Video Management System
FLIR will highlight its pioneering security and safety solutions at Intersec 2025 (Dubai World Trade Centre, 14-16 January), specifically focusing on visible cameras, thermal cameras, and radar systems for use in challenging environmental conditions and applications. Whether they need 24/7 perimeter monitoring, long-distance intrusion detection, or fire protection, visitors to Booth SA H11 will discover that FLIR has the optimal solution. Intelligent monitoring of outdoor sites A case in poin...
Wavestore, a global provider of video management solutions, is excited to announce the appointment of Jeff Wood as Vice President of Sales for North America. Jeff Wood Bringing over 30 years of experience in the security industry, Jeff is set to lead Wavestore’s expansion across the region with his proven expertise in integrated, client-centric security solutions. His leadership will drive initiatives such as enhancing partner collaborations, introducing advanced AI-powered analyti...
IDEMIA Public Security North America, the provider of secure and trusted biometric-based solutions, in partnership with the West Virginia Division of Motor Vehicles (DMV), is proud to announce the launch of the next generation of mobile ID (MID) in the state. West Virginia residents will have access to enhanced security and convenience when presenting their ID for airport security screening, age-restricted products, and other identity checks. West Virginia mID app The West Virginia mID app, a...
Matrix, a trusted provider of security solutions, has rolled out a series of exciting updates to its IP Video Surveillance Solutions. These new features are designed to provide enhanced functionality, better integration, and ease of surveillance management for users across industries. Here’s what’s new: Supercharged version for NVRs Matrix Network Video Recorders now come with improved performance parameters, ensuring smoother operations for users managing high-resolution surveilla...
The solar system has fascinated mankind for thousands of years. Astronomical research is looking for answers to the big questions of human existence. How big is the universe? How did it come into being? Astronomers all over the world are casting their gaze into space. However, it is not only huge space telescopes that provide spectacular images, smaller telescopes equipped with standard industrial cameras also allow backyard astronomers to look far and gain new insights. Image sensors&nb...
VIVOTEK (3454-TW), the globally renowned security solution provider, continues to demonstrate exceptional capabilities by securing the 14th spot in the 2024 Security 50, remaining the only Taiwanese company in the top 20. This marks the company's 12th consecutive year in this prestigious ranking. AI security solutions The Security 50, organised by a&s magazine (asmag.com), is one of the most respected rankings in the security industry. Since 2003, it has evaluated global pioneers based o...
News
Amthal Group Companies has announced its new partnership with Eagle Eye Networks, becoming a certified reseller of its innovative cloud video surveillance solutions. Cloud-based security solutions This collaboration marks an important milestone for the fire safety and security specialist, as it expands its offerings to include Eagle Eye Networks' cloud-based security solutions powered by artificial intelligence (AI) and advanced analytics. Eagle Eye Networks is a pioneer in cloud video surveillance, delivering cyber-secure, cloud-based video surveillance that enhances business efficiency and security. Eagle Eye Cloud VMS “Eagle Eye Networks welcomes Amthal Group Companies as a valued partner, recognising their ambition to grow and lead in the security space with the latest technology,” said Rishi Lodhia, Managing Director EMEA at Eagle Eye Networks. “With our Eagle Eye Cloud VMS, Amthal is now equipped to provide businesses of all sizes with secure, scalable, and future-proof video surveillance solutions. This partnership enables Amthal’s clients to leverage AI-driven analytics, customisable systems, and comprehensive support.” Flexible pricing plans The Eagle Eye Cloud VMS is purpose-built for the cloud and AI, offering infinite scalability Eagle Eye Networks' 100% cloud-managed solutions are smart, simple, and secure, providing businesses with scalable, flexible, and cost-effective options to proactively monitor commercial sites in real time. The Eagle Eye Cloud VMS (Video Management System) is purpose-built for the cloud and AI, offering infinite scalability, flexible pricing plans, advanced analytics, and an open RESTful API platform for unlimited customisation. Eagle Eye University training programme As part of the partnership, Amthal Group Companies sales and technical teams will complete the Eagle Eye University training programme, gaining expertise in all aspects of the platform. “We are excited to partner with Eagle Eye Networks and integrate their renowned cloud security solutions into our portfolio,” added Paul Rosenthal, Group Business Development Director at Amthal Group Companies. Scalable and flexible video surveillance solutions “This collaboration aligns with our commitment to delivering total protection. It provides us with the tools, resources, and support needed to meet the growing demand for secure, scalable, and flexible video surveillance solutions." "Together, we can help businesses enhance their security infrastructure, streamline operations, and scale sustainably.”
Siemens and Genea recently announced a second collaborative effort to provide security professionals and facility managers with improved security using the cloud. The security solution allows teams to leverage their existing technology, like security cameras, door readers, controllers and more, and manage it all from a modern dashboard, anytime, anywhere. Siemens’ security customers Through Genea’s customisable, cloud-based, open API platform, Siemens’ security customers can now integrate various current building systems or applications, such as visitor management, Apple Wallet, video management or identity management. Genea makes it possible to assign and distribute NFC and Bluetooth mobile credentials directly to users’ smartphones. As an added convenience, credentials can also be stored in Apple and Google Wallet, for easier accessibility. Integrated systems Customers can transition to the cloud without paying to replace their entire hardware system Since Genea runs on non-proprietary door readers and Mercury controllers, customers can transition to the cloud without paying to replace their entire hardware system. This commitment to open standards helps guarantee that the integrated systems will provide exceptional performance while safeguarding customers' investments in security infrastructure. Genea's advanced platform "Teaming up with Genea underscores our dedication to expanding the Siemens Connect Ecosystem program by delivering top-tier security solutions using non-proprietary Mercury hardware," said Rich Reidy, US Security Segment Head of the Buildings business at Siemens Smart Infrastructure USA. "As a trusted and proven pioneer in the industry, Genea's advanced platform and flexible technology align perfectly with our goal of offering cutting-edge, adaptable solutions for the future.” Flexible security solution Genea and Siemens first collaborated 5 years ago with the goal of enhancing real estate operations Genea and Siemens first collaborated five years ago with the goal of enhancing commercial real estate operations. With Genea On-Demand HVAC and Genea Submeter Billing, property teams were able to drive significant energy savings and operational efficiencies. This latest joint effort gives Siemens’ customers a flexible security solution that remains adaptable to the evolving needs of enterprises, universities, schools, healthcare facilities, commercial real estate properties and other markets. Transition to cloud-based security "We are excited to once again collaborate with Siemens, a company that shares our dedication to innovation and excellence," said Eric Moe, Senior Vice President of Sales, Security at Genea. "This latest endeavour that targets the physical security market allows us to pair with an industry pioneer and help more organisations transition to cloud-based security.”
According to the 2024 Access Control report by Omdia, Genetec., the pioneer in enterprise physical security software, has consistently gained market share over the last six years, solidifying its position as a worldwide market pioneer and building upon its #2 global position for access control software. In the Americas market, access control software has evolved beyond the physical security department to become an essential component of business operations. 2024 Access Control report According to the Omdia report, this broader adoption has increased demand for unified security platforms that allow organisations to manage systems - such as access control, video surveillance, and intrusion detection - through a single interface. By anticipating market needs for access control innovation, Genetec continues to expand its market share, growing at a 28% CAGR over the past six years. Access control innovation “While many legacy access control vendors rely on acquisitions to expand their market share, Genetec has achieved rapid organic growth through innovation and investment in new technologies,” said Christian Morin, Vice President of Product Engineering, Genetec Inc. Christian Morin adds, “Over the last year, we introduced Security Center SaaS, HID Mercury Security MP controllers, Axis Powered by Genetec, and an I/O module in partnership with STid as part of our European high assurance access control system offering. This demonstrates our commitment to expanding our access control portfolio through innovation and partnerships, paving the way for future growth.” Providing adaptable solutions Omdia also reports that end users in the region prefer open systems that offer flexibility and customisation In a highly fragmented EMEA market, Genetec remains among the top 10 access control software providers by focusing on open architecture systems that allow users to integrate components from different vendors. Omdia also reports that end users in the region prefer open systems