Technology & Trends - IP cameras

Advanced threat detection: How video analytics is evolving to meet the need for speed

In the digital age, speed has never been more critical. Customers expect an instant response to a query. Executives expect sales data on their tablets in front of them in real-time. A site manager at an oil refinery needs an instant alert about a defective valve. An IT manager expects to know about a phishing email before it hits his employees’ inboxes. The 'need for speed' is impacting the physical security sector too. Customers increasingly expect their security systems to identify and...

Download: Safeguarding food production with video surveillance

When we contemplate where and how our food is made, cleanliness and hygiene are typically at the top of the list of necessities. And when it comes to production facilities, strict regulations and sanitation requirements are in place to ensure that the highest levels of food safety are met.  This white paper by Oncam explores the different aspects of food safety and defence in the production, manufacturing and catering environments. It also offers practical guidance to the types of food cer...

Five emerging terrorism trends security professionals must anticipate

What drives terrorism? It's a question asked by governments, individuals, militaries and businesses. Terrorist tactics and tradecraft constantly evolve to respond to external forces that enable, constrain and otherwise shape them. Tracking the influential forces that shape terrorism is crucial to understanding how attacks are conducted and placing an attack in context. But most importantly, understanding the drivers of terrorism helps security professionals anticipate terrorism trends so they...

Cyber security myths and how they are damaging your business

There has been a significant shift in the methodology used by cyber criminals over the past couple of years, in particular. Whilst traditional ‘hacking’ and malware are still prevalent, there has been a boom in other types of attack, in particular Ransomware and Social Engineering. So, why has this happened? Most profitable types of cyber attack There is an old saying, “follow the money”, and nowhere is this more pertinent when considering cyber-crimes against UK busine...

Drone terror: How to protect facilities and people

The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirel...

How IT will help you exceed your video surveillance goals

If I asked you today how your video surveillance environment has changed over the past few years, how would you respond? I bet the answer could include the following options: An increase in the number of cameras The addition of more advanced technologies such as high-definition video, video analytics, 360-degree video devices, cloud-based services and more IT innovations. Demand for more video data to drive business, IT and security initiatives. Modern video surveillance The modernisati...

Checklist to protect empty schools from arson, theft and vandalism

After a lot of studying and getting ready for what seems like an endless stream of exams, teachers and students alike will enjoy having some much-needed time off — whether it’s just for a weekend, a break during the school year or the long summer holidays. Schools that are left empty for a sustained amount of time obviously increases the risk of arson attacks, thefts and vandalism. Staff members at an establishment should therefore work through this checklist before they leave the c...

Video surveillance storage solutions: The good, the bad and the ugly

When a news story of global interest begins to break, reporters across the world will scramble to find CCTV footage of the event, however isolated the incident may seem. Given the average of one camera installed for every twenty-nine people on the planet, it is perhaps unsurprising how often a persistent journalist, investigator or member of the public will actually be able to uncover footage. In fact, this number is estimated to be as high as one camera for every eleven people in mature market...

Six advantages of an effective PSIM solution

PSIMs have had a bad rap in the pro security industry for a multitude of reasons; ranging from suppliers overpromising on integration and control capabilities to complexity of implementation and use. However, there is a silver lining to this story. Today, advanced PSIM solutions are being successfully deployed in commercial applications with the ability to integrate previously disparate professional access, video, notification, building operations and more onto a unified control and management...

Four ways the cloud improves your cyber security posture

Adoption of the cloud is not slowing down. In fact, what’s happening is quite the opposite. According to IDC, worldwide spending on cloud computing is expected to reach $162 billion USD in 2020, growing at a compound annual rate of 19%. This isn’t surprising when you consider that more organisations are looking outside their own environment for solutions that will help them become more agile, maximise resources and save money. Yet, while this study and countless others show that mo...

How to use video analytics and metadata to prevent terrorist attacks

Today ‘terrorism’ has become a word we use and hear every day. The goal of terrorism is a media product - information delivered to nearly every house in the world. So, the weapon of terrorism is information. Therefore, the way we defend and prevent terrorism must also be based on intelligent processing of information - and an early awareness of potential threats and effective preventive action may eliminate most attacks. Video analytics, automated surveillance and AI decision-making...

Are your surveillance monitors prepared for the latest video technology developments?

Everybody has been hooked on the discussions about Analogue HD or IP systems, but shouldn’t we really be thinking about WiFi and 5G connectivity, removing the need for expensive cabling? Are wireless networks secure enough? What is the potential range? Even the basic question about whether or not the network is capable of transferring the huge (and growing) amount of data required for High Res Video, which will soon be quadrupled with the advent of 4K and higher resolutions. The future o...

Six best practices of sales management in the security industry

A childhood friend of mine has made a nice career in coaching college football. As with most coaching careers, he’s had to make several moves over the years. He was the Linebackers Coach at a national powerhouse FBS school for a few years before getting promoted to Special Teams Coordinator. From there, he moved into a Defensive Coordinator at another FBS school. Not a national powerhouse, but he was the D.C. – a huge promotion. Although I’ve kept up with his progress, and have...

Critical Network of Things: Why you must rethink your IoT security strategy

In a world where hacking and denial of service are everyday threats, many feel that it is about time for the world of the Internet of Things (IoT) to undergo a reality check over its strategy and promotion before disaster strikes, reputations are lost and investors pull up stakes and run for the hills.   What is new about IoT? Having made, lost and then re-made my fortune in and around the industry over the past 20-plus years, I cannot help but smile over the level of hype — an...

