CCTV cameras News

Video surveillance market shines in 2015 with integrated systems, IP security and 4K resolutions

Video surveillance technology continues to evolve at a strong pace with improvements in resolution, integration, intelligence and bandwidth utilisation – all of which contribute to better overall security and cost-efficiency. As the video surveillance category continues to grow, we spoke with Jeff Whitney, Arecont Vision’s Vice President of Marketing, about some of the factors driving the market.   Maturity of integrated systems There continues to be a great deal...

2015 sees rise of drone detection systems and the convergence of physical and cyber security

Physical and cyber security convergence, perimeter intrusion detection systems and fibre optic-based sensors were some of the security trends that picked up pace in 2015 and will continue to grow in the coming year as well. The beginning of 2015 started out slowly as the implementation of security projects by a number of organisations was postponed for various reasons. Mid-year picked up momentum, and the year is ending on a strong note. A significant trend was the gradual progression of conve...

Security market consolidation trending for 2015; cloud, IoT and home automation set to grow further in 2016

2015 was a year of consolidations: The spring of 2015 recorded the highest acquisition rate for a six-month period in 10 years. There were single-digit market growth rates reported in video surveillance due to price erosion affecting revenues. Video solution providers are expanding into access control, and both are slowly but steadily moving into the cloud. Users want the efficiency benefits of converging access control with video verification and unified operation. There are more cloud offering...

How does the consumer market affect end users' expectations of security system features?

The connected workplace, increase in “bring you own device” environments and even the rise in telecommuting have served to blur the lines between an employee’s private life and his employment. The idea of an executive’s obsessive need to check his Blackberry while on vacation has crept into the popular culture and is now a familiar cliché that is as old as, well, Blackberries. The blurring of lines has also created a blurring of expectations. Now employees expect t...

Security industry in 2016 to see higher megapixel cameras, IT security strengthening and adoption of new technologies

The year 2015 has been notable in several ways. Industry changes include a rise in Chinese manufacturers in the mid- to low-end market, more mobile devices providing video surveillance, and the rise of omnidirectional and higher-megapixel cameras. Unexpectedly, the industry also saw an increase in popularity of do-it-yourself security systems and the speed with which Chinese companies saturated the marketplace with “good enough” products. Omni-directional cameras Oncam welcomes th...

Aftermath of the Paris attacks highlights required tradeoff of privacy in counter-terrorism

Second guessing is to be expected in the wake of terrorist attacks like the recent tragedy in Paris. After such attacks, security and intelligence professionals are prone to soul-searching – and to speaking out on the public airwaves –to address important questions: Could we have prevented it? What should we have done?  There tend to be two categories of second-guessing. The first centres on the idea that the intelligence community should have known about the planned attack and...

Cloud and mobile credential offerings to overtake market for card-based identity systems in 2016

Throughout 2015 the security industry saw the appearance of numerous mobile credential offerings, signalling the “beginning of the end” of card-based identity, and strengthening of mobile offerings in general. Overall, the security industry enjoyed healthy growth throughout 2015, as reflected in the better-than-index performance of most publicly traded security company stocks.  Cloud companies, in particular, saw the market turning their way, as a number of security vendors ha...

2016 promises more widespread video analytics and easier installation for the security industry

As 2015 comes to a close, it’s a good time to look back at how our industry has changed this year and what we can expect for 2016. Specifically in the area of video surveillance, the trend toward higher resolutions continued this year. Whereas a few years ago, 720p was the most popular resolution for HD cameras, 1080p has now become the standard choice, and even higher resolutions, such as 4K ultra HD cameras, are seeing increased sales. Integrators are also using a broader mix of cameras...

Implementing security market technologies to help highway authorities deal with wrong-way drivers

Technology can safeguard other motorists, and help highway authorities to communicate with wayward drivers to avoid accidents There has been a spate of accidents worldwide in which cars have been driven either knowingly or unwittingly against the flow of traffic and into oncoming vehicles. Existing and imminent technology from the security sector can prevent such occurrences, alerting responsive drivers to their error and safeguarding other motorists. I write this shortly af...