that offer flexibility and customisation. This further supports the company’s strategy to provide adaptable solutions tailored to the region, as evidenced by its partnership with STid. Strong integration capabilities In the Asia-Pacific region (excluding China), Genetec continues to rapidly expand its market share, reaching #6 position (up from #10 in 2021). As enterprise users and multinational corporations modernise their access control infrastructure, they seek feature-rich, cyber-secure systems with strong integration capabilities. An open-architecture solution, such as the Genetec access control solution, allows organisations to secure assets and people, enhance business operations, and easily upgrade technology at their own pace. Full cloud deployments Genetec has retained its #1 global position in the VMS market while also ranking #1 in the combined VMS The Omdia report also indicates that the access control market is increasingly adopting hybrid cloud deployments. Genetec is at the forefront of this change. Security Center SaaS is a physical security solution that brings the power of Genetec access control and video management to the cloud. Security Center SaaS supports hybrid or full cloud deployments, allowing organisations to move components and sites to the cloud based on their needs and requirements at their own pace. Genetec solutions Because Genetec solutions are based on an open platform architecture, users choose the access control devices that best suit their needs while also preserving their existing investments. In addition to its success in access control, Genetec has retained its #1 global position in the VMS market, while also ranking #1 in the combined Video Management Software (VMS) and Video Surveillance as a Service (VSaaS) market, according to Omdia’s recently released 2024 Video Surveillance & Analytics Database Report.
AMAG Technology is pleased to announce the appointment of Chris Meiter as AMAG Technology's Vice President of Global Business Development for Video Solutions. This new role underscores the organisation’s continued expansion support to its entire technology suite. Chris Meiter comes from Salient Systems, which is a decade-long strategic video partner of AMAG Technology. The appointment of Chris to this new position is a strategic win for both AMAG Technology and Salient Systems, offering enhanced opportunities for collaboration and product evolution that will directly benefit integrator and end-user customers. Growth strategy "We are thrilled to welcome Chris to our commercial leadership team," said AMAG Technology Executive Vice President of Sales, Marketing and Commercial Excellence, Kyle Gordon. "His extensive experience and deep understanding of customer needs in the video market will be instrumental in our growth strategy. Chris’ expertise will allow us to better serve our customers by delivering superior support.” AMAG’s capabilities AMAG Technology’s President, David Sullivan, added, “This new role highlights our commitment to growth and to securing top-tier leadership. With Chris on board, we are not only expanding our leadership team but also investing in a program that prioritises customer needs and emphasises the value we bring with Symmetry CompleteView." "This focus will ensure that our customers feel supported, heard, and confident in AMAG’s capabilities as a video and security solution provider.” AMAG Technology and Salient partnership “Chris Meiter’s new role within Kyle Gordon’s commercial leadership team highlights the strength of the AMAG Technology and Salient partnership." "Chris’ deep knowledge and experience, developed during his time at Salient, will now help AMAG’s global sales team to effectively showcase the Symmetry CompleteView Video Management System,” said Salient Systems CEO, Bob Wilbur. AMAG Technology’s video-selling strategy Meiter established and implemented AMAG Technology’s video-selling strategy and ensure support Chris Meiter will establish and implement AMAG Technology’s video-selling strategy and ensure seamless support for all video-related initiatives. Meiter will work closely with commercial pioneers to develop training programs, empowering the global sales team to demonstrate AMAG Technology’s Symmetry CompleteView Video Management System. He will work with cross-functional teams such as product management, engineering, and marketing to help develop and refine the company’s market approach. Integrated security solutions As the security landscape continues to evolve, both companies are committed to staying ahead of customer needs by leveraging their combined strengths. Together, AMAG Technology and Salient Systems are confident this transition will reinforce their partnership, allowing both companies to deliver innovative, fully integrated security solutions globally.