The future of healthcare security: Violence response and emergency preparedness

There have been many changes in the healthcare environment over the past decade. The Affordable Care Act has been established, severe weather events are on the rise, violence along with active shootings continue to increase, behavioural health patients present treatment challenges and hospitals continue to consolidate to increase purchasing and service capabilities. Over the next decade, healthcare will continue to transform. Emphasis will be on financial reform, violence response, emergency pre...

How growing data sources are changing the surveillance industry

To say the surveillance industry has changed over the last quarter of a century is an understatement. From high-definition cameras and TVs to high flying drones and video analytics – the surveillance industry has shifted in ways we never expected to see in such a short space of time. What’s more, with such advancements in both quality and choice that’s now available in the market, it’s no wonder that revenue in the video surveillance market is set to double to $75.64 bill...

How intelligent IP cameras enhance predictive analytics

For many years, video analytics have enabled end users to detect specific people or vehicles entering restricted areas, capture license plate information, scan crowds for specific individuals and much more. Today’s Video Management Systems (VMS) and IP cameras are built with powerful processing capabilities, helping to drive the development of more advanced analytics to more accurately detect abnormalities in behaviors that trigger alerts – an important component of predictive analys...

Download: Innovative edge storage solutions for the video surveillance industry

Edge storage technology - the recording of video and storing it at the camera or on a directly attached storage device instead of in a centralised recording facility across the network - is quickly gaining acceptance and is being more broadly adopted into IP video surveillance applications. The use of edge storage in an IP camera enables video surveillance solution developers more flexibility and cost benefits in system design. By leveraging local microSD card-based storage, system integrators...

Home security systems: Why you need to upgrade from 3G to 4G LTE technology

“Netflix,” “twerk” and “selfie” were added to the dictionary. Boston Marathon bombing. Activist Nelson Mandela and actor Paul Walker died. Edward Snowden gave NSA classified documents to Wikilinks. These events may seem like they happened only yesterday, but they are some of the top news headlines from four years ago. Four years can feel like a very short time, and in four short years, every security panel installed by dealers to date will go dark. The curren...

From counter-terror to retail: Gaining actionable data from video surveillance

Nowadays, there is a lot of hype around data and its utility for almost any industry – from security and law enforcement to business operations and retail. While we are inundated with information about data and its significance to business success, technological development and fulfilling the promise of the Internet of Things, we don’t always get practical feedback as to how to obtain this valuable data from the resources available to us. Security teams feel this challenge acutely....

How the cloud reduces physical security system costs

The corporate mantra “Utilise TCO instead of purchase price when making purchasing decisions” means evaluating a project’s Total-Cost-of-Ownership over its lifetime period as the primary cost factor. It requires the corporate buyer to scrutinise the entirety of the investment as opposed to just the upfront purchase price. Like an iceberg, where the majority of the ice is below the surface, the total cost of ownership of a security system is typically much larger than the upfro...

Robot revolution: Uncovering the real value of security robots

Robots have been in the spotlight lately, as tycoons like Elon Musk discuss the perils of automation and artificial intelligence (AI), and roving robots meet their watery demise. These recent events have unmasked a particularly interesting topic: The value of robots in the broader sense, especially as a security tool. The emergence of robotics, automation and AI is not new, but the ongoing discussion about how best to use these continues to fuel critics and supporters alike. Seattle-Tacoma Inte...

2020 Vision: Guide to protecting schools from the threat of terrorism

It seems schools still need to be alert when it comes to the risk of terrorism. Following a recent security threat, Bury College has set an example that schools across the UK need to be aware of the threat of terrorism. As reported by the Manchester Evening News, the incident at the Great Manchester college saw the facility being put in lockdown as a precaution before an evacuation took place. Hundreds of staff and students were caught up in the event. Bury College released a statement followin...

How to get bottom-line business benefits with video surveillance data

With 60 percent of all of the world’s data expected to be created and managed by enterprises by 2025 according to IDC, it’s not surprising to learn that enterprise players have moved swiftly to help their customers and organisations maximise the opportunity around this massive data growth. However, when it comes to one of the most significant drivers of this growth in information—surveillance data— many enterprises struggle to understand how they can apply it to do more...

How to enhance IoT applications with network video surveillance

Remember the old adage “The whole is greater than the sum of its parts?” Nowhere is that truism more evident than when you add network video to the current generation of Internet of Things (IoT) solutions. Whether we’re talking about industrial IoT applications, “Smart – X” (city, building, parking etc.) or retail operations, integrating network video into the solution provides value far beyond simple situational awareness. Optimising sophisticated video tec...

Detecting workplace violence with sound detection and audio analytics

Workplace violence has been on the rise in mental health facilities, schools, and detention centres across the country. According to the Occupational Safety and Health Administration (OSHA), “Nearly 2 million American workers report having been victims of workplace violence each year.” As such, security directors are looking for technologies to help identify and mitigate these incidents.  Increasing use of vocal aggression detection technology  Shift from video surveill...

Factors to consider when choosing a video storage system

What do users want from their surveillance system? Ask any security professional, and you will hear answers like these: sharp, high quality images; widespread camera coverage; real-time analytics; fast search and retrieval of video footage with minimal, if any, intervention from people in the information technology department. In other words, they want the tools they need to do their job. Delivering those tools requires an underlying technology infrastructure that includes a storage file system...

Download: Five things to consider before moving your surveillance video to the cloud

  Video surveillance systems have some unique requirements that set them apart from other types of enterprise applications.   Determining where and how the cloud can support these systems depends on a set of five primary requirements: bandwidth, storage, cost, security and accessibility. This March Networks white paper outlines some of the key considerations mid- and large-sized enterprises need to examine before deciding to move their video surveillance systems into the cloud...

Avoid damaging network breaches with reevaluated cybersecurity

In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer...

Mobile communications make the public an additional sensor on the field

Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?