Risk based security solutions – a holistic and balanced approach to security management

Risk, in a security context, is the product of threat, vulnerability, and consequence Security as a discipline has been an important feature of society since cavemen started using the environment around them to protect themselves and their families.  As a discipline, security has developed exponentially and that trend is continuing; however, somewhere along the way key elements of physical security design have been forgotten. All too often solutions are deployed in a pre...

How to achieve high quality video with lowest bandwidth and storage needs

A lower bitrate reduces bandwidth andstorage requirements High definition and megapixel cameras provide more detailed images with more useful information, but this can come at a cost. The volume of data being transported and stored rises significantly. The bandwidth demand that this places on the network and the increase in required storage capacity adds significantly to the total IP system costs. The best place to reduce these costs is at the source – in the camera &nda...

What is the continuing role for server-based video analytics?

Video cameras are smarter than ever. Video analytics functionality is available inside most cameras now on the market. Smarter cameras enable a system with distributed intelligence and also help to manage bandwidth and storage – on-camera intelligence can determine what video is important enough to tie up network resources and to eventually be retained or viewed. But on-camera video analytics have their limitations, and additional video intelligence at the server can add a new range of fun...

Role of advanced security technologies in enhancing exhibits and visitor experience in museums

With every technological advance that canbenefit museum management comes anotherthat may assist thieves  When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as m...

Lessons for security sector from the Paris attacks: The value of sharing data and vigilant guarding

The Eiffel tower illuminated with colours of the French national flag on November 16 Let’s say it up front: The physical security sector has limited solutions to address events like those in Paris on the 13th November. The series of coordinated terrorist attacks consisted of mass shootings, suicide bombings, and hostage-taking in which 129 people died. Among the dead were 89 people at the Bataclan theatre where American band Eagles of Death Metal was playing at the t...

Rising interest in drone detection and tracking due to lack of regulations

  Williams Meredith recently stepped out of his Kentucky home to see a drone hovering over his porch, videotaping his young daughters by the family pool. It wasn’t the first time one of these small flying devices had wandered over to take a look, but it had never gotten so close. So he did what any red-blooded American would do when confronted with a home invader – he blew it from the sky with a single shotgun blast. The confrontation is another example o...

Ethernet switches – Powering IP surveillance systems the smarter and more economical way

Ethernet switches are often overlooked andsometimes deemed a cheap connectivity pointwith little to no importance The Ethernet switch is a critical link between cameras, network video recorders (NVRs) and computers that need access to video feeds. The Ethernet switch not only provides the data connectivity but often the power to the IP cameras via Power over Ethernet (PoE). Ethernet switches are the fundamental backbone of a Local Area Network (LAN) and the critical connectivi...

IoT intelligent building systems expose security threats and challenges

The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organisations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...

Physical security technology challenges and requirements for healthcare organisations

Healthcare organisations are an important vertical market for many security manufacturers and integrators. Like other vertical markets, healthcare has its own unique set of requirements and challenges for physical security systems. We asked this week’s Expert Panel: What are the distinctive security problems faced by healthcare organisations? What technologies are being embraced to increase security?

OEM and R&D focus for Chinese manufacturer Safer Science and Technology at CPSE 2015

Safer has built a reputation of notcompromising on quality for a low price,leading to increases in overseas sales in 2015 Unfazed by the number of companies following the footsteps of Hikvision and Dahua and launching their own branded product lines, one Chinese company insists on carving out its name in the manufacturing sector. Established in 2002, Shenzhen Safer Science and Technology, or Safer as the company is commonly known, acknowledges that it cannot c...

Smart cities revolution incomplete without safety and security of public and infrastructure

The city of the future needs smart, secure and resilient infrastructure solutions According to the United Nations, the world population will reach almost 8.5 billion by 2030. As populations grow, so do cities. Even now more than half of the world’s inhabitants live in urban areas, and more than one million move from the country to the city every week. This trend places enormous demands on people and infrastructures. Because only when communication, energy, safety, s...

