PTZ cameras
3xLOGIC, the pioneering innovator in security and business intelligence, has launched four new camera and imager solutions providing exceptional high-definition quality and intelligent software to improve business insights. Each camera offers unique features tailored to business needs. Some include fixed lens capabilities, AI analytics, enhanced visual performance for poor lighting conditions, and more. VISIX™ Dual Thermal Imager VISIX™ Dual Thermal/Visible Light Imager comb...
FLIR, part of Teledyne Technologies Incorporated, unveiled ADGiLE, a fixed-mounted methane monitoring solution. Featuring optical gas imaging (OGI) with comprehensive edge detection analytics, ADGiLE is the oil and gas industry’s solution to meeting environmental stewardship and efficiency goals. The system, featuring a pan-tilt gas imaging camera, edge computing device, connectivity, and FLIR United VMS software within a ruggedised package, can help companies address the ever-evolv...
Blackline Safety Corp, a pioneer in connected safety technology, has announced that it has secured a $3.9 million contract renewal with one of the largest utility companies in the U.S. Headquartered in the Midwest and serving more than four million customers, the company became a Blackline customer in late 2021. The renewal adds two more years of monitoring by Blackline’s Safety Operations Center (SOC), as well as push-to-talk services for the utility company’s 2,200 G7 devices. The...
The Monitoring Association (TMA), the non-profit trade association representing the professional monitoring industry, announced it has signed a multi-year managed services agreement with Mission Critical Partners (MCP) to power the growth of TMA’s Automated Secure Alarm Protocol (ASAP) Service. This award was made after a competitive procurement process. ASAP is the pioneer, standards-based service for the digital dispatch of alarm events to 911 centers. Since its introduction in 2011, AS...
Masaya Kida, Managing Director of OPTEX Security, reflects on the 45th anniversary of OPTEX and what it means, discusses the driving factors behind the business’ success and looks ahead at what’s next for OPTEX and the wider security industry. OPTEX’s 45th anniversary When OPTEX was founded in Japan in 1987 by Electronics Engineer - Toru Kobayashi and three colleagues, their vision was to build a global sensing technology business with precision and intelligence at its heart....
i-PRO Co., Ltd., a global pioneer in professional security solutions for surveillance and public safety, announced its new AI-enabled Corner Camera. Built-in Japan for the rigours of high-security facilities, this exceptionally compact and robust stainless steel camera represents the smallest form factor, which is IK11 compliant. Its ability to withstand a 70 Joule (70J) impact far exceeds the common IK10 (20J) impact ratings of similar devices. "The i-PRO Corner Camera represents a new s...
News
Hikvision, a world-renowned manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is excited to announce the rollout of its Phase 1 Kiosk Program across 28 locations in the U.S. This initiative includes live product demos at participating distributors, designed to offer customers a hands-on experience with the latest Hikvision technologies and equipment. Range of Hikvision products "The Hikvision Kiosk Program is a customer-facing live demo which allows customers to walk into a Hikvision Experience Centre to get hands-on experience or training with the latest and greatest Hikvision technologies and equipment," said John Xiao, Vice President of Marketing, Hikvision USA, adding, "This initiative will drive engagement, enabling customers to explore and interact with our innovative solutions firsthand." Kiosk users will have the chance to study and interact with a range of Hikvision products Each kiosk will feature the HikCentral Workstation, which serves as the central hub for demonstrating Hikvision's advanced features to customers. Kiosk users will have the opportunity to explore and interact with a range of Hikvision products on the HikCentral Workstation, including: 8K M-Series NVRs: Ultra high-definition recording and playback capabilities. ColorVu Technology: Enhanced low-light performance cameras for full-colour 24/7. TandemVu Cameras: Dual-lens technology and smart linkage auto-tracking with a bullet and PTZ in one unit for broader surveillance coverage. Thermal Cameras: Advanced HeatPro thermal imaging for deep learning analytics, seeing the invisible along perimeters, and early fire detection. Stealth Edition Black Housing Cameras: Style meets functionality in our portfolio of black housing cameras. Touch Screen Facial Authentication Intercom: Next-generation, touchless access control using facial authentication or other biometrics. Vandal-Proof Intercom: Durable and robust access control for urban environments.
