CCTV cameras News

Orlando mass shooting tragedy to drive new conversations about security

A mass shooting tragedy over the weekend in a nightclub in Orlando, Florida.  – 50 dead and 53 wounded –highlights the random nature of violence even as it points to a number of issues for discussion in the security community. Early Sunday morning, Omar Mateen entered the Pulse nightclub in Orlando and opened fire with an assault rifle and a pistol. Three hours later, during which the 29-year-old Mateen held hostages and called 911 to declare his allegiance to the Islamic State...

Nextchip disrupts analogue surveillance market with HD technology amidst growing IP trend

The growing sales of IP-based solutions in the surveillance market is a well-discussed topic. Security companies are rushing to grab a slice of this lucrative pie. However, at the same time, analogue surveillance systems have continued to retain their appeal for many end users. Aware of this demand, some companies have continued to develop technology for analogue solutions despite the IP trend. One company driving this force is Nextchip, the company behind AHD™. Up until rec...

Security at UEFA Euro 2016: Numbers reflect robust level of protection in France

  Numbers tell the story of security at the Euro 2016 football tournament which begins on 10th June in France. Here are some of the figures that reflect the robust level of protection and security in place across the country: 90,000 The total count of police, soldiers and private security agents who will be deployed throughout France to ensure the safety of the tournament. 77,000 How many police, gendarmes, and riot-control officers will be deployed. 13,000 The num...

A brief history of ONVIF: How the global industry standard has grown

ONVIF's 1.0 Core Specification debuted in 2008 at Security Essen The adoption of the ONVIF protocol by manufacturers continues to grow. Last year, the number of member companies in the ONVIF forum exceeded 500 and more than 5,000 products are currently certified on the ONVIF website. How did ONVIF achieve this amazing result and experience this wild adoption? More than a decade ago, every manufacturer was defining their own protocols and pushing for Video Management Software...

Positive signs point to new systems and applications for video analytics

Multiple trends point to a maturing video analytics market that is poised to meet or even exceed customer expectations Systems that use video analytics, also known as video content analysis, have a chequered history in the security market. Since the technology was introduced amid much fanfare a dozen or more years ago, opinions about video analytics have sometimes been undermined by systems that did not live up to the initial hype. In fact, early failures continue to taint per...

End-to-end solutions are a dead end: The road to the future is OPEN

The landscape for end-to-end solutions is not designed to address thelong-term evolving needs of customers The video surveillance industry has reached an important crossroads where manufacturers can choose to continue in one direction that solely focuses on their own products and profits, or to move forward in another direction that emphasises building partnerships for the greater good of the community. On one side lies the short road of end-to-end, proprietary solutions fro...

Does enhanced H.264 compression remain the best encoding for video surveillance?

The integration of H.265 technology may be hindered by the availability of optimised H.264 best encoding for surveillance systems Video compression technology has been a crucial element in surveillance system design since the advent of Internet Protocol (IP) in the 1990s. Since that time, standards for video encoding have been explored in various capacities. Currently, the industry is all abuzz around H.265 High Efficiency Video Coding – the next iteration beyond H.264,...

How can security integrators/installers stand out in the market?

It’s a challenging time for security integrators and installers. Equipment prices are going down (along with margins), and commoditisation is wiping away what used to be the advantage of exclusively offering a top product brand. Integrators can continue to succeed by finding a way to move ahead of the pack – but how? We asked this week’s Expert Panel Roundtable: How should integrators/installers differentiate themselves or make themselves stand out in today’s market?

Beyond basic upgrades – Phusion technology combines visible and thermal cameras to deliver detailed CCTV images

Research at the University of East Anglia in Norwich, England, is developing a technology that can provide clearer, more defined camera images by fusing RGB (red-green-blue) images with thermal imaging. Phusion is being developed by Spectral Edge, an IP licensing company spun out of the university’s Colour Lab and based in Cambridge. Phusion for security cameras The technology has the potential to deliver more detailed images than are usually available from conventional sec...

New capabilities to drone technology reflect expanding range of commercial security applications

Drones can satisfy five commercial needs, today: surveillance, patrolling,incident response, mapping and site assessment The military uses drones. So do the police. Drones serve as weapons and surveillance tools.Today, businesses and institutions are applying drone technology to a variety of private security surveillance challenges. Private uses include patrolling facilities and installations such as pipelines from the sky. To be sure, private contractors sometimes weaponise d...

Lost for words? Automated lip reading technology deciphers speech in silent CCTV images

Automated CCTV lip reading is challenging due to low frame rates and smallimages, but the University of East Anglia is pushing the next stage of this technology Scientists at the University of East Anglia in Norwich, England, are working on the next stage of automated lip reading technology that could be used for deciphering speech from video surveillance footage. The visual speech recognition technology, created by Dr. Helen Bear and Professor Richard Harvey of UEA’s S...

HD CCTV: A new perspective on the future of analogue surveillance

With innovation continuing in HD CCTV, analogue video surveillancemay be around for some time What’s your stance on the analogue-to-IP video migration? When will it happen? Will analogue go away entirely? Talk to any security company and they’ll admit they love the simplicity of the installation and setup of analogue cameras. They know how to deploy it quickly, saving labour costs and also, can use the familiar and ever-present coaxial cabling network. That’s...

Do’s and Don’ts of managing legacy systems – Migration better than rip-and-replace for enhancing security control system functionality

Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also li...

Iluminar advocates use of separate illuminators for better video image clarity and video analytics

Today’s video cameras are better than ever, now able to capture images despite low light and other impediments. But do the images always provide enough clarity for security applications and/or for video analytics? The ability to capture an image in a variety of environments isn’t the same as capturing the best possible image, says Eddie Reynolds, President and CEO of Iluminar Inc., a provider of LED white light and infrared illuminators to the video surveillance market. Better came...

How can smart camera features address concerns about privacy?

Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution....

Pelco by Schneider Electric CEO Sharad Shekhar to revive Pelco global video security business

Joining Pelco in late 2015, Sharad Shekhar is responsible for the entire global video business and is leading the charge to reinvigorate the Pelco brand with system integrators Back in the day, you literally couldn’t speak with a security company about a video surveillance project without the Pelco name coming up. It had a loyal following and an extremely large installation base. Over the years, that changed and the fervour with which integrators referred to the brand se...

Surveillance industry’s higher-megapixel migration impacts processing power, bandwidth consumption and storage

From a network performance perspective, adding higher megapixel camerasaffects bandwidth utilisation The quest for higher megapixel, high-definition and high-resolution video imaging continues, only now, it has become a marathon of sorts. That’s because the migration will progress decidedly – extending into the foreseeable future and beyond – as technology advances and becomes increasingly affordable. Ultra-high-resolution video is finding its niche, even am...

How well is Brazil prepared for security challenges marching ahead of Rio Olympics 2016?

The largest global event of 2016 – and the year’s biggest security challenge – will no doubt be the Games of the XXXI Olympiad in Rio de Janeiro, Brazil. Around 15,000 athletes from 206 countries are expected to compete at the Olympic games, August 5-21, 2016, and about 7.5 million tickets will be issued. In our age of terrorism, organisers of any event on the scale of the Rio Olympics must consider the possibility of an attack or other security breach during the more than two...

What security applications are best suited to smartphone apps?

How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to...

How adopting wireless surveillance solutions improves finance and flexibility

Wireless surveillance systems are attractive to customersas they are cost-effective and easy to install Various studies, market statistics and forecasts project growth for the surveillance market from 2016 to 2020. Besides needs ranging from traditional analogue cameras to IP network cameras, more and more consumers also have a high interest in intelligent surveillance systems. Along with safety, these systems provide additional details for users in applications such as p...

Benefits and challenges of omnidirectional cameras in video surveillance market

As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...

Misguided trust leads to increase in security risks and potential attack from intruders

Stringent security policies are necessary in an organisation to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...

How can security integrators replace revenue in the age of commoditisation?

As more security equipment categories become commoditised, a previously rich source of income for integrators and installers – markup – is becoming harder to come by. Less expensive products with little to no perceptible value differentiation leave integrators with few options, not to mention the growth of pricing transparency that comes courtesy of the Internet. We asked this week’s Expert Panel Roundtable: Given the increase in commoditised hardware (i.e., lower profit margin...

CCTV budget cuts reduce video surveillance expenditures and camera counts across the UK, except in London

Nationally from 2012 - 2015, there has been a decrease in the money spent on theinstallation, monitoring and maintenance of CCTV compared to the period 2009-2012 The UK has often been referred to as the world’s most watched country in terms of the scale of CCTV surveillance. But a new report claims that UK local authorities have reduced spending on the installation, maintenance and monitoring of public space CCTV systems, while the number of cameras being used is also do...

Developing innovative aviation security technologies to prevent future terrorist attacks

What effect will the attacks in Brussels have on aviation security? Screenings inpre-security airport areas have been uncommon, but may become standard practice Will the Brussels airport attack herald a new era of aviation security? Like the bombing of Moscow’s Domodedovo Airport in 2011, the Brussels attack took place “landside”, meaning that security precautions would have been low-key and limited to spot checks and the general watchfulness of police office...

What is an open system? Interoperability rises as a security trend, but lacks an exact definition

Recently at a conference, one of my media colleagues asked an interesting, and basic, question: What exactly is an open system? Many of us think we know what an open system is, but the ensuing discussion provided several different answers, many of them centred on what an open system is NOT (rather than what it is). An open system does not limit a customer’s options. An open system provides maximum flexibility as a system evolves over time. In other words, an open system doesn’t lo...

ISE emphasise need for improved hospital security programme to avoid attacks on specific targets

ISE’s research shows that healthcare facilities & hospitals security programmesto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security programme can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see...

How successful was ISC West 2016 for security industry exhibitors and visitors?

The security market in the United States has been in a collective state of exhilaration since ISC West. The (possibly) unprecedented success of the big trade show has left us all feeling optimistic about the year ahead. Members of our Expert Panel Roundtable are joining the chorus of compliments for the show as they answer this week’s question: How successful was ISC West 2016? Did it meet your expectations?

The best ISC West ever? Setting the stage for upbeat security market in 2016

No doubt about it: ISC West 2016 was a hit. Every comment I heard during the show (and since) has highlighted how busy the show was. There was plenty of booth traffic, even on the (traditionally slow) final day of the show. Some say it was the best ISC West in the last several years. Others say it was the best show ever. Quite a contrast to some other recent industry shows, plagued by meagre traffic and complaining exhibitors. Instead, there were people everywhere at ISC West, asking questio...

ISC West day 2 sees mobile credentials, IoT and analogue HD cameras grab attention

Coming into ISC West, many in the industry had expected a renewed push toward use of mobile credentials (contained on smartphones, for example) instead of cards for access control. HID Global didn’t disappoint. A highlight of the second day of the show was a press conference in which HID Global announced new elements of its initiative to lead the industry into use of mobile credentials. Uses of smart phone credentials for identity management HID already provides SEOS mobile credentials,...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE