and motorways. Long range surveillance systems must cope with special challenges. For optics with long focal lengths, the smallest vibrations are sufficient to compromise the image information. Heat haze or fog in the air also impair image quality. And, a focus drive that is too slow leads to safety-relevant information loss. However, with the development of the new FUJINON SX800, FUJIFILM has found a way to minimize the impact of these challenges. Instead of developing a surveillance camera and a separate matching lens, the concept of a fully integrated system consisting of camera and lens has been realized. In addition to the high-quality zoom optics, the FUJINON SX800 has a powerful combined optical and electronic image stabilization mechanism that provides angle correction of up to ±0.22 degrees. The integrated high-speed autofocus provides a sharply focused image in less than a second, while a fog filter and heat haze reduction technology helps prevent weather interference. The system provides consistently sharp images – even of objects several kilometers away. In addition, the integrated design of the new FUJINON SX800 reduces the high adjustment effort normally required for camera installation. As of Q3 2019, the FUJINON SX800 will be available as both a mobile stand-alone device and as a system that can be integrated into a pan-tilt head.
March Networks Searchlight for Retail enables all types of retail organizations – including specialty retail, grocery stores, quick service restaurants (QSRs) and convenience stores (c-stores) – to reduce losses from theft, oversee operations, improve customer service and increase profits. The intelligent software integrates clear surveillance video with data from retail systems including point-of-sale (POS) and RFID tags to alert loss prevention staff and business owners to instances of potential theft, and reduce investigation times from hours to minutes. In addition, Searchlight’s optional business analytics (e.g. people counting, dwell time monitoring and queue length) combined with video data provide valuable insights on occupancy, speed of service, transactions conducted with no customer present, and customer interest. Available as a standalone software application, or as a hosted software as a service (SaaS) for a low monthly fee, Searchlight for Retail delivers key benefits to retailers including: Transaction Summaries. View and compare user-definable report summaries (voids, refunds, discounts, etc.) to identify potential issues based on transaction trends over time. Transaction Reports. Review transaction data integrated with video to quickly investigate instances of potential internal theft, and to evaluate employee behavior at the POS. Business Analytics. Uncover customer trends and employee Key Performance Indicators (KPIs), and gain insight into overall store or restaurant operations. Operations Audits. Review snapshots from the cameras at your locations to see what’s happening, and discern operational issues like cleanliness, safety concerns, placement of promotional displays, etc. Business Rules. Detect possible fraud by reviewing lists of transactions and events that are important to you, e.g., no sales, safe drops, and transactions that exceed a certain amount, and be automatically alerted about these events via email. Security Audits. Filter by location ID and/or alarm type, and view alarm video from the vantage point of one or multiple cameras; export alarm details along with relevant video and audio evidence. Integrate your video surveillance system with leading POS and RFID software. A portfolio of POS and RFID integrations are available off-the-shelf; customized integrations can be configured as needed.
System OverviewFeaturing powerful optical zoom and accurate pan/tilt/zoom performance, the camera provides a wide monitoring range and great detail. The camera delivers 1080P resolution at 25/30fps. The camera is equipped with smooth control, high quality image, and good protection, meeting compact size demands of video surveillance applications. Functions Starlight TechnologyFor challenging low-light applications, Dahua’s Starlight Ultra-low Light Technology offers best-in-class light sensitivity, capturing color details in low light down to 0.005 lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. EnvironmentalDahua cameras operate in extreme temperature environments, rated for use in temperatures from -30°C to +60 °C (-22 °F to +140°F) with 95% humidity. Subjected to rigorous dust and water immersion tests and certified to the IP66 Ingress Protection rating makes it suitable for demanding outdoor applications. ProtectionThe camera allows for 4KV lightning rating,which provides effective protection for both the camera and its structure against lightning. InteroperabilityThe camera conforms to the ONVIF (Open Network Video Interface Forum) specifications, ensuring interoperability between network video products regardless of manufacturer. Wide Dynamic RangeThe camera achieves vivid images, even in the most intense contrast lighting conditions, using industry-leading wide dynamic range (WDR) technology. For applications with both bright and low lighting conditions that change quickly, True WDR (120 dB) optimizes both the bright and dark areas of a scene at the same time to provide usable video. Smart H.265+Smart H.265+ is the optimized implementation of the H.265 codec that uses a scene-adaptive encoding strategy, dynamic GOP, dynamic ROI, flexible multi-frame reference structure and intelligent noise reduction to deliver high-quality video without straining the network. Smart H.265+ technology reduces bit rate and storage requirements by up to 70% when compared to standard H.265 video compression.
System OverviewFeaturing a dual lens Pan/Tilt/Zoom (PTZ) camera, this series provides an all-in-one solution that is especially beneficial for long distance video surveillance in outdoor applications. Together with Dahua Thermal and Starlight technology, the camera’s long range capabilities are able to be utilized even at night. The series combines one thermal camera for monitoring in total darkness and one camera with Starlight functionality and a motorized lens for confirming details up close. Functions Uncooled Vox TechnologyDahua thermal cameras use uncooled Vox sensor technology. Their small size and better performance make them a cost-effective solution for thermal security. High SensitivityHigh thermal sensitivity (<40mK) allows cameras to capture more image details and temperature difference information. Fire Detection & AlarmWith built-in fire detection functionality, the camera has the ability to detect fires from long range. Because thermal cameras are sensitive to temperature, they provide higher fire detection accuracy than standard cameras, making them particularly fit for applications such as forest fire prevention. Intelligent Video System (IVS)IVS is a built-in video analytics algorithm that delivers intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. A camera with IVS quickly and accurately responds to monitoring events in a specific area. EnvironmentalWith a temperature range of -40 °C to +70 °C, the camera is designed for extreme temperature environments. Subjected and certified to rigorous dust and water immersion tests, the IP66 rating makes it suitable for demanding outdoor applications. For enviorments with rain, sleet, snow and fog, an integrated wiper(optional) provides users with clear visibility at all times. ProtectionThe camera Supporting wide range voltage input(100–300V AC), suitable for the most unstable conditions for outdoor applications. Its 6 kV lightning rating provides effective protection for both the camera and its structure against lightning.
Increase safety and reduce risk on board your transit vehicles with March Networks® RideSafe MT Series IP Recorders. These all-IP units deliver highly-reliable video surveillance recording and management in a compact, rugged design that is ideal for mid-sized vehicles – like student and patient shuttles and paratransit buses. Available in 4-channel and 6-channel models, the RideSafe MT Series solution enables operators to capture everything that’s happening on the bus, inside and out. Whether you have one or a thousand vehicles, this plug-and-play recorder can operate as a standalone unit programmable through embedded software, or be remotely managed and monitored daily using March Networks Command™ for Transit video management software. Video from the recorder can also be integrated with existing CAD and AVL systems and mobile routers. Key RideSafe MT Series features include: Front panel LEDs for easy recorder diagnostics, including operational, recording and video export status Embedded Linux OS, to ensure reliable and secure video recording Real-time health monitoring, alerting operators to camera, recorder and network issues before they affect performance Vehicle metadata integration from CAD/AVL systems and accelerometers for accurate re-enactments, driver monitoring and investigations Configurable recording policies based on schedule, motion, incident/event and other user-definable variables Powerful video management software, providing the advanced tools and features needed to manage entire fleets Automated video and data extraction over WiFi or 4G networks Extended thermal range (ETR) models available
The Evolution 180 Outdoor Camera is built upon Oncam’s expertise and heritage on 360-degree technology. It is specifically designed for applications that require a dewarped panoramic view of an outdoor scene, without blind spots, from a single sensor camera. The 12MP high-resolution sensor and the built-in 3D dewarped panoramic video provides industry leading Panoramic+ views. The true day/night functionality allows images to be produced in all lighting conditions, including additional IR lighting. The camera is IP66, IP67, IP68, IP69K and IK10+ rated, making it a robust design. Its versatile enclosure enables wall and pendant mounting, while the integrated adjustable mounting allows for an angling of up to 45°. When angled, Oncam’s Angle Compensation Technology (ACT) corrects the view, straightening vertical lines in the scene.
VIVOTEK’s FE9391-EV is a market-leading H.265 12-megapixel day-and-night Deep Learning fisheye network camera, featuring a detailed 12-megapixel CMOS sensor which guarantees superb image quality and 360-degree surround views with zero blind spots. Accurate people detection capability Base on VIVOTEK’s people tracking AI engine, the FE9391-EV is equipped with accurate people detection capability which only people activities will serve as event triggers. Furthermore, armed with VIVOTEK’s self-developed Deep Learning Smart 360 VCA technology, the FE9391-EV provides new functionalities including Intrusion Detection, Crowd Detection, and Loitering Detection. These features are the next steps in elevating surveillance cameras from image capturing devices to advanced notification instruments, allowing users to significantly reduce false alarms. Anti-intrusion software To respond the rising cyber risks of IoT device, the FE9391-EV is embedded with Trend Micro’s anti-intrusion software with multi-layer protection, including brute force attack detection, intrusion detection & prevention, and instant damage control. Users can obtain higher cyber security protection and minimize cyber risks of surveillance network. Working together, these advanced features ensure the new smart fisheye camera FE9391-EV is both highly intelligent and robustly secure. Panomorph lens technology The FE9391-EV's use of the latest in panomorph lens technology has led to much improved image quality with a huge drop in edge distortion. It is also updated with the latest in IR illumination, VIVOTEK's Smart IR II technology with Adaptive IR. Adaptive IR enables the FE9391-EV's IR illuminators to adjust to the scene together or individually to provide the best possible IR image, reducing glaring hotspots and/or underexposed dark spots. It is an ideal camera for the open areas such as airports, shopping malls, parking lots, retail stores, offices and more.
The new DC-C4212RX 2MP micro dome camera is the latest addition to the DirectIP® line up from IDIS, which is South Korea’s largest in-country manufacturer of surveillance technology. The compact design of the DC-C4212RX makes it the best choice for understated, less noticeable installation. The neat aesthetics are ideal for applications where there is a need for unobtrusive surveillance but where comprehensive, high-performance video capture is paramount. Measuring only 86 mm x 58 mm and weighing just 105 grams, the DC-C4212RX delivers advanced benefits within its lower profile and is the right choice for high-end locations such as jewellery shops and boutiques, as well as up-market restaurants and luxury hotels. The DC-C4212RX offers all the key benefits that installers expect from IDIS DirectIP dome cameras, including the company’s signature plug-and-play installation and configuration. The elimination of a pigtail cable allows faster and easier deployment. The 3-axis mechanical lens enables rotation and easy angle adjustment, making it an important design feature for precise image capture, particularly when the camera needs to be discretely wall-mounted. The camera can also operate in a wide range of lighting conditions, delivering high performance live monitoring and playback. Other key features include true wide dynamic range (WDR); IR LED illumination up to 15m with day and night ICR; dual codec H.264/H.265 performance; and easy, plug-and-play integration with IDIS VA in the Box. This cost-effective video analytics appliance delivers value-add business intelligence gained from heat mapping, people counting, queue management and comprehensive reporting. “Our new micro dome is a great camera for installers to work with and it delivers outstanding surveillance capability for customers,” says James Min, Managing Director of IDIS Europe. “It further strengthens our end-to-end offering for retail applications, including high street fashion, boutiques, dining, pubs and coffee shops - markets in which we have gained significant market share globally.”
Video printer products updated recently
Datacard CP80 PLUS CARD PRINTER Video Printer With Theft-deterrent Software And A Hardware Lock System
Comprehensive and robust security programs and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device. Furthermore, the cloud, and access to cloud-based services is becoming almost a fundamental requirement for businesses. This, combined with advanced personal cell phones such as NFC-enabled ones increasingly being used beyond conventional uses, is naturally driving a change in how organizations view, deliver and manage both data and physical security, explains Alan Davies VP Sales – EMEA, Identity Assurance, HID Global. A big change pertaining to access control management is that identity no longer needs to be restricted to a single plastic card or security token. We often think about identity solely in terms of the card or token that carries it; however with more and more companies placing accessible data in the cloud and allowing employees to use NFC-enabled smartphones for physical access purposes in the workplace, ‘identity’ is now taking many different shapes. For example, a smartphone being used as a ‘digital key’ to open doors and tag-in to work locations eliminates the need for employees to carry any other credentials. Of course, this raises questions about how to ensure that any assigned identities can be trusted. Fortunately, it is possible to manage virtualized credentials in the business environment. Take mobile for example. This can be done by implementing a trusted identity framework that creates a secure boundary within communications between the devices, such as when a smartphone interacts with an NFC reader or NFC enabled end-point device. It acts as a secure ‘vault’, that delivers the agreed corporate security policy to the devices in use. If this is accepted, then it is deemed to be trusted and the user is allowed access. Another benefit is that NFC-enabled physical access control makes it easier to track who is entering and exiting monitored access points throughout the workplace. Employers can then be assured that all endpoints and all of the systems in between are valid before allowing entry into the building. Data Protection and Management For organizations investing in the cloud, in order for them to unlock its true value, they need to address exactly where Security strategies should be customized to fit an organizations unique data protection needs sensitive data is stored and consider the user risk factor including the way in which they wish to access the information. Though the rise of the cloud for enterprise data storage and application-hosting has changed the way IT professionals interact with their users, networks and data, the fundamentals of data protection remain the same. What many organizations fail to realize is that a one-size-fits-all approach to data protection is insufficient. Traditionally, enterprises have focused on securing the network perimeter, and relied on static passwords to authenticate users internally, within the firewall or externally via a virtual private network (VPN). However, taking into account the diverse nature of modern threats – from Advanced Persistent Threats (APTs) to ad hoc hacking and the internal risks that come with the mass adoption of BYOD– organizations are increasingly re-evaluating and re-assessing their IT security strategy to meet changing needs. Two-factor authentication measures have typically been confined to physical devices like one-time password (OTP) tokens and display cards, but thanks to a variety of technological advancements these are being replaced by ‘soft tokens’ that can be held directly on the user device such as a cell phone or tablet, or alternatively as browser-based tokens. Additionally, these mobile tokens can be combined with cloud app single-sign-on capabilities, to fulfill the same function of more classic two-factor authentication models while also providing convenient streamlined access to multiple cloud apps – all from one device. Merging Management of Logical and Physical Security Infrastructure Ultimately, the security landscape is constantly evolving and mobile access control as well remote data access to cloud based applications, is growing in significance, making the right security investment a more important decision than ever before. It is critical for enterprises to have an extremely secure mobile and cloud identity environment so that transactions between the employee-owned phones or corporate-issued devices and the door they intend to unlock, or network they access, are conducted in a secure manner. Merging the management of both logical and physical security infrastructures, so that their operations are conducted via one platform, is integral to keeping pace with the paradigm shift caused by technological advancements such as NFC. Furthermore, by deploying just one security device for both logical and physical access control , enterprises will not only realize cost savings, but will gain greater security control, as there will be a single point of revocation for all access rights. Building security systems that take into account the many routes to confidential data – whether at the physical door, on the network or in the cloud – is essential. Only by implementing comprehensive and robust and layered security programmes and policies that cover all three areas, while allowing for new technologies and applications, will organizations be confident that their data is adequately secure.
Resolution quality must be considered when assessing surveillance effectiveness Surveillance cameras are becoming more and more commonplace, especially in busy metropolitan locales. Police and detectives hope to reduce crime rates by keeping a watchful eye on civilians but CCTV has only been helpful in solving a small percentage of crimes. Mike Lewis, Country Manager UK for CCTV manufacturer MOBOTIX AG, highlights key considerations for improving the efficiency of existing surveillance systems.In May of 2008, Detective Chief Inspector Mike Neville, head of Scotland Yard's Visual Images, Identifications and Detections Office (Viido) became the UK's first senior police officer to challenge the misconception around CCTV's role in reducing crime. Speaking at Security Document World Conference in London, the Chief Inspector said: "Billions of pounds have been spent on kit, but no thought has gone into how the police are going to use the images and how they will be used in court. It's been an utter fiasco." Neville also pointed out that only 3 per cent of London's street robberies had been solved using CCTV images. A low figure considering the capital is one of the most densely populated areas of CCTV coverage anywhere in the world. Identifying problems with existing CCTV surveillance systems Mike Lewis, UK Country Manager for CCTV manufacturer Mobotix AG believes that the problem stems from a fundamental issue of image quality. "For many organizations CCTV is treated as a ‘check-box' item with little thought given to how a CCTV installation can help the police solve crimes. Criminals are not stupid and a deterrent is simply not enough; the technology has to be able to gather evidence to help the police secure convictions." Lewis points out that the majority of CCTV installations in the UK still use old analog technology with barely a fifth of the resolution found in a basic camera phone. "If a CCTV system, say covering a street outside a jewellers', captures a car pulling up and three men brandishing shotguns marching into the shop - unless you have the resolution to capture the license plate, or some distinguishing features of each masked robber, or audio capture to get a voice print - the system is pretty worthless." Mandating changes in surveillance video resolution requirements The industry also is "less than opaque" when it comes to selling CCTV in his view. "Many vendors will play down high resolution as not necessary or too expensive to implement without actually explaining that it is exactly these high resolution images and audio capture that will help police make successful prosecution where a grainy image would simply be thrown out of court." "Billions of pounds have been spent on kit, but no thought has gone into how the police are going to use the images and how they will be used in court" Lewis points to the continent as an example of where UK CCTV market needs to learn from. In France for example, under anti-terrorism laws pioneered after the 7/7 tube bombings in London, all government building and high risk areas are legally required to have CCTV of a high resolution and retain data for up to 30 days. In Germany, all banks are required to deploy high resolution CCTV to monitor customers, staff and financial transactions in every branch. [It will be very useful to define what is classified as "high resolution" or the minimum resolutions that are acceptable in these countries] MOBOTIX, which only sells fully-digital high resolution CCTV camera systems believes that the potential of CCTV to reduce crime won't be fulfilled unless either the government, police or even third parties such as insurers, licensing boards or trade associations insist that end users deploy a better resolution capture, coverage and video storage and retrieval. "There will be another wave of CCTV installation heading up to the Olympics, so as a nation, we have a perfect opportunity to set a CCTV standard that meets the needs of police, local government and end users to help us reduce crime and secure more prosecution off the back of CCTV evidence,"comments Lewis. Lewis believes CCTV would be able to help solve more crimes if they had higher resolutions "The technology is not the barrier and newer CCTV systems with hemispheric (360 degree) fields of view will allow end users to actually deploy fewer security cameras while maintaining better resolution and wider coverage - the problem is still trying to persuade people that CCTV can catch criminals and not just scare them away." Optimising CCTV for solving and prevention of crime Lewis offers some constructive suggestions on how to improve CCTV's effectiveness as a crime prevention and evidence gathering tool. "There are an estimated 4 million CCTV cameras in the UK but where they all are, what they record and accessibility to these video archives is mostly unknown - having a register of CCTV for use by the police would help them to quickly gather post incident evidence." The idea of CCTV built into the environment was the theme of the 200 Secured by Design' (SBD) initiative that has been adopted by parts of the building industry to promote crime prevention measures like CCTV in development design. The initiative was endorsed by the Association of Chief Police Officers (ACPO), and has the backing of the Home Office Crime Reduction Unit. However, for police gathering information after an incident, there is no easy way to locate CCTV installations in any given area. The industry also is "less than transparent" when it comes to selling CCTV in his view Most CCTV systems installed in the UK use a centralised approach. Each surveillance camera is effectively dumb with the image processing, access to footage and storage taking place at a remote location. In smaller environments, this could be a DVR simply recording everything on a 24-hour loop. In larger campuses or city centres, this is often a dedicated control room monitored 24 hours a day. Instead Lewis argues that a decentralised approach that places more intelligence into the CCTV camera would allow greater accessibility by third parties such as the police and emergency services. "With a decentralised system, private companies could allow the police to quickly add their local cameras into a centrally managed grid." In this method, if an incident occurs, the police CCTV control center could patch an instant video feed from the nearest available CCTV camera. With a decentralised approach, each CCTV camera becomes an access point on an IP network and can be shared by multiple agencies in a more cost effective approach. "This might sound a bit hi-tech, but it is technically possible," explains Lewis. To give an analogy, when the police receive a 999 call, the dispatcher is automatically informed of the location of the caller from the Caller Line Identification system which cross references a database of addresses of each of the 25 million public and private landlines installed in the UK. "A similar system where the police type in a post code and are presented with secure access to video feeds from all decentralised CCTV installations in an area would be a potentially society changing tool for fighting crime." High risk areas in France were legally required to have high resolution CCTV following London Tube bombings Considerations for realising CCTV's full security potential Lewis also believes: "All CCTV cameras should have a minimum mandated image quality with all information stored in a digital format for a minimum of 7 days that can be easily accessed by the police for evidence gathering." Many police forces around the country already have voluntary guidelines for business deploying CCTV and several have made CCTV installation a condition of alcohol or gaming licences. However this policy has successfully been challenged by landlords and upheld by Information Commissioner as potentially in conflict with the data protection act. Unfortunately, Lewis believes for any of these measures to work, there needs to be stronger backing from the government: "There is obviously a fear of creating an oppressive surveillance society but we have regulation for other areas like fire prevention, road safety, disabled access and a host of other health and safety issues - why CCTV, which has the potential to protect lives, is treated differently is a complete mystery to me." Mike LewisUK ManagerMobotix AG
Bandwidth is an important consideration for CCTV systems to reach their full potential Most surveillance systems today transmit data over IP networks. As manufacturers continue to improve the capabilities of CCTV systems, the amount of traffic traveling on a network becomes increasingly large. Bandwidth is a key consideration in managing surveillance systems and ensuring their full potential is reached. In this article, Bosch discusses the importance of bandwidth and how to estimate the amount of bandwidth needed for a particular CCTV system. What is bandwidth and why is it important? Modern-day CCTV systems increasingly use IP networks to send video from one point to another (for example, from a camera to a Video Management System typically running on a PC). IP networks are an attractive medium for transporting video because one cable can carry the video from many cameras. These networks also serve a multi-functional purpose because the same cable can carry video as well as two-way audio, alarm signals, relay signals, PTZ commands, and serial data. With Power over Ethernet, the cable can even carry power to the camera. This greatly simplifies the multitude of cables usually required. However, the network is limited by the amount of traffic it can carry - known as bandwidth, which is measured in bits per second (bps). The table below shows the three kinds of star-topology Ethernet networks in common use today. Name Also known as Bandwidth 10Base-T Standard Ethernet 10 Mbps (Megabits per second) 100Base-T Fast Ethernet 100 Mbps 1000Base-T Gigabit Ethernet 1,000 Mbps or 1 Gbps Video over IP consumes a large amount of bandwidth. As a rough guide, one camera might consume between 100 kbps and 2 Mbps - compare this to audio, which typically consumes only 80 kbps. This explains the immediate success of Voice over IP. The factors that affect bandwidth consumption are described in the table below. Factor Description Examples Video compression method Typically temporal or spatial compression MPEG-4, M-JPEG, Wavelet, and MPEG-2 Frame rate Images per second 1-30 IPS Image resolution The number of horizontal and vertical pixels QCIF, CIF, 2CIF, 4CIF (also known as full D1) Scene activity level The amount of activity in the camera's field of view Low, medium, and high Quiet time The fraction of time where there is no movement (important for temporal compression algorithms like MPEG-4 because neglibible bandwidth is consumed during quiet time) 8:00 pm - 6:00 am Monday - Friday, all day Saturday and Sunday, equates to about 50% quiet time If you run out of bandwidth on your network, you will start to experience the following: Video artefacts (e.g., blocks in MPEG and M-JPEG, and increased fuzziness in Wavelet) Frames may get dropped, making the video appear choppy The video resolution may drop from 4CIF to 2 CIF or even CIF, making the picture less clear The video may freeze entirely and lose the connection temporarily What is the relationship between bandwidth and disk storage? A single IP network cable can carry video from many surveillance cameras and also carry out multiple functions They are directly related. If video is being transmitted at a certain bit-rate across a network to be stored, then it will consume disk space at exactly the same rate. For example, a 1 Mbps video stream will use 1 Mb (Megabit) of space in one second, or about 1/8 = 0.125 Megabytes per second, which equates to 0.125 x 3,600 = 450 Megabytes per hour (about 11 GB per day or 75 GB per week). How do I know how much bandwidth I need? This is an excellent question, particularly because it is unanswerable with any certainty. As explained earlier, it depends on so many factors that you can really only estimate your bandwidth and/or rate of disk-space consumption. This initial guess is based on your experience with previous projects and it is useful - but the best way to predict your needs is to run the actual test. For example, consider planning an IP-based CCTV system for a school. How much bandwidth will the network need to carry for approximately 16 cameras, and how much disk space is required for seven days of recording? View larger image Graph showing results gained by capping the bit rate Capping the bit rate You can ‘cap' the bit rate of each IP camera or encoder so that it never uses more than that specified amount. Note that when capped, the actual bit-rate at any particular moment may be well below the ‘cap' limit. Advantage: Once you know the available disk space, you are guaranteed to get a predictable number of days of video. This is especially important for regulated environments. It is also good news for IT departments who want to know how much you are going to stress the network. Disadvantage: To not exceed the allowed bit rate, the IP camera or encoder has to do something if it finds itself over-stretched. Normally it has the option to either drop some of the frames or reduce the video resolution of the frames - but this can be an issue when the video quality you need has to be degraded under any circumstances. Unlimited bit rate View larger imageGraph showing the results of unlimited bit rate You can let the IP camera or encoder help itself to whatever bandwidth it needs. Advantage: Image quality never deteriorates. Disadvantage: Under certain conditions, the peak load on the IP network may cause problems. This "help yourself" policy also may allow disk space to be consumed faster than you anticipated, so you may not have as many days of video as you expected. Summary With conventional VCRs, it is easy to predict the amount of disk space required for a specified number of days of recording time. With DVRs and IP-based CCTV, it can also be easy to predict (by capping) - as long as you are comfortable with the possibility that the video quality may degrade under certain circumstances. If you overestimate your bit rates, you will end up paying for more storage than you need. The best way to predict your real needs is to pilot a small IP surveillance system (perhaps just one camera). Run it for a short while, then review the video and make any necessary adjustments. This is the most reliable way to get what you need and plan your infrastructure accordingly. In addition to better estimating, it is also important to remember the enormous value of Recording at the Edge, which keeps video off the network for recording. In such a scenario, the network is only used for live streaming and playback.View the Bandwidth quick reference guide Bosch Security Systems
Physical Security Supports A Future-Proof Cyber Security StrategyDownload
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
US Housing Authority Increases Operator Productivity And Reduces Investigation With Honeywell IP-based Video Management
- Samsung DVRs Excel At JD Sports Fashion Group
- University Designs Its Own IP Video Surveillance System With Help Of IndigoVision Technology
- US Housing Authority Increases Operator Productivity And Reduces Investigation With Honeywell IP-based Video Management
- Milestone's IP Surveillance Fits The Needs Of The Port Of San Giorgio Di Nogaro