CCTV cameras News

ONVIF looks ahead following a year of growing impact for the open industry forum

ONVIF will be eight years old in the next several weeks. It has been interesting to watch the open industry forum’s impact on physical security since it began in 2008 with a goal to develop a global standard for the interface of IP-based physical security products. ONVIF’s influence has accelerated just in the last year, with the number of ONVIF-conformant products in the market growing from about 5,000 a year ago to more than 7,000 today – more than a 40 percent increase. ON...

[Download] Visitor Management: A Guide to Selecting and Employing a New Solution

Visitor management refers to the methods organisations use to admit and track visitors to their facilities. The concept is not new. Many facilities use some form of visitor management, ranging from simple sign-in sheets to high-tech approaches that scan government IDs to capture relevant data. But visitor management is more than a sheet of paper or a technology. It is also a policy that governs the how, why, and who of visitors. Increased security driving VMS upgra...

Download: Emerging trends in panoramic cameras

Panoramic cameras enable an operator to assess a wide field of view at a glance and to zoom in to view additional detail as needed. Providing this capability are a single camera, a single mounting location, and often using a single cable. Complete 180-degree or 360-degree coverage brings total situational awareness of the area being viewed. Panoramic cameras can also enable you to record everything in the field of view, all the time, and to zoom in for detail, wheth...

How many megapixels are enough in video surveillance?

Higher pixel count is better. It’s a basic tenet of the video surveillance market, or at least it is the implication as manufacturers continue to tout their latest products offering ever-higher pixel counts. But the reality is more nuanced, as our Expert Panel Roundtable panelists explain this week. Pixel count shouldn’t be seen as an end unto itself, but rather as a factor in determining what camera is applicable to which application. Pixel count is just one factor of several to con...

Designing an IP/PoE network infrastructure: Factors to consider

If one component within the infrastructure changes, other components may need to be changed too Developing a bill of materials for an infrastructure is not difficult if you have the right information. One word of caution: Infrastructures are unique. Each is individual, so don’t depend on drop-down menus; it simply will not work. If one component within the infrastructure changes, take the time to check and see if the rest of the components need to be changed, too. Let&...

Cloud-based surveillance spearheads growth in security as a service

The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...

Why Hikvision is suddenly front-page news: The company responds to security concerns

Hikvision has been in the news in the United Kingdom recently, including a front page news story in The Times. SourceSecurity.com offered Keen Yao, Vice President at Hikvision’s International Business Centre, a chance to set the record straight regarding concerns expressed about hacking of cameras, the company’s ties to the Chinese state, and its role as the biggest video surveillance equipment manufacturer in the world. Hikvision has come a long way in the past few ye...

Who should be ‘In the Room’ when deciding to buy security systems?

We in the physical security market tend to watch closely how the buying decision is made. If anything, the buying process has become more complex in recent years. We have seen the impact of security systems extending beyond the core security department, and with greater impact come more stakeholders. “Buying by committee” is more the rule than the exception, and the committee is getting rather large in some situations. We asked this week’s Expert Panel Roundtable: Who should be...

When does it make sense to share video from a private system?

More cameras today are providing more video than ever, but how much of the video is available when and how it is needed? The question often comes up when law enforcement entities are seeking to access video from private systems to help solve a crime. There are many more private video systems than public systems, but is the video available when needed? And what about privacy: In what situations is it acceptable to share private video for the public good? We took these questions to this week&rsquo...

How to disrupt your organisation and your industry

If you want to cultivate new ideas among your employees, it is important to let them know that they are allowed to challenge the status quo The Americans asked for horses – Henry Ford gave them cars. In the beginning of the 20th century, he disrupted the transportation industry. He created a new market outmatching established leading companies, products and alliances. And he got the idea himself. Many of us want to disrupt our industries with new innovations that...

Choosing the right cable for networking infrastructure

The use of multiple wires has advantages for network transmission Network connection to a remote device begins by considering the type of cable. In some cases, installed cable may already be present and available for reuse, or you may have the option to install a new cable. Let’s review the major types of cable used for most security applications, their advantages and disadvantages. Types of cables In general, there are four major types of cable. First is coaxial cab...

Should marketers seek to leverage violent incidents?

When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate...

Advantages of integrating audio monitoring and sound detection in school security solutions

Deploying audio solutions would flag incidents not caught on camera With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the inefficient security measures on campuses by either upgrading their current systems or installing state-of-the-art technologies to enhance situational awareness. Traditionally, security personnel have relied on video as the primary method of monitoring. However, this...

Download: Modern tools to achieve excellence in video security

Better-performing video systems provide better security. Today’s end users demand systems with optimum performance, providing smooth video streams, higher resolutions, efficient storage, better analysis and quick access to stored images. Here are several technologies driving greater video surveillance capabilities: Innovations in image processing to boost system performance Higher resolutions are a challenge for video management systems, but new tools are mee...

Clarifying evidentiary procedures for digital video admissibility

48% of U.S. judges say they are not adequately prepared to deal with the range of “scientific or technical evidence” presented in court Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and enterprise IT markets. This has created a steep learning curve for law enforcement as well as individuals in the judicial system. A 2012 survey titled “A national survey of ju...

Deep learning technology applications for video surveillance

The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...

Video intelligence broadens with actionable intelligence from social media and other data

For more than a decade, Verint Systems, Melville, New York, has been developing and redefining the phrase the company pioneered: actionable intelligence. Today, its real-world specifications provide an in-depth analysis of video and integrated physical security data, deepening the gathering of intelligence and lessening risk at the protected premises. The entire realm of situational awareness continues to transition as intelligence is gleaned from new points, with this trend only...

How can IP networked systems adapt to lost connectivity?

IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/...

Future of mobile security hardware for enhanced situational decision making

In our world we make mobile security equipment for surveillance on-the-go in moving vehicles There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment for surveillance on-the-go in moving vehicles. To make it work it takes a village of components vendors to bring it all together into a system that will keep civilians safer in the future. Possibly to the point of preventing an event fro...

ASIS 2016 Day 2 highlights: New product releases, technology innovations & data

The ASIS show has not traditionally been a big forum for new product introductions -- those happen mostly at ISC West in the spring. Even so, there is plenty of technology to see at this year's show, and many exhibitors now say the products they were talking about last spring are now ready to ship. On Day Two of the show, it seems a lot of the attendees are ready, too. Video camera technology The technologies of video cameras march on, and Hanwha Techwin America has embraced the new H.265 cod...

Robot guards provide security intelligence in Silicon Valley

Part 6 of our Robots in Security series Later this year Universal Protection Service will begin offering a new autonomous robot to customers in California The next security guard you see may look more like R2D2 than Paul Blart, Mall Cop. Robots are starting to make their way into the offerings of security companies, and they may give guards a whole new image. Later this year Universal Protection Service — a division of Universal Services of America — wil...

Has the Closed Circuit Video industry become overly technical?

We will examine the question of the increasing technicality of the closed circuit video industry from three perspectives; The Manufacturer, the Specifier, and the Integrator.   History of Closed Circuit Video industry  Before we begin examining this subject, let's take a look briefly at the history of the Closed Circuit Video Industry. 1920s: Tubes were invented (Cathode, Image Dissector, Iconoscope) 1940s: CCTV first introduced to monitor rocket launches 1970s: The...

NVR vs. VMS: Support, scalability and usability of video storage systems

One obvious benefit of an NVR appliance compared to software VMS system is ease of configuration and installation A quality networked video recorder (NVR) and software-based video management system (VMS) both do an excellent job of safeguarding valuable video data. But there are a number of pros and cons for both, along with specific applications that will do better with one option over the other. These can easily be broken down into five topics: ease of setup/install, suppor...

HD surveillance: Secrets to producing the best possible image quality

Many end-users shell out the cash to acquire the newest high-end devices, plug in, and expect to be wowed A well-developed surveillance system can give a single security guard the power to see what otherwise might take a hundred pairs of eyes to see. But what happens when all the components are all connected and powered up, and the resulting image on the screen is, well, indiscernible, or, at the very least, terribly pixelated? Many end-users shell out the cash to acquire the...

Top strategies for security sales representatives to boost customer engagement

  Winning full engagement from your prospects is tougher today than ever before thanks to the Internet   For months, maybe years, you’ve worked to secure an appointment with a prospective customer.  You’ve utilised your network, and shown persistence. You’ve consulted with your boss, brainstormed with your peers, and even asked for advice from your friends. You’ve given it every ounce of energy you have, and finally… finally, the...

Physical security systems enable compliance to HIPAA and other privacy laws

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions.   The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Inter...

What is the biggest mistake customers make when buying and installing security systems?

Sometimes you see it coming and want to scream out: “Don’t do that.” We all make mistakes, but it’s hard to sit and watch others as they go down the wrong path. It’s especially difficult when the errant party is a customer, and when their wrong move might somehow end up reflecting badly on you as a technology or security systems provider. Much better to anticipate the problem by expecting the possible mistake before it happens. We asked this week’s Expert Pane...

IT & access control collaboration leads to functional, personnel and financial benefits

IT access control offers significant cost savings per unit or door as less hardware is required to cover a large area Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software and video surveillance capabilities that better protect businesses and enterprise applications. But nowhere is the integration space more progressive in scope than the collaboration between the IT department and...

How is the role of distributors changing in the security market?

Distributors have traditionally played an important role in the physical security market, ensuring ready availability of products that systems integrators need to complete their projects. But a changing industry has had dramatic impact all along the supply chain of which distributors are a critical link. We asked this week’s Expert Panel Roundtable: How is the role of distributors changing in the market, and what is the impact?

Smart home products help security companies engage customers

Dennis Sage Home Entertainment, Phoenix, is a best-in-breed audiovisual contracting services firm that gradually began expanding its offerings to security several years ago. After testing the waters, hiring experienced technicians and learning about the parallels with its current business, the company made a successful transition. Now, Dennis Sage, President and Chief Executive Officer (CEO), is also counting on heightened customer engagement and stickier clients as he moves into the role of t...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE

Quick poll
Which feature is most important in a video surveillance system?