Technology & Trends - CCTV software
Too often we make the assumption that networks designed for data communication are the same as those for IP video Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance systemToo often as we continue on the transition from analogue to IP video surveillance, we make the assumption that networks designed for data communication are the same as those for IP video. In fact, they are very different. While we focus on camera, NVR an...
Think of crisis management and emergency planning as a customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it?Developing and writing a corporate or organisational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is suppos...
Access control systems that leverage proprietary technologies severely limit system flexibility Access control’s ongoing transition from closed systems to more open integration provides benefits for integrators, and especially for end users looking to maximise their system return on investment. End users want greater flexibility, specifically in terms of hardware choice. As a result, more non-proprietary solutions are coming to market. For the integrator, offering more o...
Event-driven video for surveillance and recording involves using a video recorder or video management software system that is triggered by movement in the areas where cameras are located. Event-driven video can be achieved by using intelligent motion detection or video contents analytics (VCA) on the camera, recorder or PC server. Recently, performance of VCA has improved; however, some conditions can still affect detection using the camera image. Tomo Ito, Business Development Man...
If a security or video surveillance / CCTV system isn’t working, who’s to blame? Or more to the point, what’s to blame? Is the problem the malfunction of a specific device on the edge of the IP network, or is it a network or other system failure? How can an end user or dealer / installer know what the problem is? How can a camera manufacturer know if a call to their overworked tech support department is really about the manufacturer’s camera or cau...
In the digital world, people own personal information just like they own physical assets such as cash, keys and clothes in the real world. But because personal information is intangible, its value has been overlooked by many for a very long time. With the increase in cyber crimes on personal data and the infamous Snowden affair, this issue has become more prominent. Fei Liu from Nedap Security Management Research & Development informs that to improve the transparency of data collection and p...
On April 16, 2013, snipers fired for 19 minutes on PG&E Corp.'s Metcalf electric power transmission station near San Diego, California, knocking out 17 giant transformers that supply electricity to Silicon Valley. At least 100 rounds were fired from at least one high-powered rifle. The power grid was rerouted to avoid a blackout, but it took 27 days to make repairs and get the substation back up and running. The incident got the attention of regulators and security prof...
Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from a company’s...
New security technologies have dramatically changed the security landscape over the last decade The security landscape has changed dramatically in the last decade with the introduction of numerous new security technologies to detect crime and deter criminal activity. With a long list of new tools, professionals now need to process vast amounts of information within seconds from many different security systems and then make important decisions about how to respond to an inc...
Traditionally, security systems have been designed with the cameras in mind first then with added consideration for the infrastructure and cabling components. But this is old-school analogue thinking. Milestone Systems CEO Lars Thinggaard states that a security system can be designed for more than just protecting assets by starting with specifications for digital video management software (VMS) at the core of the solution. By thinking 'digital', an IP network video system can...
Security is a top priority in schools throughout the United States. The capabilities of IP video surveillance systems, in conjunction with Video Management Software (VMS) systems, make them one of the most popular and effective security tools available. In this article, Gadi Piran, President, OnSSI defines scope and structure of IP video and its advantages in improving school security in a number of ways including: superior image quality, ease of manipulation, integration capabilit...
In China and Russia ONVIF Profile S compliance is becoming mandatory for smaller systems The familiarity and widespread use of ONVIF interfaces in the market are evidence of the success of ONVIF, which was created in 2008 by three manufacturers, Axis, Sony and Bosch. More evidence of success is a growing number of new members and compliant products. All over the world, ONVIF is being embraced – in China and Russia, as examples, ONVIF Profile S compliance is becoming mand...
The impact of the IT department on physical security has been a source of discussion for years. Generally, the influence of IT on purchasing and technology decisions related to physical security systems has been seen as increasing with no end in sight. One industry leader thinks otherwise. Pierre Racz, president, CEO and founder of Genetec, sees the clout of the IT department waning in the age of “bring you own device,” cloud services and greater intelligence at...
A new Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management. Combining inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others, the OnVu360 management platform has applications in remote business management and secur...
Video surveillance software now allows retailers to monitor a location from anywhere Beyond loss prevention, video surveillance can also boost operations and business intelligence. Gadi Piran of ONSSI details how surveillance video can be a powerful management tool for retailers which they can use to monitor and improve operational efficiencies, personnel productivity and save costs by integrating it with other important applications. Almost every retail location uses a...
The requirements of a physical security solution for a multi-building campus are quite different from those for the security of a single building. Gadi Piran, President of OnSSi, lists the immense potential and benefits of implementing an integrated security solution and the key characteristics of an effective solution. Multi-building campuses such as universities, research facilities, convention centers and hospitals face unique problems in implementing a total physical security s...
Designing a surveillance system that is accurate and cost-effective for the outdoors has been a significant challenge for the security industry. However, time-proven technologies are now available that are specifically designed to accurately detect security breaches in a wide range of outdoor environments while addressing the core issue of nuisance alarms. In this article, John Romanowich, CEO of SightLogix, lists some of the typical challenges with outdoor surveillance as well as...
End users should consider the cost of anentire surveillance system rather than the cost of a single megapixel camera There is a misconception in the security industry that megapixel cameras are more expensive than conventional surveillance cameras. However, to understand real value, it's important to focus not on the price of a single camera but on the overall surveillance system cost. Looking at the cost holistically and contrasting it with the benefits will clearly demonstra...
If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a range of different vertical markets. The advances in video management systems that include cutting-edge video analytics present a huge opp...
The usability revolution that took place several years ago on the consumer market is breaking into the field of security management. Wouter Kersteman, Interaction Designer at Nedap, explains in this article that intuitive user interfaces with attractive apps and widgets - similar to those found on modern mobile phones and tablets - are the standard of the future; usability is the latest buzzword and may even be a pre-requisite for security management systems. Rec...
New Norbain paying "compensation" to a select number of creditors Following the Administration and pre-pack sale of Norbain, it is now apparent that the new company (also called “Norbain”) has been paying “compensation” to some suppliers for the debts owed by the old company. However, it is cherry picking which suppliers it chooses to compensate – some have received a significant proportion of their debt with old Norbain, while others have...
The changes to the economic climate over the past few years have affected the construction industry as a whole, and the booming casino industry was naturally affected as well. While there are still new casinos being built, overall the scale of construction does not approach the mega-casinos that have dominated the industry for the previous twenty years. Many of the new builds today are smaller casinos with different budgets and requirements of past projects. In addition, existing c...
The intertwining of security and IT is requiring consultants to redefine their role Security consultants have traditionally operated inconspicuously while providing quality, independent advice to customers around their security requirements. However, the relentless intertwining of IT and security in the form of IP technology has required consultants to adapt, and consequently redefine their role within the space. In this article Daniel Wan, Channel Marketing Leader UK at Honey...
Understanding the complexities of the transform matrix In the concluding part of this 3-part review of the H.264 video compression standard, Kate Huber, Peter de Konink and Piet Nieuwets of Siqura discuss the transform, quantisation and entropy encoding - various block-encoding steps following motion estimation. Describing data in the transform matrix In contrast to the motion estimation step, the transform phase in the encoding process is relatively similar in H.2...
Video analytics enables security teams to take action as soon as incidents occur Video analytics can boost security efforts by automatically alerting personnel to take action when a security event occurs. Intelligent sensors never tire, can cover large distances and “see” what the eye would miss, even in absolute darkness. Based on such intelligent analytics, people can make smart decisions when actual violations happen. John Romanowich, CEO of SightLogix believes...
Migrate to a better system by adopting an all-IP video surveillance solution With declining prices for IP cameras and advancements in video compression technology such as the latest H.264 compression standard, IP video surveillance is increasingly becoming the preferred security solution. The convergence of voice, video and data in the world of surveillance has truly arrived, a fact amply highlighted by the projected growth of the network video market to over $2.6...
Image quality of objects in motion is greater with H.264 technology In the first part of this three part series, the authors described the H.264 video compression standard including its history. In part two, the authors discuss motion estimation, the phase during which H.264 really distinguishes itself from other MPEG standards. Differentiating from other MPEG standards: Adapting raster block sizes for more detailed images H.264 distinguishes itself from the other MPEG s...
Taking time to evaluate some do's and don'ts before buying an IP network camera IP network-based surveillance cameras offer enticing possibilities. However, you need to evaluate several factors before deciding on the type of IP camera installation you'd like to go for. For example, do you want full or partial IP? How much bandwidth? Simon Nash, Senior Marketing Manager at Sony Europe explains the entire process. Transition to IP surveillance Network cameras f...
H.264 has become the compression standard of choice in the security industry The rising popularity of the H.264 video compression standard has established H.264 as ‘the buzzword' within the video surveillance industry. With all this talk of the possible enhancements brought to the fore by H.264, Kate Huber, Peter de konik and Piet Nieuwets of Optelecom-NKF present the true benefits and shortcomings of this popular standard in the first of a three-part review.H.264...
Environmental implications are important considerations in surveillance system designs Rising energy costs are compelling many organisations to optimise their computing environments. In fact, energy costs have quickly become the fastest growing operating cost, propelling many corporations to embark on new conservation and "green" initiatives. Marc Holtenhoff, CEO of Aimetis, explores ways to reduce energy consumption within video surveillance applications, that could pave the...
Browse expert commentaries
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
Delta Scientific DCS8000 Bi-Fold Speed Gate
ASSA ABLOY Aperio H100 Wireless Access Control Handle
NordLayer: Comprehensive Network Security for Modern Workforce
A modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadSecurity practices for hotels
Download2025 Trends in video surveillance
DownloadMaximising security and performance
Download