IDScan.net, a major provider of ID and identity verification software, is proud to welcome Dan Kelleher to its leadership team as the new Vice President of Operations. With an extensive background in finance and a proven track record of driving operational excellence during a thirty-year career at Hertz, Kelleher's appointment marks a significant milestone in IDScan.net's growth strategy. “Reducing the business impacts of identity theft and fraud has been a key challenge throughout my career,” said Dan Kelleher, adding “I’m excited to join the other side - an organisation leveraging technology to create solutions to reduce fraud. Already in my short time here I have seen firsthand how artificial intelligence, combined with significant investments in engineering, are necessary to combat modern, sophisticated fraud attempts.” Prior roles of Kelleher Kelleher began his career as an auditor in public accounting with a focus on banking Prior to joining Hertz, Kelleher began his career as an auditor in public accounting with a focus on banking, manufacturing, transportation, and retail clients. His Hertz career began as an Assistant Controller and advanced to Controller roles where he partnered with field operations to drive financial performance. Most recently, he led North America initiatives focused on operating cost efficiencies and process improvement before ending his career with the globally recognised car rental brand in late 2023. In his new role, Kelleher will help oversee onboarding and ongoing management of large, commercial accounts using the VeriScan or DIVE products for ID and identity verification. His experience in enterprise organisations makes him an ideal liaison between the IDScan.net team and the revenue, operations, finance, and security teams at large organisations searching for ways to deter bad actors. Identity verification market “I have been on the other side; working in a business and looking for solutions to theft and bad debt,” said Dan Kelleher, adding “Businesses should know that there are robust, powerful tools available to ensure your customers are legitimate. I expect a sea change over the coming years, as large, global companies realise an increased need to truly authenticate each customer. The security, operational, and financial benefits are simply too great not to put technologies in place.” Dan Kelleher is part of a large cohort of new hires at the New Orleans-based technology company, as the technology firm rapidly expands to service the growing identity verification market, expected to reach $30 billion by 2030.
LuxTrust, a European specialist in trust services and digital identities, and Shanghai Genyan Network Technology, a pioneering provider of digital identity management, electronic signature and electronic seal solutions in China, announce their partnership and create a unique market offering. This new service - focused on data sovereignty - provides secure and compliant electronic signature solutions for businesses operating under the jurisdictions of the European Union and China. The result? Transcontinental contractual processes are facilitated, accelerated and secured. Addressing international compliance challenges LuxTrust, Shanghai Genyan Network Technology and Whale Cloud, the integrator of Qiyuesuo, joined forces to simplify electronic signature processes in complex legal environments. This partnership enables companies to easily navigate between EU and Chinese regulations, ensuring compliant signatures despite stringent legal processes. The current lack of solutions makes electronic signatures between a Chinese and a European The current lack of solutions makes electronic signatures between a Chinese and a European company overly complex, requiring costly travel and local regulations that are not always straightforward to understand and navigate. Unique in its regulatory coverage, this interface offers a seamless user experience, integrating electronic signature flows into existing business ecosystems. It also spares users the need to switch platforms, improving efficiency and reducing errors. Legal sovereignty and reliability Thanks to this collaboration, companies benefit from jurisdictional sovereignty. For each contract, companies sign within the appropriate jurisdiction: in China for Chinese contracts and in the EU for European contracts. Companies use their usual platform (COSI for the EU, Qiyuesuo for China) to sign, ensuring compliant and legal signatures regardless of location. This partnership is unique as it ensures mutual digital identities for each region This partnership is unique as it ensures reciprocal digital identities for each region - Chinese companies use a LuxTrust digital identity to sign in the EU via Qiyuesuo, while EU companies use a Qiyuesuo digital identity to sign in China via COSI. This approach ensures legal compliance, thereby enhancing the reliability and legality of international transactions. EU and Chinese legal requirements For Fabrice Aresu, CEO of LuxTrust: "This partnership, in collaboration with Shanghai Genyan Network Technology and Whale Cloud, is a real asset for European and Chinese companies. It combines the experience and expertise of pioneering players in their respective fields, addressing a wide range of use cases from the military sector to banking, for small and large enterprises alike." "We look forward to leveraging the professional expertise of both LuxTrust and Whale Cloud through our collaboration to provide electronic seals and contracts that comply with EU and Chinese legal requirements for business interactions between Chinese and European companies. Together, we aim to offer legally valid electronic signature products and solutions to global clients," said Tang Xingkun, CEO of Shanghai Genyan Network Technology. Financial benefits for increased efficiency In addition to operational and legal advantages, the alliance between LuxTrust and Shanghai Genyan Network Technology also offers significant financial benefits for businesses. By streamlining contractual processes, companies can reduce their administrative costs while maintaining a high level of efficiency and security. This profitability-focused approach allows companies to achieve substantial savings while improving their productivity and competitiveness in the international market. "As an expert in digital transformation, Whale Cloud is delighted to drive the integration of Qiyuesuo and LuxTrust in the electronic signature sector, leveraging our technological expertise and industry experience. This collaboration aims to drive global technological innovation and foster seamless integration, setting new standards for digital trust services worldwide," added Wu Pan, General Manager of Whale Cloud for the European region.