CPSE 2015 insights: Chinese security companies explain domestic and international strategies

CPSE Shenzhen showcased security productsacross 11 halls. The show is arguably thelargest and most influential in Asia  China is the largest security market in the world. This makes the annual China Public Security Expo (CPSE) a force to be reckoned with and a place to be seen for every security company. Boasting 11 halls over an area of 110,000 m2 and more than 6,000 booths, CPSE is listed as one of the largest and, certainly, one of the most influential s...

Parking facility security offers new opportunities for system integrators

Security cameras provide live, real-time videoto assist security personnel in spottingpotential or real problems Efficient security systems for parking structures deter criminal activities and anti-social elements from destroying property. Over the years, security companies have responded to this need and developed a range of security systems for parking facilities, such as audio intercoms, access cards and video analytic solutions. Systems integrators who want to add new ser...

Huge China Public Security Expo (CPSE) reflects China’s growing security market

There's nothing like a visit to the China Public Security Expo (CPSE) in Shenzhen to open your eyes to a new world of security market manufacturers and customers in the Asia-Pacific market. The show is huge by Western standards – someone told me it's five times the size of ISC West in Las Vegas. But even more than the size of the show, it was the crowd that made an impression on this first-time visitor. Huge numbers of attendees and exhibitors Think of the mass of humanity you might exp...

H&S Protection Systems uses social media to increase brand awareness and sales

Social media channels have active and consistent users and may constitute a promising audience for security integrator’s marketing efforts  If you have any lingering doubts about the impact of social media, consider this: Worldwide, there are over 1.44 billion monthly active Facebook users, which is a 13 percent increase year over year, according to the social media giant. In addition, 936 million people log onto Facebook daily (as of March 2015), whi...

Enterprise Security and Risk Management (ESRM) requires more comprehensive skill sets from security staff

(Click to see larger image) The ASIS Foundation & the University of Phoenix College of Security and Justice's Enterprise Security Competency model Are you competent in your security job or profession? How do you know? According to research carried out by the ASIS Foundation, security has begun to evolve beyond guarding doors, checking IDs and screening briefcases and purses. Today, something called Enterprise Security Risk Management (ESRM) is subsuming the...

How museums employ security measures to counteract art thefts

Major art heists often feature audacity that defeats even the most thorough security protocols  Museum security, like art, is ever-changing. Traditional security practices like manned guarding alone are not sufficient to keep thieves at bay. Modern security technologies such as video surveillance, motions detectors, intruder alarms and other physical security devices also play an equally important role in securing museums and its art work. Regrettably, having all the...

Home security systems’ additional automation features promote smart homes

Home security devices are evolving and expanding their offered features, providing new opportunities for the security industry Home security isn’t just home security anymore. These days cameras, door and window alarms are just pieces of the web–enabled “smart home.” And, the home is getting smarter, as service providers begin to merge home security systems with home automation. The added value of these additional features is now drawing more potential c...

Cyber-vulnerability of physical security systems: Lessons from 2008 Turkish pipeline explosion

Discussions in our industry about cyber-threats to physical security systems, including IP video, often centre around hypotheticals. How might a hacker gain access to a video camera feed? How might he or she enter the larger enterprise system through a software vulnerability related to physical security? We all know assessing threats often involves considering the hypothetical, of course, but we should also seek to learn from actual events in the past. In relation to vulnerabilities of video su...

Cyber attacks on physical systems call for a blended security approach

Problems caused by physical systems in terms of cyber-attack are quite extensive, damaging systems and assets  Security experts of various disciplines agree that physical systems are increasingly being leveraged in attacks on organisational networks and supply chains. Many manufacturers maintain that security (including that of security systems) is the responsibility of the end user, which would be fine if they were only expected to maintain security and not create th...

What will be the impact on the security market of the “Internet of Things”?

People using computers to surf the Internet is "so 20th century". Today, the big trend involves machines using the Internet to communicate, exchange and analyse data in what has widely become known of as the Internet of Things. Various security devices are among the IoT components, and how devices connect effectively using the Internet – even devices not related to security – will constitute a large part of the future business of security integrators and installers, whether in the re...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE