Video Printers (27)
Razberi Monitor is a software platform that provides a top-down view of the physical security network and ecosystem without IT resources. Purpose-built for security professionals, it monitors and manages all the system components for cybersecurity and system health and can be deployed from the cloud or on-premise. It provides secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. It also predicts and prevents problems while providing a centralized location for IT departments to view video data. What is Monitor’s key USP? A vital benefit of Monitor is that it protects against the multiple commonly cited cyberattack vulnerabilities. These include weak passwords, the failure to update software or firmware, the lack of best practices for routine maintenance, and not aligning with network IT policy. The benefit of having Monitor ensures shorter response times to cybersecurity events along with real-time alerts and logs to proactively notify users of active threats. It can detect cyber posture and problems with servers, cameras, and other IoT devices in real-time. You can track security devices by location and get deep visibility into configurations, operating systems, and firmware status. This means that without IT resources, you can still know what devices need updates and patches. Why choose Monitor? Monitor can be offered to enterprises as a managed service with a monthly subscription. This means no significant upfront costs and the ability to free up cash flow. The Monitor software will optimize and secures networks, reducing costs, time, and manpower required to install and manage an enterprise network. Users can create custom views and alerts by location, device, and problem type. They can use these reports to demonstrate system performance and compliance, share access to these reports with their service provider for proactive support, and reduce service calls. Monitor in Action Monitor enables proactive maintenance by offering problem resolutions before they become more significant issues. It does this by ensuring that the system is working as expected through continuous checks on the system’s health and cybersecurity and prevents service outages with early warning indicators. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable OPEX cost saving. For example, if there is an incident in a supermarket and a client wanted to review their cameras, only to realize that they had stopped recording some weeks before. With Monitor, if the client’s cameras are failing or are in any way beginning to compromise, this would be immediately detected by Monitor and flagged in advance of it failing. Thus, when an incident does occur that requires video verification, clients can be assured that the video data will be available to review the incident.
Launched by Dahua Technology, Dahua WizMind is a full portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, Thermal and software platform which adopts industry-leading deep learning algorithms. Focusing on customer’s requirements, WizMind provides precise, reliable and comprehensive AI solutions for verticals. Series Overview Dahua IVSS goes beyond the ordinary NVR products. It is an Intelligent Video Surveillance Server that combines video management features with traditional video storage functions in one device. Besides the basic functions as a network video recorder, IVSS is integrated with features such as face detection and face recognition for different business and industrial applications. With the build-in deep learning module, IVSS series products adopt video image metadata technology based on deep learning algorithms, offering high-precision human face recognition and perimeter protection. By applying deep learning artificial intelligence, IVSS allows users to focus on what matters most, to improve event response time and help make video actionable. An all new UI design supports device operation and maintenance management, improving the value and experience of surveillance view, and serving the era of security big data. Functions Face RecognitionSupports recording faces by metadata and real-time crosscheck with incredible accuracy to figure out the face with target features. With the Regular and Stranger face mode, IVSS triggers various kinds of alarm actions for different applications. AI IVSWith deep learning algorithm, AI IVS technology can recognize human and vehicle accurately. In restricted area (such as pedestrian area and vehicle area), the false alarms of intelligent detection based on target type (such as tripwire, intrusion, parking detection, loitering detection and crowd gathering estimation) are largely reduced. Video MetadataMetadata is feature attribute information extracted from a target object which can be used for data retrieval. Currently, there are four main kinds of metadata in the security industry: Human face, human body, and motor vehicle and non-motor vehicle metadata. AI SearchSupports search by metadata of human and vehicles. Supports uploading face pictures to IVSS and compare them with recorded faces in IVSS by similarity. IVSS enables operators to quickly and easily search through multiple channels and long duration, to efficiently find out when and where a person of interest appeared. ANPRAutomatic Number Plate Recognition available for convenient entrance/exit management. This feature provides number plate recognition (working with Dahua ITC camera), number plate comparison with blocklist/allowlist, vehicle database management, and vehicle record search. N+M Hot StandbyThe highly reliable redundancy N+M Hot Standby design provides a secure failover technique to ensure immediate backup. In the event of a system failure, the sub device instantly takes over the main device to ensure no data loss. Smart TrackingThe automatic tracking PTZ feature automatically tracks a moving target throughout the camera's field of view. This function is ideal for following an object as it moves through airports, parking lots, city centers, or other scenes
With its own device certificate issuing system, Root CA, the Wisenet 7 camera lineup offers the highest levels of cybersecurity possible. Secure by Default, Hanwha Techwin’s cybersecurity policy, embeds unique certificates into all products during each step of the development and manufacturing process. This results in a cybersecurity policy that satisfies stringent UL CAP standards as well as our own requirements for product reliability and design innovation.
Hikvision, an IoT solution provider with video as its core competency, announced its latest traffic product offering - the All-Rounder ITS camera - designed to improve road safety and optimize traffic flow. As the name implies, the camera encompasses different skills and abilities, boasting speed detection, traffic violation detection, automated plate recognition, and vehicle attribute analysis in one housing. “Hikvision is always pushing the boundaries of video technologies. Beyond the visual range that is perceived by video cameras, the abilities to understand other kinds of “senses” would allow even more precise monitoring and reporting of events or accidents,” says Frank Zhang, President of International Product and Solution Center at Hikvision. “This is multi-dimensional perception, a trend that we think will affect the security industry in the future.” Optimising traffic flowThe new ITS camera is designed and developed with this multi-dimensional concept in mind. It is Hikvision’s first camera to integrate three otherwise separate modules in one unit with no compromise on performance, making the camera neat and flexible to be deployed for demanding environments, all in an easy and cost-effective manner. The product provides an HD camera, speed radar, and light array inside one housing. Specifically, it works with a multi-tracking radar that continuously monitors up to two or three traffic lanes - depending on the camera model, and identifies the speed and position of objects in the monitored area at a speed of up to 300 km/h. If a vehicle violates the speed limit, the embedded radar triggers the connected camera and a picture is taken of the vehicle and its license plate. Conventional ANPR systemsIn the event of infringements of traffic rules such as wrong-way driving, improper lane usage, or even failure to use a seat belt, the camera will capture images of the corresponding vehicle, recognize its license plate and relevant information including vehicle type, color, brand, and direction of movement, which can be addressed to the authorities in real-time or stored on board. Incident detection helps to improve overall driving standards, which ultimately reduces the number of accidents, improves road safety and further evens traffic flow. Employed with Deep Learning algorithms, the camera is able to recognize a much higher number of license plates and with higher efficiency than conventional ANPR systems. Its GMOS sensor further ensures brighter and smoother images to be reproduced in challenging lighting conditions, especially in low-light environments. The camera’s embedded supplemental light features a 16-bead light array, offering an IR range of up to 40 metres at night. Seamless onsite configurationAs all of these functionalities are integrated, the single product itself outperforms conventional ITS products with space-saving and less cabling for easier installation. It supports flexible pole- or side-mounting, which makes onsite configuration effortless. The Hikvision All-Rounder ITS camera is ideal for various scenes such as urban roads, highways, tunnels and toll stations.
Launched by Dahua Technology, WizSense is a series of AI products and solutions that adopt independent AI chip and deep learning algorithm. It focuses on human and vehicle with high accuracy, enabling users to fast act on defined targets. Based on Dahua's advanced technologies, WizSense provides intelligent, simple and inclusive products and solutions. System OverviewFeaturing a dual lens, fixed camera, this series provides an all-in-one solution for capturing video surveillance for indoor and outdoor applications. Together with Thermal and Visible Technology, the camera is the perfect solution for dark, small area monitoring applications. The series combines one thermal camera for monitoring in total darkness and one visible camera with Smart IR for confirming details. FunctionsUncooled VOx TechnologyDahua thermal cameras use uncooled VOx sensor technology. Because of small size and better performance, it is a cost-effective solution for thermal security. High SensitivityHigh thermal sensitivity (< 50 mK) makes cameras capture more image details and temperature difference information. Fire Detection & AlarmWith built-in fire detect function, the camera has the ability to detect fire in a long distance. Thermal camera is sensitive to temperature, so the accuracy of fire detection will be higher than visible camera. Temperature MeasurementDahua thermal cameras (-T models) provide remote temperature monitoring function with the ability to set temperature threshold alarms. Object temperatures can be monitored in daytime or at night, making them ideal for usage in power plant or oil extraction applications where overheating can be dangerous. When the temperature exceeds the defined threshold, an alarm is triggered. The temperature range is between –20°C to 400°C (–4°F to ﹢752°F). Intelligent Video System (IVS)With built-in intelligent video analytics, the camera has the ability to detect and analyze moving objects for improved video surveillance. The camera provides optional standard intelligence at the edge allowing detection of multiple object behaviors such as motion detection. IVS also supports tripwire analytics, allowing the camera to detect when a pre-determined line has been crossed. Smoking DetectionDahua thermal camera can provide a real-time monitoring, in the use of Deep-learning AI technology, to automatically detect people’s smoking behavior and provide intelligent voice and light warning (loudspeaker and white light, etc.) in an effort to dissuade smoker, and avoid potential risk and loss. EnvironmentalWith a temperature range of –30°C to +60°C (–22°F to + 140°F), the camera is designed for extreme temperature environments. Subjected and certified to rigorous dust and water immersion tests, the IP67 rating makes it suitable for demanding outdoor applications. ProtectionSupporting ±20% input voltage tolerance, this camera suits even the most unstable conditions for outdoor applications. Its 6kV lightning rating provides protectection against the camera and its structure from the effects of lightning.
Hikvision launched newly updated HikCentral Professional 2.0 security software (“HCP 2.0”), which blends feeds from multiple systems onto a single platform. HCP 2.0 can be configured to link video security devices, alarm and access control systems, and more, including third-party systems through the OpenAPI – for easy centralized management of a variety of security and business applications. Frank Zhang, President of Hikvision’s International Product and Solution Center, said, “This is an important release for us, and a significant leap forward in our security management software offerings. HikCentral Professional 2.0 will help our customers manage a variety of activities seamlessly on one platform. We’re excited to see the value it delivers.” Nine key applications for numerous business needs HikCentral Professional 2.0 integrates multiple business and security systems with nine key applications, making it valuable to a wide variety of common security and business scenarios seen in buildings, factories, stores, apartments, and the like. Among them, video cameras and security alarms are integrated into the platform to deliver fluid live viewing and timely alarm notifications. Furthermore, access control can be included to assign a variety of access permissions using multiple methods including facial recognition, ID cards, fingerprints, QR codes, and more. HCP 2.0 also allows various personnel such as HR managers to set flexible attendance rules, including schedules for shift work, while delivering full reporting facilities. Additionally, site managers can also employ vehicle management and visitor management applications to streamline entrance management as well as on-site parking. Users can further rely on HCP 2.0 with intelligent analysis and reporting – an application that collects data and transforms it into easy-to-understand reports and dashboards. This includes flow status, people density and more. For systems management teams, HCP 2.0’s system maintenance application visualizes alarm and device notifications, as well as the full network and device topology for rapid, targeted action in unusual events. Last but not least, HCP 2.0 lets users deploy digital signage systems to display advertisements and announcements. The software comes with eight pre-installed templates for users to present content optimally. This can be crowd numbers and temperature status in a supermarket scenario, for example. Creating truly unified systems with enhanced security and greater operational efficiency With HCP 2.0, users will flexibly unite applications and build a tailored system to match their security and business needs. The unified approach not only creates greater situational awareness of their security environment, it also reduces real day-to-day management resources previously required by disparate systems. For example, users can integrate visitor management with vehicle management to enhance daily operational efficiency for building facilities. Facility managers can register visitor information into the HCP 2.0 system, and – by linking to an ANPR system – can set visitors to be automatically permitted into on-site parking. Similarly, the system can also pre-authorize visitor access to specific areas of an organization’s premises. Personalized user experience HikCentral Professional 2.0 can be tailored to deliver specific information to assigned users. The system comes with three pre-configured roles: “system installation and management,” “security control and management,” and “attendance management.” In this way, HR staff can customize their feed to show employee attendance status, for example, while management staff can monitor security of the facilities. There is also one custom role, which can be tailored to specific needs. Perhaps most importantly, HikCentral Professional 2.0 features an improved user interface. Users can customize the control panel to suit their viewing preferences, simply dragging and dropping key video and device feeds into the dashboard, adjusting where they sit and how they look. Dynamic and intuitive user interface HCP 2.0 also incorporates multiple visualized dashboards that display key security and business insights generated from various applications, facilitating decision-making processes with more accuracy and efficiency. What’s more, users apply 3D E-maps that vividly demonstrate device monitoring statuses in different locations, and manage instant alerts interactively by clicking and watching associated live videos and other integrated system information. Easy setup and maintenance HikCentral Professional 2.0 is easy to deploy and quick to set up for a multitude of projects with single applications. Customers with minimum system requirement of Intel i3-CPU and 8 GB RAM can get up and running with a one-click installation procedure that makes HCP 2.0 setup a breeze. Operations guidance wizards are conspicuously displayed to support users in configuring key applications. In addition, the visualized health monitoring dashboards enable more focused and efficient IT maintenance.
Industrial level ADS LCD panel, suitable for continuous 24/7 operation Ultra-narrow 3.5mm bezel-to bezel design(2.3mm bezel on the left and top sides and 1.2mm bezel on the right and bottom sides) High contrast ratio and high screen resolution greatly enhance the video layering, and present the details of the video High fidelity digital processing, brilliant and vivid video Built-in 3D COMB filter and 3D noise reduction Wide array of connectivity options HDMI, DVI, VGA, DP(daisy chain), RS232, OPS, Audio Built-in picture splicing function Infrared, RS232 dual mode, supporting remote PC control Professional thermal design to extend equipment lifespan Built-in power, low energy consumption, ultra-quiet Fast stack installation, professional project design, supporting arc-shaped mounting Widely used in surveillance center, dispatching platform, safe city, commercial display, etc.
System Overview Lite Series is suitable for users who requires high quality monitoring products at areasonable price. It is cost effective and offers high performance, which makes it an ideal choice for residential and small-medium business applications. This series offers an option of a wide range of technologies such as Full-color and Starlight, providing various solutions for different scenarios. Functions StarlightWith the adoption of large sized high performance sensor and large aperture lens, the camera is able to provide incomparable performance even under extreme lowlight environment. The starlight feature allows more details to be captured and accurate color to be recognized at night or in scenes with limited illumination. Broadcast-quality AudioAudio information is used as supplementary evidence in video surveillance applications. The HDCVI camera supports audio signal transmission over coaxial cable. In addition, it adopts unique audio processing and transmission technology that best restores source audio and eliminates noise, guaranteeing the quality and effectiveness of collected audio information.* Audio input is available for some models of HDCVI cameras. Wide Dynamic RangeWith advanced Wide Dynamic Range (WDR) technology, Dahua HDCVI camera provides clear details in the environment of strong brightness contrast. The bright and dark area can get clear video even in high brightness environment or with backlight shadow. Super AdaptEmbedded with intelligent algorithm, for changing external environment, camera can automatically adjust parameters to present the optimal image, and it solves the trouble of configuration. Advanced 3D NR3D NR is noise reduction technology that detects and eliminates random noises by comparing two sequential frames. Dahua's advanced 3D NR technology allows remarkable noise reduction with little impact to sharpness, especially under limited lighting condition. Besides, the advanced 3D NR effectively decreases the band width and saves the storage space. Smart IlluminationThe camera is designed with IR illumination for best lowlight performance. Smart IR is a technology to ensure brightness uniformity in B/W image under low illumination. Dahua's unique Smart IR adjusts to the intensity of camera's infrared LEDs to compensate for the distance of an object, and prevents IR LEDs from overexposing images as the object comes closer to the camera. Protection (IP67, IK10,wide voltage)IP67: The camera passes a series of strict test on dust and soak. It has dust-proof function, and the enclosure can works normal after soaking in 1 m deep water for 30 mins.IK10: The enclosure can stand the punch more than 5 times from a 5 kg hammer falling from a height of 40 cm (Impact energy is 20J).Wide voltage: The camera allows ±30% (for some power supplies) input voltage tolerance (wide voltage range), and it is widely applied to outdoor environment with instable voltage.
Hikvision, an IoT solution provider with video as its core competency, announced the launch of HeatPro, a new thermal series of cameras designed to provide affordable all-weather deterrent and alerts. It is especially useful in perimeter protection and fire prevention applications. The HeatPro Series Cameras feature deep-learning thermal video analytics for perimeter protection, and object temperature measurement and fire detection with real-time alarms. Features like accurate human/vehicle classification, visual and auditory alarms for perimeter protection, and speedy temperature exception alarms for fire prevention make them ideal for SMB (small and midsize business) applications. Perimeter defense with AIWhen securing a perimeter, higher accuracy and a low false alarm rate can help reduce operation costs. The HeatPro Series achieves this by developing powerful video analytics based on Deep Learning algorithms, radically reducing false alarms. The cameras focus on short-range perimeter protection (0-50meters), where they deliver target detection and classification. The use of AI means that the cameras can distinguish between a person and a vehicle. This comes in especially useful when the two targets are close together. Traditionally, they can only be recognized as one ‘target’, but intelligent algorithms mean that they can be detected separately, increasing accuracy. Thermal cameras are also able to easily locate potential threats in zero visibility conditions, where a conventional camera could not. They do this by detecting the latent radiation emissivity of an object, so not relying on visible light. This means they can operate in all-weather conditions and the darkest night. They also don’t emit light, which means their presence is not obvious, making them useful in scenarios where they need to be hidden. The HeatPro Series is also designed to be efficiently and quickly installed, with a simple, three-step deployment, bringing setup time down to 30 seconds. Traditionally thermal cameras require specialist engineers to configure and double check, takes both extra time and energy. HeatPro cameras have been designed with installation time and effort in mind – they are simpler to install and so installers can spend more time correctly configuring for optimum operations, and the lowest false alarm rate possible. Temperature measurement for fire preventionThe HeatPro Series is also equipped with the ability to measure temperature. This process is very useful in a scenario where overheating could lead to fires. The camera can provide non-contact temperature measurement for fast and visible detection. This means that action can be taken earlier, potentially preventing a fire from the very beginning. The camera can trigger a fire alarm faster than a smoke sensor. The temperature measurement function can also be used to help check any potential overheating issue and troubleshoot problems. The series contains a number of different models and options, with bullet and turret forms, and Bi-spectrum or single lenses. The cameras can be built into a number of solutions, for instance seamlessly working with NVRs, AX PRO alarm systems, and even Hik-Connect for real-time mobile alerts by phone. They can be used in various scenarios – not least: residential buildings, offices, construction sites, car parks, retail outlets and warehouses. “Dedicated to bringing professional protection solutions to the mass market, these cameras provide perimeter protection with unparalleled accuracy, and fire detection with superlative sensitivity”, says Stefan Li, Director of Thermal Products at Hikvision. “Hikvision HeatPro Series provides professional protection made simple.”
Allows to monitor and view live and recorded video from multiple exacqVision systems simultaneously using mobile device Simple PTZ & Digital PTZ control Activate alarms and triggers Works with low & high bandwith networks Intuitive search Playback recording View video as close as desired with the interactive pinch-to-zoom functionality
Superior low light performance to see important details Face detection enhancement to automatically increase video quality around detected faces Blur detection to alert users when camera focus or cleaning is necessary Quick and easy installation and configuration One-touch focus and motorized zoom Multiple motorized lens options Expanded browser support – IE, Chrome, Firefox, Safari, Windows, Mac, Linux
Lite Series is suitable for users who requires high quality monitoring products at a reasonable price. It is cost effective and offers high performance, which makes it an ideal choice for residential and small-medium business applications. This series offers an option of a wide range of technologies such as Full-color and Starlight, providing various solutions for different scenarios.
AxxonNet is video management software that enables communications service providers and system integrators to build cloud-based video surveillance solutions (VSaaS) that harness the power of AxxonSoft's neural network analytics and intelligent search for recorded video. Features: AI Facial and License Plate RecognitionIdentify and track persons or vehicles of interest across multiple cameras. Intelligent Search Across Recorded VideosQuick search by multiple criteria: motion in area(s), crossing of a line, object color or size, etc. AI Fire and Smoke RecognitionEarly detection of fire hotspots in areas where other types of sensors are ineffective. Integration with Third-Party SystemsAccess control systems, security control panels, cash registers, third-party software, and more. AI Behavior AnalyticsEarly recognition of threats based on specific human postures such as raised arms. Multi-Level User Rights ManagementAccess to all cameras via the interactive map in accordance with user rights. Retail AnalyticsVisitor counting, age and gender guesstimation, queue management and motion heatmapping. Comprehensive ReportsCustom reports from any client's facility based on detection tools, alarms and retail analytics.
Launched by Dahua Technology, Dahua WizMind is a full portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, Thermal and software platform which adopts industry-leading deep learning algorithms. Focusing on customer's requirements, WizMind provides precise, reliable and comprehensive AI solutions for verticals. Series Overview The Panoramic Network Camera + PTZ Camera can splice up to a 180° horizontal view to give you a wider view. Working with high-speed PTZ, the camera can display the details. With advanced video analysis algorithm, the camera supports linkage between panorama and details, and situation analysis. Functions Panoramic SplicingWith advanced splicing algorithm, Dahua Panoramic Splicing technology deletes overlapped area and splices multiple images to be a complete panorama. The field of view of the spliced image can be up to 180°, which largely improves surveillance efficiency and user experience. Generally, after splicing, the field of view of four-sensor camera can be 180°. Smart TrackingWith advanced algorithm, Dahua network camera can detect targets, track targets with speed dome, and view details. Crowd DensityWith deep learning algorithm, Dahua Crowd Density technology can detect the crowd density on the image, and display it on heat map; it can detect people quantity and density in selected area and set threshold. When the number or density is larger or smaller than the threshold, it triggers linkage. Vehicle DensityWith deep learning algorithm, Dahua Vehicle Density technology analyses the vehicle situation in the image, such as vehicle number in selected area. You can set threshold, and when the number is larger or smaller than the threshold, it triggers linkage. Perimeter ProtectionWith deep learning algorithm, Dahua Perimeter Protection technology can recognize human and vehicle accurately. In restricted area (such as pedestrian area and vehicle area), the false alarms of intelligent detection based on target type (such as tripwire and intrusion) are largely reduced. ROIDahua Regions Of Interest (ROI) technology allows you to select themonitoring area of interest to improve image effect in the selected area. AR Panorama Dahua AR panorama technology generates wide-field of view through panoramic merging and splicing. The software overlaps the cameras as tags in the image. Click the tag to display the corresponding cameravideo, which makes monitoring visual and convenient, and improves command efficiency. Cyber SecurityDahua network camera is equipped with a series of key security technologies, such as security authentication and authorization, access control, trusted protection, encrypted transmission, and encrypted storage, which improve its security defense and data protection, and prevent malicious programs from invading the device. With UL CAP Certification, TÜV Rheinland Protected Privacy IoT Product Certification, and ETSI EN 303645 Certification, Dahua network camera better meets the demands of cyber security and privacy protection.
High quality imaging with 2 MP(1920 × 1080 @30 fps) resolution Clear imaging against strong back light due to 120 dB true WDR technology The camera battery can work up to seven days in rainy or cloudy days if it is fully charged 40 W photovoltaic panel, 20 Ah chargeable lithium battery Support battery management, battery display, battery high-low temperature protection, charge-discharge protection, low-battery sleep protection and remote wakeup LTE-TDD/LTE-FDD/WCDMA/GSM 4G wireless network transmission, support Micro SIM card Camera: Water and dust resistant (IP67)
Video printer products updated recently
Comprehensive and robust security programs and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device. Furthermore, the cloud, and access to cloud-based services is becoming almost a fundamental requirement for businesses. This, combined with advanced personal cell phones such as NFC-enabled ones increasingly being used beyond conventional uses, is naturally driving a change in how organizations view, deliver and manage both data and physical security, explains Alan Davies VP Sales – EMEA, Identity Assurance, HID Global. A big change pertaining to access control management is that identity no longer needs to be restricted to a single plastic card or security token. We often think about identity solely in terms of the card or token that carries it; however with more and more companies placing accessible data in the cloud and allowing employees to use NFC-enabled smartphones for physical access purposes in the workplace, ‘identity’ is now taking many different shapes. For example, a smartphone being used as a ‘digital key’ to open doors and tag-in to work locations eliminates the need for employees to carry any other credentials. Of course, this raises questions about how to ensure that any assigned identities can be trusted. Fortunately, it is possible to manage virtualized credentials in the business environment. Take mobile for example. This can be done by implementing a trusted identity framework that creates a secure boundary within communications between the devices, such as when a smartphone interacts with an NFC reader or NFC enabled end-point device. It acts as a secure ‘vault’, that delivers the agreed corporate security policy to the devices in use. If this is accepted, then it is deemed to be trusted and the user is allowed access. Another benefit is that NFC-enabled physical access control makes it easier to track who is entering and exiting monitored access points throughout the workplace. Employers can then be assured that all endpoints and all of the systems in between are valid before allowing entry into the building. Data Protection and Management For organizations investing in the cloud, in order for them to unlock its true value, they need to address exactly where Security strategies should be customized to fit an organizations unique data protection needs sensitive data is stored and consider the user risk factor including the way in which they wish to access the information. Though the rise of the cloud for enterprise data storage and application-hosting has changed the way IT professionals interact with their users, networks and data, the fundamentals of data protection remain the same. What many organizations fail to realize is that a one-size-fits-all approach to data protection is insufficient. Traditionally, enterprises have focused on securing the network perimeter, and relied on static passwords to authenticate users internally, within the firewall or externally via a virtual private network (VPN). However, taking into account the diverse nature of modern threats – from Advanced Persistent Threats (APTs) to ad hoc hacking and the internal risks that come with the mass adoption of BYOD– organizations are increasingly re-evaluating and re-assessing their IT security strategy to meet changing needs. Two-factor authentication measures have typically been confined to physical devices like one-time password (OTP) tokens and display cards, but thanks to a variety of technological advancements these are being replaced by ‘soft tokens’ that can be held directly on the user device such as a cell phone or tablet, or alternatively as browser-based tokens. Additionally, these mobile tokens can be combined with cloud app single-sign-on capabilities, to fulfill the same function of more classic two-factor authentication models while also providing convenient streamlined access to multiple cloud apps – all from one device. Merging Management of Logical and Physical Security Infrastructure Ultimately, the security landscape is constantly evolving and mobile access control as well remote data access to cloud based applications, is growing in significance, making the right security investment a more important decision than ever before. It is critical for enterprises to have an extremely secure mobile and cloud identity environment so that transactions between the employee-owned phones or corporate-issued devices and the door they intend to unlock, or network they access, are conducted in a secure manner. Merging the management of both logical and physical security infrastructures, so that their operations are conducted via one platform, is integral to keeping pace with the paradigm shift caused by technological advancements such as NFC. Furthermore, by deploying just one security device for both logical and physical access control , enterprises will not only realize cost savings, but will gain greater security control, as there will be a single point of revocation for all access rights. Building security systems that take into account the many routes to confidential data – whether at the physical door, on the network or in the cloud – is essential. Only by implementing comprehensive and robust and layered security programmes and policies that cover all three areas, while allowing for new technologies and applications, will organizations be confident that their data is adequately secure.
Resolution quality must be considered when assessing surveillance effectiveness Surveillance cameras are becoming more and more commonplace, especially in busy metropolitan locales. Police and detectives hope to reduce crime rates by keeping a watchful eye on civilians but CCTV has only been helpful in solving a small percentage of crimes. Mike Lewis, Country Manager UK for CCTV manufacturer MOBOTIX AG, highlights key considerations for improving the efficiency of existing surveillance systems.In May of 2008, Detective Chief Inspector Mike Neville, head of Scotland Yard's Visual Images, Identifications and Detections Office (Viido) became the UK's first senior police officer to challenge the misconception around CCTV's role in reducing crime. Speaking at Security Document World Conference in London, the Chief Inspector said: "Billions of pounds have been spent on kit, but no thought has gone into how the police are going to use the images and how they will be used in court. It's been an utter fiasco." Neville also pointed out that only 3 per cent of London's street robberies had been solved using CCTV images. A low figure considering the capital is one of the most densely populated areas of CCTV coverage anywhere in the world. Identifying problems with existing CCTV surveillance systems Mike Lewis, UK Country Manager for CCTV manufacturer Mobotix AG believes that the problem stems from a fundamental issue of image quality. "For many organizations CCTV is treated as a ‘check-box' item with little thought given to how a CCTV installation can help the police solve crimes. Criminals are not stupid and a deterrent is simply not enough; the technology has to be able to gather evidence to help the police secure convictions." Lewis points out that the majority of CCTV installations in the UK still use old analog technology with barely a fifth of the resolution found in a basic camera phone. "If a CCTV system, say covering a street outside a jewellers', captures a car pulling up and three men brandishing shotguns marching into the shop - unless you have the resolution to capture the license plate, or some distinguishing features of each masked robber, or audio capture to get a voice print - the system is pretty worthless." Mandating changes in surveillance video resolution requirements The industry also is "less than opaque" when it comes to selling CCTV in his view. "Many vendors will play down high resolution as not necessary or too expensive to implement without actually explaining that it is exactly these high resolution images and audio capture that will help police make successful prosecution where a grainy image would simply be thrown out of court." "Billions of pounds have been spent on kit, but no thought has gone into how the police are going to use the images and how they will be used in court" Lewis points to the continent as an example of where UK CCTV market needs to learn from. In France for example, under anti-terrorism laws pioneered after the 7/7 tube bombings in London, all government building and high risk areas are legally required to have CCTV of a high resolution and retain data for up to 30 days. In Germany, all banks are required to deploy high resolution CCTV to monitor customers, staff and financial transactions in every branch. [It will be very useful to define what is classified as "high resolution" or the minimum resolutions that are acceptable in these countries] MOBOTIX, which only sells fully-digital high resolution CCTV camera systems believes that the potential of CCTV to reduce crime won't be fulfilled unless either the government, police or even third parties such as insurers, licensing boards or trade associations insist that end users deploy a better resolution capture, coverage and video storage and retrieval. "There will be another wave of CCTV installation heading up to the Olympics, so as a nation, we have a perfect opportunity to set a CCTV standard that meets the needs of police, local government and end users to help us reduce crime and secure more prosecution off the back of CCTV evidence,"comments Lewis. Lewis believes CCTV would be able to help solve more crimes if they had higher resolutions "The technology is not the barrier and newer CCTV systems with hemispheric (360 degree) fields of view will allow end users to actually deploy fewer security cameras while maintaining better resolution and wider coverage - the problem is still trying to persuade people that CCTV can catch criminals and not just scare them away." Optimising CCTV for solving and prevention of crime Lewis offers some constructive suggestions on how to improve CCTV's effectiveness as a crime prevention and evidence gathering tool. "There are an estimated 4 million CCTV cameras in the UK but where they all are, what they record and accessibility to these video archives is mostly unknown - having a register of CCTV for use by the police would help them to quickly gather post incident evidence." The idea of CCTV built into the environment was the theme of the 200 Secured by Design' (SBD) initiative that has been adopted by parts of the building industry to promote crime prevention measures like CCTV in development design. The initiative was endorsed by the Association of Chief Police Officers (ACPO), and has the backing of the Home Office Crime Reduction Unit. However, for police gathering information after an incident, there is no easy way to locate CCTV installations in any given area. The industry also is "less than transparent" when it comes to selling CCTV in his view Most CCTV systems installed in the UK use a centralised approach. Each surveillance camera is effectively dumb with the image processing, access to footage and storage taking place at a remote location. In smaller environments, this could be a DVR simply recording everything on a 24-hour loop. In larger campuses or city centres, this is often a dedicated control room monitored 24 hours a day. Instead Lewis argues that a decentralised approach that places more intelligence into the CCTV camera would allow greater accessibility by third parties such as the police and emergency services. "With a decentralised system, private companies could allow the police to quickly add their local cameras into a centrally managed grid." In this method, if an incident occurs, the police CCTV control center could patch an instant video feed from the nearest available CCTV camera. With a decentralised approach, each CCTV camera becomes an access point on an IP network and can be shared by multiple agencies in a more cost effective approach. "This might sound a bit hi-tech, but it is technically possible," explains Lewis. To give an analogy, when the police receive a 999 call, the dispatcher is automatically informed of the location of the caller from the Caller Line Identification system which cross references a database of addresses of each of the 25 million public and private landlines installed in the UK. "A similar system where the police type in a post code and are presented with secure access to video feeds from all decentralised CCTV installations in an area would be a potentially society changing tool for fighting crime." High risk areas in France were legally required to have high resolution CCTV following London Tube bombings Considerations for realising CCTV's full security potential Lewis also believes: "All CCTV cameras should have a minimum mandated image quality with all information stored in a digital format for a minimum of 7 days that can be easily accessed by the police for evidence gathering." Many police forces around the country already have voluntary guidelines for business deploying CCTV and several have made CCTV installation a condition of alcohol or gaming licences. However this policy has successfully been challenged by landlords and upheld by Information Commissioner as potentially in conflict with the data protection act. Unfortunately, Lewis believes for any of these measures to work, there needs to be stronger backing from the government: "There is obviously a fear of creating an oppressive surveillance society but we have regulation for other areas like fire prevention, road safety, disabled access and a host of other health and safety issues - why CCTV, which has the potential to protect lives, is treated differently is a complete mystery to me." Mike LewisUK ManagerMobotix AG
Bandwidth is an important consideration for CCTV systems to reach their full potential Most surveillance systems today transmit data over IP networks. As manufacturers continue to improve the capabilities of CCTV systems, the amount of traffic traveling on a network becomes increasingly large. Bandwidth is a key consideration in managing surveillance systems and ensuring their full potential is reached. In this article, Bosch discusses the importance of bandwidth and how to estimate the amount of bandwidth needed for a particular CCTV system. What is bandwidth and why is it important? Modern-day CCTV systems increasingly use IP networks to send video from one point to another (for example, from a camera to a Video Management System typically running on a PC). IP networks are an attractive medium for transporting video because one cable can carry the video from many cameras. These networks also serve a multi-functional purpose because the same cable can carry video as well as two-way audio, alarm signals, relay signals, PTZ commands, and serial data. With Power over Ethernet, the cable can even carry power to the camera. This greatly simplifies the multitude of cables usually required. However, the network is limited by the amount of traffic it can carry - known as bandwidth, which is measured in bits per second (bps). The table below shows the three kinds of star-topology Ethernet networks in common use today. Name Also known as Bandwidth 10Base-T Standard Ethernet 10 Mbps (Megabits per second) 100Base-T Fast Ethernet 100 Mbps 1000Base-T Gigabit Ethernet 1,000 Mbps or 1 Gbps Video over IP consumes a large amount of bandwidth. As a rough guide, one camera might consume between 100 kbps and 2 Mbps - compare this to audio, which typically consumes only 80 kbps. This explains the immediate success of Voice over IP. The factors that affect bandwidth consumption are described in the table below. Factor Description Examples Video compression method Typically temporal or spatial compression MPEG-4, M-JPEG, Wavelet, and MPEG-2 Frame rate Images per second 1-30 IPS Image resolution The number of horizontal and vertical pixels QCIF, CIF, 2CIF, 4CIF (also known as full D1) Scene activity level The amount of activity in the camera's field of view Low, medium, and high Quiet time The fraction of time where there is no movement (important for temporal compression algorithms like MPEG-4 because neglibible bandwidth is consumed during quiet time) 8:00 pm - 6:00 am Monday - Friday, all day Saturday and Sunday, equates to about 50% quiet time If you run out of bandwidth on your network, you will start to experience the following: Video artefacts (e.g., blocks in MPEG and M-JPEG, and increased fuzziness in Wavelet) Frames may get dropped, making the video appear choppy The video resolution may drop from 4CIF to 2 CIF or even CIF, making the picture less clear The video may freeze entirely and lose the connection temporarily What is the relationship between bandwidth and disk storage? A single IP network cable can carry video from many surveillance cameras and also carry out multiple functions They are directly related. If video is being transmitted at a certain bit-rate across a network to be stored, then it will consume disk space at exactly the same rate. For example, a 1 Mbps video stream will use 1 Mb (Megabit) of space in one second, or about 1/8 = 0.125 Megabytes per second, which equates to 0.125 x 3,600 = 450 Megabytes per hour (about 11 GB per day or 75 GB per week). How do I know how much bandwidth I need? This is an excellent question, particularly because it is unanswerable with any certainty. As explained earlier, it depends on so many factors that you can really only estimate your bandwidth and/or rate of disk-space consumption. This initial guess is based on your experience with previous projects and it is useful - but the best way to predict your needs is to run the actual test. For example, consider planning an IP-based CCTV system for a school. How much bandwidth will the network need to carry for approximately 16 cameras, and how much disk space is required for seven days of recording? View larger image Graph showing results gained by capping the bit rate Capping the bit rate You can ‘cap' the bit rate of each IP camera or encoder so that it never uses more than that specified amount. Note that when capped, the actual bit-rate at any particular moment may be well below the ‘cap' limit. Advantage: Once you know the available disk space, you are guaranteed to get a predictable number of days of video. This is especially important for regulated environments. It is also good news for IT departments who want to know how much you are going to stress the network. Disadvantage: To not exceed the allowed bit rate, the IP camera or encoder has to do something if it finds itself over-stretched. Normally it has the option to either drop some of the frames or reduce the video resolution of the frames - but this can be an issue when the video quality you need has to be degraded under any circumstances. Unlimited bit rate View larger imageGraph showing the results of unlimited bit rate You can let the IP camera or encoder help itself to whatever bandwidth it needs. Advantage: Image quality never deteriorates. Disadvantage: Under certain conditions, the peak load on the IP network may cause problems. This "help yourself" policy also may allow disk space to be consumed faster than you anticipated, so you may not have as many days of video as you expected. Summary With conventional VCRs, it is easy to predict the amount of disk space required for a specified number of days of recording time. With DVRs and IP-based CCTV, it can also be easy to predict (by capping) - as long as you are comfortable with the possibility that the video quality may degrade under certain circumstances. If you overestimate your bit rates, you will end up paying for more storage than you need. The best way to predict your real needs is to pilot a small IP surveillance system (perhaps just one camera). Run it for a short while, then review the video and make any necessary adjustments. This is the most reliable way to get what you need and plan your infrastructure accordingly. In addition to better estimating, it is also important to remember the enormous value of Recording at the Edge, which keeps video off the network for recording. In such a scenario, the network is only used for live streaming and playback.View the Bandwidth quick reference guide Bosch Security Systems
Smart And Reliable Rail And Metro OperationsDownload
5 Ways RFID Readers Can Secure Your WorkplaceDownload
Simplified Security for Utilities & Critical InfrastructureDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload
US Housing Authority Increases Operator Productivity And Reduces Investigation With Honeywell IP-based Video Management
- Samsung DVRs Excel At JD Sports Fashion Group
- University Designs Its Own IP Video Surveillance System With Help Of IndigoVision Technology
- US Housing Authority Increases Operator Productivity And Reduces Investigation With Honeywell IP-based Video Management
- Milestone's IP Surveillance Fits The Needs Of The Port Of San Giorgio Di Nogaro