Sensor specialist - HENSOLDT is supplying an unspecified number of state-of-the-art optical vision systems for the PUMA infantry fighting vehicle. The customers are the system houses - KNDS and Rheinmetall, which produce the PUMA infantry fighting vehicle and distribute it through the jointly founded PSM GmbH. The order value is in the double-digit million range. In addition to the vision systems for the turrets of the infantry fighting vehicles, the order also includes the equipment for twelve turret trainers for training vehicle crews. With this delivery, HENSOLDT is helping to improve the PUMA on the K-Stand S1. PERI-RTWL The order consists of the delivery of the turret-independent stabilised main optics PERI-RTWL for the commander and the turret-bound stabilised fire control optronics WAO for the gunner. Three high-performance sensors are integrated into each of the two sighting systems: A third-generation ATTICA thermal imaging device, an eye-safe laser rangefinder with a long-range, a highly sensitive day vision camera in the WAO, and a scanning camera in the PERI, which films the high-performance glass-optical channel. Increased combat value "In the variant for S1, new colour camera views and displays have been installed for the PERI and WAO, significantly improving reconnaissance on the battlefield for the commander and gunner," says Jan Erbe, Head of the Ground-based Systems business unit at HENSOLDT. Jan Erbe adds, "With the improved optics, the PUMA has a significantly increased combat value." 360-degree vision system It is the only vision system in the world that has a fibre-optic channel in an unmanned turret The PERI-RTWL is the commander's 360-degree vision system. Functionally, it largely corresponds to the WAO and, like the WAO, has a separate monitor for displaying the sensor views. It is the only vision system in the world that has a fibre-optic channel in an unmanned turret and therefore, combines the advantages of direct vision with those of optronic vision in one system. The PERI also has a swiveling eyepiece. This means that the glass-optical direct vision can also be used by the gunner. ATTICA thermal imaging camera The WAO was developed for the gunner as a purely optronic vision system. The ATTICA thermal imaging camera provides the soldier with detailed and clear observation around the clock and in poor weather conditions. The laser rangefinder supplies range data directly to the fire control system and the command information system. The WAO, therefore, enables the gunner to detect and engage targets at great distances with the utmost precision.
The new T series wall-mount cameras from Hanwha Vision solve the obstructed-view challenges associated with dome surveillance devices in high overhead mounting positions. The new cameras deliver an “eye-level,” nearly 180° panoramic field of view while capturing detailed 5MP resolution video for accurate people and object identification. The T series cameras (model TNV-C8011RW) can fit a range of commercial surveillance applications requiring wide fields of view of any property or establishment without blind spots. Potential installations include gas stations, retail stores, drive-thru lanes, self-checkout kiosks, or other scenarios where users need to clearly see people and vehicles entering and exiting, detect theft and prevent loss, monitor customer activity to take immediate action, and to improve the guest experience. WiseStream III compression technology The use of WiseStream III compression technology enables more efficient video management “Surveillance dome cameras are often mounted high, which creates sharp viewing angles that make it difficult to identify people as they move closer to the camera,” said Ramy Ayad, Sr. Director of Product Management at Hanwha Vision America. “The T series offers a more natural, realistic view to detect key details that might otherwise be obstructed or not even visible.” The T series wall-mount cameras are equipped with AI-based object detection to reduce false alarms and also generate metadata that can be used to streamline forensic searches. The use of WiseStream III compression technology enables more efficient video management by reducing bandwidth by up to 80% without compromising the video quality. AI-powered wide dynamic range (WDR) and noise reduction technology combine to produce crisp imagery even in challenging lighting. New camera’s IR performance The camera’s AI engine also features analytics related to facility occupancy levels Security teams can use the camera’s built-in analytics to set up virtual areas and lines, and receive alerts when classified objects or people enter, exit, intrude or loiter in designated locations requiring authorised access. The camera’s AI engine also features analytics related to facility occupancy levels, people or vehicle counting, queue management, heat mapping and other trackable statistics useful for improving customer service and generating actionable business insights. The new camera’s IR performance allows night viewing at up to 15 metres and close-up imaging without oversaturation. A lens tilt of ±25° allows users to customise their viewing angle to fit any environment. The T series wall-mount cameras feature a built-in microphone allowing users to hear any activity near the camera. Features of the new Hanwha Vision T series Key features of the new Hanwha Vision T series wall-mount cameras (model TNV-C8011RW) include: 5MP @ 30 FPS 1.6mm fixed focal lens (HFoV: 175° VFoV: 125°, Triple CODEC (H.265/H.264/MJPEG) with WiseStream III (based on AI engine) support 120dB WDR IR viewable length 15m (49ft), WiseMD based on AI engine Classified object type: Person/Vehicle (vehicle type: car, bus, truck, motorcycle/bicycle) Tamper detection SD card slot IP66 PoE White colour All new Hanwha Vision cameras and devices, including the T series, are fully NDAA compliant and meet the highest cybersecurity standards.
Illumio, Inc., a Zero Trust Segmentation company, announced the appointment of Pete Wilson as Director of Channel Sales, EMEA. Based in the UK, Wilson will lead and scale Illumio’s channel and alliance operations in EMEA as it seeks to capitalise on the growing demand for Zero Trust and Microsegmentation. Wilson brings over 20 years of experience in networking and security, gained at top technology companies, including RSA and SailPoint. Before joining Illumio, he was Director of EMEA partnerships at Okta, where he led the growth of the Global Systems Integrators (GSI) community in Europe, doubling revenue Year-over-Year. Prior to Okta, he worked at Auth0, where he built the EMEA partner channel from the ground up, significantly increasing revenue from hyperscalers alone in just two years. Illumio’s partner-empowered ecosystem Wilson’s primary focus will be solidifying Illumio’s partner-empowered ecosystem Wilson’s primary focus will be solidifying Illumio’s partner-empowered ecosystem and diversifying its indirect go-to-market strategy across EMEA. He will report to Todd Palmer, Senior Vice President of Global Partner Sales and Alliances at Illumio. Commenting on Wilson’s appointment, Todd Palmer said: "The channel is instrumental to everything that we do at Illumio and EMEA is one of our most important markets. Pete’s experience, vision, and tenacity make him the ideal leader to steer us through our next phase of growth as we seek to strengthen and refine our partner ecosystem across EMEA." Zero Trust architecture Illumio provides a powerful solution for channel partners in a market with huge growth potential. Gartner® predicts that by 2026, 60% of enterprises working toward Zero Trust architecture will use more than one deployment form of micro-segmentation, which is up from less than 5% in 2023. "It’s an exciting time to join Illumio. The micro-segmentation market is poised to explode, and Illumio is a clear pioneer in the field," says Pete Wilson, adding "The ransomware problem is not going away and together with our partners we have a huge opportunity to help organisations reduce risk and build resilience through Zero Trust Segmentation." Illumio’s continued investment Pete Wilson’s appointment follows continued channel success for Illumio. For the third consecutive year, Illumio was recognised by CRN with a prestigious 5-star ranking in its 2023 Partner Program Guide, highlighting Illumio’s continued investment in developing a best-in-class partner program to help organisations reduce risk, build resilience, and stop breaches from spreading. Illumio is hiring globally across all departments.
Expert commentary
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimise your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber security Userful Corporation provides a software system that enhances cyber security operations for an enterprise Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security. The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office. Real-time visibility “It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.” A typical cyber security operations centre resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident. Userful’s software helps in managing operations centres Userful’s software manages how data is presented in an operations centre environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure. Managing operations centres is a core offering for Userful Corporation, including command centres of all types, from traditional network operation centres to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems. Solutions that are easy to deploy, manage and scale Cyber security professionals need solutions that are easy to deploy, manage and scale" “We are a platform that can be utilised across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.” Compiling and displaying information to an operations centre has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks. The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems. Security Orchestration, Automation and Response (SOAR) Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure. SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses. Cyber security threats Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualised. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity. Single platform/solution The single platform/solution also extends beyond operations centres to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth. In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software. Companies always have an ecosystem of interconnectivity Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organisation. Dangers of random hardware on a network Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats. Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centres that involve three or four manufacturers, all siloed. Software versus hardware Our biggest challenge is to get people to understand what is possible with software versus hardware" “Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.” Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input. Corporate policy specifies security at every level Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards. To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).
Case studies
Dahua Technology Indonesia has donated a Dahua DeepHub Smart Interactive Board to the Faculty of Economics and Business (FEB) at Universitas Gadjah Mada (UGM), demonstrating the company’s commitment to supporting the advancement of education in Indonesia. The Country Director of Dahua Technology Indonesia, Royce Ouyang, expressed his gratitude for this charitable opportunity during the handover event held at the Alumni Hall of FEB UGM on March 14. Royce Ouyang said, "We are pleased to contribute to the development of education in Indonesia. We hope this 75” Dahua DeepHub Smart Interactive Whiteboard can enhance students' learning experience, enabling them to be more interactive and innovative in class and be in line with the latest developments abroad." Artillery of sophisticated features The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device. Its package includes the smart interactive whiteboard, plug-in USB camera, 11th generation i5 processor 8GB+256GB, activated Windows 11 Pro, as well as a mobile stand and wireless screen sharing cable. This intelligent device is equipped with an artillery of sophisticated features, including a 4K screen, eight quick access buttons, fast charging, fast file sharing, the ability to switch between Android and Windows, a high-resolution camera, wireless screen sharing with various devices, and other advanced functions that enable smoother and more collaborative interaction in the classroom. Dahua DeepHub Smart Interactive Whiteboard The Dean of FEB UGM, Prof. Dr. Didi Achjari, M.Com., Ak., CA, expressed his appreciation for the generous donation, stating that the device will not only bring a more collaborative learning experience for their students, but also support various educational activities, research, and community service at FEB UGM. "We are committed to utilising it as best as possible to improve the quality of education in our environment," he said. "The support of advanced devices such as the Dahua DeepHub Smart Interactive Whiteboard facilitates FEB's academic community in adopting innovative teaching methods. Thus, it can improve student absorption and prepare them to face future challenges," said Gumilang Aryo Sahadewo, SE., M.A., Ph.D., Vice Dean of FEB UGM. He also stated that the use of the Dahua DeepHub Smart Interactive Whiteboard is expected to enhance the interaction between lecturers and students and facilitate collaboration in the learning process. Industrial sector and education In addition, this equipment can also support the development of innovative and technology-oriented curricula. "With this equipment, we hope that FEB UGM can continue to strengthen its existence as a pioneering educational centre that innovates and is competitive," he added. With the donation of Dahua DeepHub Smart Interactive Whiteboard to FEB Universitas Gadjah Mada, Dahua took a positive step towards strengthening the relationship between the industrial sector and education, empowering the youth of now and enabling a smarter society and better living.
Founded in 1913, the family-owned company CLAAS is one of the world's renowned manufacturers of agricultural machinery. Headquartered in Harsewinkel, Westphalia, the company is the European market pioneer in combine harvesters. CLAAS is the sole world market pioneer in the major product group of self-propelled forage harvesters, as well as pioneering in agricultural technology with tractors, agricultural balers and grassland harvesting machines. The product range also includes state-of-the-art agricultural information technology. CLAAS employs over 12,000 people worldwide and achieved a turnover of 6.1 billion euros in the 2023 financial year. Drivers of business success Customer service, therefore, focuses on the rapid availability of spare parts Innovative strength and the close integration of customer feedback in development are important drivers of business success. In addition to the reliability, productivity, efficiency and performance of the products, the development focus is also on low maintenance and low wear costs, as well as long-term value retention and an exceptionally long product life. During the harvest season, the machines are used intensively, and harvest interruptions due to breakdowns are particularly critical. Customer service, therefore, focuses on the rapid availability of spare parts. Intelligent video analysis system The CLAAS Parts Logistics Centre in Hamm-Uentrop has been supplying CLAAS customers worldwide with spare parts since 1999. From the highly automated logistics centre, which operates 365 days a year, 24 hours a day, CLAAS supplies customers with high-quality spare parts for agricultural machinery in the fastest possible way-by air freight, truck or cab. To secure the logistics centre, an innovative video surveillance solution was required to prevent and investigate crimes such as unauthorised entry into the premises or building areas. In addition, movements in all relevant security areas and the logistics centre's processes were to be extensively documented. Uniform security system A uniform security system was required, which could be used to analyse alarms from different areas and coordinate follow-up measures, as well as an intelligent video analysis system that reliably reports unauthorised movements in security areas with a low false alarm rate. Of course, data protection and the concerns of the works council had to be respected. Integration of scan data The requirements were implemented with the help of a Geutebrück system The requirements were implemented with the help of a Geutebrück system. Together with system integrator Hermann Einberger GmbH, Geutebrück designed and implemented a solution that comprehensively meets all current requirements and is open to future expansion. It allows the integration of scan data from deliveries for detailed process documentation and optimisation for example, as well as automated access control using licence plate recognition. Networking the site with other CLAAS sites for centralised operation and administration from the CLAAS headquarters in Harsewinkel is also an option. Cooperation with Einberger Christian Vogt, Vice President Group Security CLAAS, said: "It wasn't just the technology that convinced us. The good customer service and close cooperation with Einberger and the direct contact with the manufacturer Geutebrück guarantee us the best possible support even now, after the installation, during operation." Christian Vogt adds, "Whether questions from our operators, support for our administrators, ideas for the extended application or individual requests: we feel that these two companies really care about their customers. They are true family businesses, just like us."
The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart security, and the pace of digital intelligence change is gradually increasing. The security industry in the Middle East is rapidly growing, driven by the government's strong emphasis on national security and terrorism prevention. Centralised systems management Significant attention and investment have been directed toward this sector, estimated to grow at about 10% per year. There is no doubt that the Middle East has become one of the most important and fastest-growing security markets in the world. While traditional real estate management requires a location-based approach, the digital transformation of the marketplace means that centralised systems management will replace the traditional approach, and that's exactly what Provis is starting to think about. The customer Provis is a property management company based in the United Arab Emirates (UAE) Provis is a property management company based in the United Arab Emirates (UAE). With over 25,000 units under property management, over 28,000 units under Owners’ Association management, and thousands of properties sold and leased. Based on their accumulated in-depth industry knowledge, and technical expertise, it is their commitment to provide sustainable value-added services through the assets of their clients. Integrated service solutions To provide integrated service solutions based on international standards, allowing clients to focus on their core business with peace of mind, thereby setting a new benchmark for integrated real estate service solutions globally. For its owners to centrally manage their users and deliver smarter, easier real estate solutions to their customers, Provis turned to Anviz's integrator partners, PROGRESS SECURITY & SAFETY SYSTEMS and MEDC, for assistance. The challenge The company's business continues to grow and expand across various regions of the country Traditional property management in the UAE local area is inefficient and intensive, property managers need to spend a lot of time and energy to manually deal with those complicated and repetitive work. Conventional management is unable to effectively analyse a large amount of data, making it difficult to provide a basis for decision-making. Impact on user experience The delay and errors of manual processing are the very drawbacks that can be precisely removed in information management. Moreover, as the company's business continues to grow and expand across various regions of the country, the practice of processing information in a decentralised manner by location not only tends to create information silos, making it difficult to integrate and share data but also leads to delays in customer service due to lack of information exchange, thereby affecting user experience and the corporate image. The solution Thinking about the cut-and-dry and providing a heartfelt service Face Deep 3 maximises supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres No matter whether in the youthful campus or orderly government and other places, there will be the movement of people. Quickly and accurately checking people is a basic requirement for front-end devices, and their Face Deep 3 maximises this need. It supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres (6.5 feet) in less than 0.3 seconds, with customised alerts and various reports. The Account Manager of Provis said, "In the past, we always struggled with the data integration of multi-point control. Having used terminal devices and software that were not part of a single system, we found that it had no linkage effect and could not solve the problem of event recording and data sharing. And location-based time and attendance solutions were ineffective in centralising user management." Perspective of the CrossChex system Based on the scenario of property management, the personnel are scanned and inspected by Face Deep 3 and then redirected to the management department through the CrossChex application and CrossChex Cloud Web software to achieve data sharing and transfer. Thus, the workflow of the property personnel is streamlined and standardised. Efficiency and cost management CrossChex system integrates the property work content in an all-round and multi-dimensional way From the perspective of the CrossChex system, it integrates the property work content in an all-round and multi-dimensional way, which makes property management more scientific and orderly, improves management efficiency, and reduces cost. Meanwhile, the CrossChex system adopts a centralised management approach to gather all the information resources on a single platform. It also supports integration with ERP solutions to facilitate integrated management, which can reduce manpower and improve efficiency. The benefits Precision management, digital intelligence service CrossChex Cloud, as a software platform with customised functions based on customer scenarios, combined with Face Deep 3, which is embedded with the most updated technological algorithms, seamlessly handles the data of people's movements and promptly processes the event records to form multi-form visualisation reports. Additionally, it supports business customisation and expansion to meet different business needs. It provides safe and reliable data encryption and rights management to protect user information security. Client’s quote Provis' Project Manager said, "Choosing to use Anviz's time attendance devices and cloud-based platform, allowed us to solve 89% of the repetitive steps for our owners' property management matters, making our brand image more visible."
The airport, named after a notable historical figure, serves as a key transportation hub for both domestic and seasonal international flights in its region. Serving over 11 lakh passengers a year, it ranks as one of the busiest airports in terms of passenger and aircraft movements. The terminal building at this airport is spread over 26,936 square metres and has 14 check-in counters, four immigration counters for departures, and six immigration counters for arrivals. Located near major transportation arteries, it offers convenient access to travellers from various directions. Business scenario They required a robust video surveillance solution that could ensure 24x7 recording capabilities With a growing number of passengers and flights at the airport, a new terminal was recently constructed at this airport. To facilitate the security of passengers and staff at this terminal building, they required a robust video surveillance solution that could ensure 24x7 recording capabilities. Without adequate surveillance coverage, this airport was vulnerable to security threats such as perimeter breaches, theft, vandalism, and terrorist activities. Challenges Ensuring passenger and staff safety: Being one of the busiest airports in the state, the absence of a video surveillance system was risking the safety of passengers and staff from potential threats like theft of personal belongings or other such criminal activities. Continuous monitoring with redundancy: The airport wanted continuous 24x7 monitoring with a dual setup ensuring that surveillance operations continued uninterrupted even in the event of equipment failure or maintenance downtime. Ensuring cargo safety: The airport faced challenges in ensuring the safety and security of cargo pioneering to risks such as theft, tampering, and damage during handling and transportation processes. Regulatory non-compliance risk: Without adequate surveillance systems, the airport was facing the risk of non-compliance with security regulations, which could lead to penalties and legal liabilities. Solution The entire airport terminal was covered with Matrix Project Series Bullet, Dome, and PTZ Cameras to provide extensive coverage. Matrix Project Series Bullet IP Cameras were deployed in/at: Outdoor public spaces such as drop-off zones and walkways: To monitor crowd movements and enhance overall security. Cargo handling areas: To monitor the loading and unloading of cargo and ensure compliance with security protocols. Matrix Project Series Dome IP Cameras were deployed in/at: Main entrances and exits: To monitor the flow of passengers and detect any suspicious behaviour. Check-in counters: To oversee passenger interactions and baggage handling. Baggage claim areas: To monitor baggage claim areas and prevent theft or tampering of luggage. Retail areas: Placed in retail shops and duty-free zones to deter shoplifting and ensure security for both customers and staff. Matrix PTZ Cameras were deployed at: Elevated structures overlooking runways and aprons: To provide a panoramic view enabling operators to zoom in on specific aircraft or incidents. These cameras also aided in monitoring critical infrastructure such as control towers, fuelling stations, and power substations, providing close-up views for detailed inspection and surveillance. Monitoring and managing video surveillance SATATYA SAMAS - Video Management Software was deployed at two sites within the terminal Matrix SATATYA SAMAS - Video Management Software was deployed at two locations within the terminal. The first location served as a primary control centre for monitoring and managing video surveillance feeds, and coordinating security responses. The second location served as a secondary control centre. This could be used in case of failures or emergencies at the primary control centre, ensuring the continuity of surveillance operations. Also, different users at two different locations could manage and monitor the camera streams, if needed. Products offered SATATYA SAMAS PLT (1 No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1 No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM20 (3 Nos.): Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM5 (2 Nos.): Licence for Adding five Additional Cameras SATATYA SAMAS USER10 (1 No.): Three Concurrent User Licence for Smart Client and Mobile Client SATATYA CIDR20MVL12CWP (52 Nos.): 2MP IR Dome Motorised Varifocal 2.8-12 mm with Audio SATATYA CIBR20MVL12CWP (14 Nos.): 2MP IR Bullet Motorised Varifocal 2.8-12 mm with Audio SATATYA PZCR20ML33CWP (9 Nos.): 2MP PTZ Camera 33x Zoom with Audio Benefits The superior image quality enabled security personnel to identify potential threats quickly Matrix IP Cameras provided full coverage at the new terminal building. The superior image quality enabled security personnel to identify potential threats quickly. The motorised varifocal lens in Matrix IP Cameras enabled zooming in for specific details when required. Matrix PTZ IP Cameras provided 360° surveillance and up to 33x zoom, providing perimeter security at the airport. Matrix IP Cameras are cyber-secure, complying with the OWASP ASVS 4.0 L2 norms, certified by STQC, Delhi. This helps in safeguarding sensitive surveillance footage, maintaining network integrity, and complying with stringent cybersecurity regulations. Matrix IP cameras are also NDAA compliant, which helped in meeting the regulatory standard requirements at the Airport. The dual setup of Matrix Video Management Software helped in providing redundancy to the surveillance system, ensuring continuous monitoring and recording even in the event of equipment failures, network disruptions, or other unforeseen circumstances. It also allowed for distributed monitoring and management capabilities, enhancing overall surveillance effectiveness. Features like Day Highlights and Time-lapse in Matrix Video Management Software aided airport security teams in leveraging intelligent search functionalities to conduct thorough investigations quickly.
360 Vision Technology, the UK-based manufacturer of ruggedised HD, radar, and thermal PTZ surveillance cameras, has been selected to supply its radar surveillance camera technology to a solar farm site in Ross-on-Wye, Herefordshire. Predator Radar camera Capable of generating 1-Megawatt of electrical power, the solar farm site was constructed by VARTEC EPC Limited for Lowther Renewables Ltd, to help offset the carbon footprint of its parent company, AJ Lowther & Son Ltd, which provides a range of steelwork, cladding, and refurbishment services, including steelwork structures catering for manufacturing, industrial, agricultural, commercial and equestrian buildings. In collaboration with VARTEC, a technical specification for the solar farm was jointly devised by Craig Carton, 360 Vision Technology’s Technical & Customer Support Manager, resulting in the specification of a 360 Vision Predator Radar camera unit specified to secure the entire site. Cost-effective perimeter solution With up to 200m radius/400m diameter constant surveillance capability, this provides a highly effective solution The 360 Vision Predator Radar camera unit deployed integrates radar technology with a Predator 1080p HD camera, to offer a cost-effective perimeter and wide area surveillance solution. With up to 200m radius/400m diameter constant surveillance capability, this provides a highly effective solution with which to secure the solar farm site, while minimizing costs compared to traditional CCTV camera solutions, with only one radar/camera unit being required. Surveillance cameras installation “The site’s remote countryside location, coupled with its significant slope and numerous access points along its perimeter, presented many challenges,” says Craig Vardy, Managing Director of VARTEC. “Lowther Renewables required coverage of the entire solar farm and it would normally have required several traditional security cameras to provide adequate surveillance coverage which would have been prohibitively expensive. However, we were able to negate the need to install several surveillance cameras by specifying just one 360 Vision Predator Radar camera unit to cover the same area.” Object detection Predator Radar works in all-weather scenarios (rain, fog, snow, mist) providing uninterrupted protection Designed for applications where wide area detection and tracking of moving objects is required, Predator Radar works in all-weather scenarios (rain, fog, snow, mist) providing uninterrupted protection by scanning 360° twice every second, to detect and automatically track up to 40 simultaneous objects. “At the site, on detection of an object by the Predator Radar camera, an alarm activation is sent to the NX Witness VMS via an I/O module." Live and recorded video and audio "NX Witness sends this alarm onwards to the Sentinel alarm management platform at the Doncaster Security Operations Centre (DSOC), where alarms are prioritised and evidence for the events is retrieved. This provides the operators with live and recorded video and audio, allowing them to make a quick and accurate decision as to the cause of the alarm." "Operators are guided through pre-defined manual and automated actions, based on the cause, to ensure a rapid response to the situation. The whole alarm handling process is fully audited allowing further analysis and reporting post alarm handling.” Real-time activation At DSOC, any Predator Radar camera alarm activations are overlaid on the screen to notify the operator DSOC detects, responds, and reports any threat activation in real time, meaning the solar farm is protected and immediately aware of any security issues. At DSOC, any Predator Radar camera alarm activations are overlaid on screen to notify the operator that an intruder has been detected, and tracking images are automatically sent to the operator’s screen for visual confirmation, all while the object is continuously and automatically tracked, whatever its path onsite. Dispersing threats On verification of an alarm threat, DSOC operators analyse the video data to make an informed decision; to either contact the police, a keyholder, or OCTAGA, Hereford (a key-holder/physical patrol guarding service who responds in the event of an incident needing attendance). Providing an additional deterrent and avoiding the requirement for a physical attendance to the site for every activation, the Predator Radar camera carries integrated LED white light capability, to help confirm and disperse threats in the hours of darkness. Cloud-based NX Witness VMS In addition to DSOC, monitoring of the site and events can also be performed via a cloud-based NX Witness VMS “Since its installation, the VARTEC installed radar-based camera system has run trouble-free and there have been no false alarms, thanks to visual verification from DSOC,” says Anthony Lowther, of Lowther Renewables. In addition to DSOC, monitoring of the site and events can also be performed via a cloud-based NX Witness VMS, where the transmitted video and data can be accessed remotely and a live insight viewed via a graphically rich desktop interface. Error-free security surveillance solution Craig Vardy adds, “Using the unique capabilities of the 360 Vision Technology Predator Radar camera, we were able to provide an error-free security surveillance solution while also saving the customer money on capital outlay by using just one radar unit, versus the several traditional video cameras that would have been otherwise required to secure this large solar farm site.” “We are very happy to have been able to support VARTEC and Lowther Renewables to secure an effective solution for their challenging wide area surveillance challenge at the solar farm site,” says Craig Carton of 360 Vision Technology. Radar camera solutions “Across the globe, our innovative radar camera solutions are supporting high-security, safety, and site management applications, from the protection of national borders to protecting utility and commercial sites." "This 5-acre solar farm project underlines the highly effective surveillance capability of the Predator Radar camera range.”
An end-to-end IDIS video solution has overcome performance, quality, and affordability challenges that had hampered public space surveillance in Bristol city centre. The upgrade, which tackled a growing list of problems including degraded picture quality, unreliable transmission and data storage, and poor usability, has been completed at Temple Quay and Glass Wharf by KIS Fire & Security. GDPR-compliant video surveillance The successful project is enabling significant operational improvements by the 24/7 security team that manages the site, according to Property Manager, Avison Young. The company reports faster responses to medical incidents and more effective prevention of petty crime and antisocial behaviour, thanks to surveillance coverage without blind spots and the ease with which officers can retrieve and export GDPR-compliant video evidence to support police investigations. Temple Quay and Glass Wharf The original video system at the site was almost twenty years old and proving to be increasingly unreliable Temple Quay and Glass Wharf are part of the Bristol Temple Quarter Enterprise Zone which is home to hundreds of businesses, government offices, serviced offices and co-working spaces, bars, restaurants, and residential properties. The original video system at the site was almost twenty years old and proving to be increasingly unreliable, with underground cabling and equipment prone to flooding and cameras producing increasingly poor-quality images. Challenges faced "The problems were made worse by a cumbersome VMS operating system," says KIS Director - Rob Morgan, adding “The prospect of a complete system upgrade seemed daunting because it would need a complete replacement of the backbone infrastructure, cameras, recorders, etc. and a new VMS management system." He continues, "But we were able to satisfy Avison Young with IDIS technology, showing them a major public space system that we’d recently completed for Bristol Zoological Society.” IDIS Center VMS The new solution, managed by the cost and licence-free IDIS Center VMS, includes NDAA-compliant 8MP IDIS PTZ cameras delivering superior images at up to 31x zoom; vandal-resistant 5MP IR dome cameras; 8-ch 4K recorders supporting UHD display; a specialist network operator’s keyboard; plus, mountings, POE switches, and all other network accessories. The system is easier to use and gives the security team complete area coverage, including full visibility KIS completed the upgrade ahead of schedule in under four months, with rapid installation supported by IDIS plug-and-play DirectIP® technology ensuring instant and seamless functionality of all devices. The system is also easier to use and gives the security team complete area coverage, including full visibility along – and across – a waterway that runs through the site. Instant device functionality “With IDIS, the instant full functionality of all devices means we can be more certain about completion times, even for major public space projects like Temple Quay and Glass Wharf,” says Rob Morgan. He adds, “The system also comes with extended warranties, and failover protection against loss of data in the event of network instability - for public area surveillance this kind of reliability is essential.” Award-winning solution “Following our successful partnership with the award-winning solution for Bristol Zoo, IDIS was delighted to support KIS with this major city centre surveillance project,” says Jamie Barnfield, Senior Sales Director, IDIS Europe. He adds, “Both these projects show video technology at its best, helping to create welcoming public spaces where people can feel safe.”
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
“Deep learning” is recently among the more prevalent jargon in the physical security industry, and for good reason. The potential benefits of this subset of artificial intelligence (AI) are vast, and those benefits are only now beginning to be understood and realised. But how can we separate the marketing hype from reality? How can we differentiate between future potential and the current state of the art? To clarify the latest on this new technology, we asked this week’s Expert Panel Roundtable: What is “deep learning?” How well does the security industry understand its full potential?
Products
Videos
PTZ cameras: Manufacturers & Suppliers
- Hikvision PTZ cameras
- Dahua Technology PTZ cameras
- Hanwha Vision PTZ cameras
- AV Costar PTZ cameras
- LILIN PTZ cameras
- Bosch PTZ cameras
- Axis Communications PTZ cameras
- Pelco PTZ cameras
- Vicon PTZ cameras
- Avigilon PTZ cameras
- Honeywell Security PTZ cameras
- Videotec PTZ cameras
- Sony PTZ cameras
- Messoa PTZ cameras
- Verkada PTZ cameras
- IDIS PTZ cameras
- FLIR Systems PTZ cameras
- Illustra PTZ cameras
- TruVision PTZ cameras
- Visionhitech PTZ cameras