At ISC East 2024, Hanwha Vision (Booth 607) is redefining the role of surveillance technology as a total business solution. The company is highlighting its full range of AI-powered, cloud-connected surveillance solutions, from hardware devices offering 24/7 protection to software-based business intelligence tools delivering new data-driven business insights. AI in Hanwha Vision’s IP cameras Attendees will see new applications of AI in Hanwha Vision’s IP cameras and new cloud capabilities enabling on-premise and remote surveillance management, giving security professionals the highest level of flexibility for managing their surveillance resources. “We need to continually think differently and adapt to the changing needs of our customers and the industry,” said Tom Cook, Executive Vice President of Sales and Marketing, at Hanwha Vision America. Comprehensive, intelligent technologies “What worked as recently as two years ago won’t work today, and certainly not for tomorrow. Surveillance is no longer viewed only as devices that monitor and protect." "These comprehensive, intelligent technologies are now regarded as 360-degree, total business transformation solutions, and that’s what Hanwha Vision is bringing to ISC East.” Hanwha Vision highlights at ISC East 2024 Hanwha Vision has partnered with NVIDIA to design an entirely new camera, the 4-channel AI Multi-sensor Camera Hanwha Vision has partnered with NVIDIA to design an entirely new camera, the 4-channel AI Multi-sensor Camera with WAVE VMS Powered by the NVIDIA Jetson™ Platform. The new camera’s integration with the NVIDIA Jetson module provides Hanwha AI multi-sensor camera devices with up to an additional 100 Tera Operations Per Second (TOPS), plus immediate access to the NVIDIA AI app ecosystem. Customers can use this processing power to leverage existing and custom-developed applications for the NVIDIA chipset to seamlessly enable new analytics and capabilities unavailable on competitive cameras. AI Multi-sensor camera The new AI Multi-sensor camera (PNM-C32084RQZ-8XE4T-W) is the first Hanwha Vision model to use the power of the NVIDIA Jetson™ platform, delivering an unprecedented combination of reliable serverless recording, on-board storage, and intelligent camera performance through an embedded instance of Wisenet WAVE VMS. The new camera can record up to 16 camera streams to 4TB of onboard storage (2 x 2TB SSD). Newly added Boolean Logic rules give users more precise control over setting up event actions. The camera’s WiseNRII and Preferred Shutter Speed features eliminate noise and motion blur for clear imagery in all conditions, while AI technology monitors people and vehicles with loitering and line-crossing analytics. AI Box (AIB-800) The AI Box supports real-time AI video analytics across up to eight channels, detecting and classifying people The AI Box (AIB-800) further expands the scope of Hanwha Vision’s partnership with NVIDIA, allowing the easy addition of AI functionalities to standard security cameras without built-in AI. The device’s integration with the NVIDIA Jetson Orin module enables the use of the latest edge AI analytics, with additional processing power provided by NVIDIA’s newest system-on-a-chip technology. The AI Box supports real-time AI video analytics across up to eight channels, detecting and classifying people, vehicles faces, and license plates, while distinguishing between monitoring objects and environmental factors like trees, shadows, and animals to reduce false alarms. PTRZ models At ISC East, Hanwha Vision is featuring its diverse range of AI-based security cameras, including dome and Pan-Tilt-Rotate-Zoom (PTRZ) models. One highlight is Hanwha Vision’s 4-channel multi-directional camera (PNM-C16013RVQ), boasting a 360-degree wide-angle view. The most compact 4-channel model available with AI and built-in IR, its versatile design ensures seamless integration in various indoor and outdoor environments. The camera is equipped with WiseStream III, a video compression technology that supports AI analytics while reducing bandwidth and storage requirements. Integrated with IR LEDs, it delivers clear images even in low-light conditions. Cloud-based devices and apps Both DMPro and SightMind enable more intuitive and efficient management of video surveillance systems Hanwha Vision is also showcasing its growing ecosystem of cloud-based devices and apps designed to enable on-premise and remote surveillance capabilities. On display at ISC East are DMPro, which offers device maintenance and health monitoring, and SightMind, which provides AI-powered data analytics with visualised insights. Both DMPro and SightMind enable more intuitive and efficient management of video surveillance systems and support effective data-driven decision-making. OnCloud OnCloud is Hanwha Vision’s new direct-to-cloud video management system providing low-latency access to live and recorded video, searchable clips, event notifications, and more. It’s a fully cloud-based solution for monitoring an organisation's locations and assets, whether it’s across a single facility or multiple sites. The Hanwha Vision products and solutions on display at ISC East 2024 clearly illustrate the company’s goal of accelerating its transition to becoming a platform-centric solution provider delivering business-driven innovations.
Luminys Systems Corp (Luminys), a provider of smart, sustainable, and connected technology solutions announced the launch of its latest suite of security technology products designed for the North American market. The release is scheduled for a public unveiling during the "Luminys Phase 2 Product Launch" webinar on Nov. 15, showcasing an innovative product lineup that meets the modern demands for scalable, intelligent, and compliant security. Product lineup The new suite includes an array of network cameras, Network Video Recorders (NVRs), and the LumiCloud platform, a cloud-based Video Surveillance as a Service (VSaaS) solution. These offerings provide businesses with end-to-end security capabilities tailored for smart building and retail applications, reinforcing Luminys' industry-pioneering technology and longstanding as a pioneer in the security technology space. The product lineup integrates seamlessly with third-party applications and is compatible with existing Luminys technologies, enabling centralised control through the LumiCloud platform. FCC and NDAA compliance standards Freddy Kuo, chairman of Luminys, commented on the launch, "Our new product suite is designed to empower security professionals with tools for diverse applications to stay ahead in today's rapidly evolving landscape." "By aligning with stringent FCC and NDAA compliance standards and focusing on proactive innovation, Luminys is setting a new standard for comprehensive security solutions in North America." Key product highlights LumiCloud VSaaS Platform: Delivers real-time access, advanced analytics, and scalable cloud storage, enabling centralised management of security systems with customisable alerts and remote monitoring through smartphones and web browsers. LumiCenter Video Management Software (VMS): Seamlessly integrates surveillance cameras and AI-powered analytics, providing real-time object tracking, adaptive bandwidth management, and a fully interactive 3D mapping interface. LumiDeterrent Cameras: Featuring advanced LumiDeterrent technology, these cameras use AI-driven red and blue flashing lights, sound alarms, and full-color video capabilities for enhanced deterrence and 24/7 surveillance, even in low-light conditions. R5 LumiSearch NVR Series: Equipped with AI-driven search functionality, the R5 Series enables rapid identification and tracking across multiple camera feeds and supports long-distance Power over Ethernet (PoE) through Luminys's proprietary LumiPower technology. Innovative technology for comprehensive security This lineup is powered by Luminys's proprietary technologies, including: LumiAnalytics for people counting, behaviour analysis, and predictive insights. LumiTracking for automatic tracking of people and vehicles, enabling swift responses to potential security issues. LumiLuxSmart for adaptive lighting control, capturing full-color video when motion is detected and switching to infrared in low-activity environments. Webinar & availability This product launch will be live-streamed on Nov. 15 at 10 a.m. PT. Attendees will gain exclusive insights and demonstrations, including the LumiLuxSmart, LumiDeterrent, and LumiColor camera series. Luminys products will be available through certified dealers beginning Nov. 25, 2024, with pricing details and order information accessible via the Luminys MVP portal.


Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behaviour analysis. These capabilities extend far beyond simple, passive monitoring, offering organisations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognise unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analysing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organisations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyse video feeds in real time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organisations meet strict data privacy regulations and protect sensitive information. Customisation: On-premises systems allow for greater customisation of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralised management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organisations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analysing video data in real time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimise product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimise production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organisations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialised skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organisations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organisations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratise access to advanced AI and ML capabilities for organisations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionising risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organisations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
Security beat
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerged in the consumer and political worlds, the issue cannot be ignored when it comes to the authenticity and protection of video and security data. Video surveillance data SWEAR is a company with the mission to ensure the integrity of video surveillance data by mapping video data and writing it into the blockchain, providing real-time, immutable proof of authenticity. Blockchain, which is the underlying technology that enables cryptocurrencies, is a decentralised digital ledger that securely stores records across a network of computers in a way that is transparent, immutable, and resistant to tampering. SWEAR solution The SWEAR solution is based on proactive, foundational protection that validates data at the source The SWEAR solution is based on proactive, foundational protection that validates data at the source before any opportunity for manipulation can occur. “Our technology is about proving what’s real and our goal is to ensure that security content and video surveillance data remain untampered with and reliable when needed,” says Jason Crawforth, Founder and CEO of SWEAR. Real-time authentication Security leaders need to ensure that the content they are relying on to make mission-critical decisions is authentic. Once verified, organisations can be sure that their investment in video can be trusted for critical use cases, including intelligence operations, legal investigations, and enterprise-scale security strategies. SWEAR seeks to embed trust and authenticity directly into video surveillance content at the point of creation. This ensures real-time authentication while proactively preventing tampering or manipulation before it can happen. AI-generated content The rise of AI-generated content, such as deepfakes, introduces significant challenges As AI transforms the landscape of video surveillance by enhancing threat detection and predictive analysis, it also introduces the very real risk of manipulation through AI-generated content. This presents a significant challenge in protecting critical security data, especially in mission-critical applications. The rise of AI-generated content, such as deepfakes, introduces significant challenges when it comes to ensuring the protection of digital media like video surveillance. Recent study findings It is a fact that digital media content is being questioned more regularly, which puts businesses, legal systems, and public trust at risk. A recent study from the Pew Research Center found that 63 percent of Americans believe altered videos and images create significant confusion about the facts of current issues. Last month, California Governor Gavin Newsom signed three bills aimed at curbing the use of AI to create fake images or videos in political ads ahead of the 2024 election. Footage authenticity “While most of the news cycle has centered on the use of fake content in politics, we need to think about how manipulated videos could affect security,” says Crawforth. “In video surveillance, ensuring the authenticity of footage is critical for keeping operations secure and safe around the world. That means verifying and protecting video data is a must.” Organisations must be capable of performing thorough digital investigations, which involve retrieving and analysing video and security data from devices and networks through a chain of evidence. Digital forensic capabilities Strong digital forensic capabilities also enhance incident response, risk management, and proactive security An in-depth understanding of who has handled video data, how it was handled, and where it has been is an important step in responding to security incidents, safeguarding assets, and protecting critical infrastructure. Strong digital forensic capabilities also enhance incident response, risk management, and proactive security measures, all essential for risk management, regulatory compliance, and cost control, says Crawforth. An unbroken chain of custody “By using tools to identify, preserve, and analyse digital evidence, organisations can ensure swift and accurate responses to security incidents,” he adds. “Using the latest tools and techniques is vital for maintaining a strong security posture." "But you must ensure your digital content isn’t manipulated.” SWEAR’s technology provides an unbroken chain of custody, ensuring that video evidence can be trusted and admissible in court and forensic applications. Authenticating content Authenticating content also strengthens accountability and trust, protecting organisations By verifying video content is protected from tampering, manipulation, or forgery, organisations can be sure that they have reliable evidence that produces actionable results. Authenticating content also strengthens accountability and trust, protecting organisations from legal disputes or compliance violations. Safeguarding digital content “With an increasing amount of disinformation in today’s world, we sought to develop an innovative solution to safeguard the integrity of digital content,” says Crawforth. SWEAR safeguards security content using real-time “digital DNA” encoding. It integrates directly at the video management system level, ensuring it is preserved with a secure chain of custody and maintains integrity for evidentiary purposes. Real-time “digital DNA” encoding The digital DNA is then stored on a blockchain, creating an immutable record The solution integrates with cameras and other recording devices to map this digital DNA of the video data, all in real-time. The digital DNA is then stored on a blockchain, creating an immutable record that tracks the content’s history and integrity. Any attempt to manipulate the media can be instantly detected by comparing the current state of the media to its original, authenticated version. SWEAR is actively collaborating with video management solution providers to integrate the technology into their platforms. Video and security data benefits “We’re still in the early stages of our collaboration in this space, but it is clear that the industry recognises that we have to work together to mitigate this risk proactively before it becomes a significant issue,” says Crawforth. “The feedback we have received from the industry to date has been beyond our expectations, and we expect to have more integration partners to highlight shortly.” “We should approach this as a collaborative effort across the industry, as ensuring the authenticity of video and security data benefits everyone involved,” says Crawforth.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Case studies
Ibstock Place School, a private London co-educational day school nestled in beautiful grounds with a mix of historic and contemporary architecture, faced several challenges. They needed to expand CCTV coverage, ensure guaranteed video retention periods for specific areas at certain times, enhance remote access and event alerting capabilities, and prepare for future analytics integration. The challenge Ibstock Place School identified several challenges with their existing system: Coverage expansion: They needed to expand security coverage across their site. Retention guarantees: Specific areas required guaranteed video retention periods at certain times. Remote access and alerts: The system needed enhanced capabilities for remote monitoring and event alerts. Future-proofing: Requirements included an open platform system with automatic updates and easy integration with third-party technologies. The solution To execute a phased migration to a cloud-based security system, SES Technologies partnered with Eagle Eye Networks to implement a comprehensive cloud solution: Advanced camera integration: New Axis four-megapixel cameras with day/night and IR capabilities were seamlessly integrated into the existing infrastructure. Cloud Video Management System: The cameras were connected to the Eagle Eye Cloud VMS for instant access to live and recorded footage. Phased transition: A carefully planned migration ensured continuity of service during the shift from on-premise to cloud-based systems. The results The implementation delivered a true cloud experience for Ibstock Place School, enabling reliable, secure monitoring of their site while meeting regulatory licencing requirements. Key outcomes included: Significant cost savings: Leveraging existing cameras helped the school achieve a 25% reduction in total cost of ownership. Optimised efficiency: Features like Eagle Eye Smart Video Search, and flexible retention times enhanced operational workflows. Compliance and security: The cloud system provided robust security measures to meet compliance standards. By transitioning to the Eagle Eye Cloud VMS with the expertise of SES Technologies, Ibstock Place School improved its security infrastructure, reduced costs, and enhanced operational efficiency all while positioning itself for future growth and technology integration. Flexible retention time Paul Doran, Facilities Manager at Ibstock Place School, said, "SES Technologies and Eagle Eye Networks have seamlessly integrated our infrastructure with advanced cloud solutions, ensuring effortless regulatory compliance." He adds, "Features like Eagle Eye Smart Video Search, and flexible retention times have enhanced operational efficiency and safety for our school community."
VIVOTEK, the global pioneering security solution provider, has played a pivotal role in enhancing campus safety at CDO Newton, a renowned educational institution in Sint-Niklaas, Belgium, that helps guide students in taking their first steps toward the job market. As CDO Newton expanded its facilities, ensuring the security of students, staff, and visitors across a larger, more dynamic campus became increasingly challenging. To address this, CDO Newton turned to VIVOTEK's state-of-the-art AI security solutions to provide a scalable, comprehensive security system that offers maximum coverage, advanced AI capabilities, and improved operational efficiency. Challenges CDO Newton's previous security infrastructure was unable to effectively monitor all areas CDO Newton's previous security infrastructure was unable to effectively monitor all areas of its expanding campus. It lacked full coverage and had blind spots, while system administrators spent long hours manually searching footage. Additionally, the time-consuming manual video review process hindered the quick identification and response to potential incidents. The institution needed a solution that would: old and outdated. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. VIVOTEK, in collaboration with trusted partners Educorner bvba and Optima Networks, provided a powerful solution that addressed these challenges head-on. By combining VIVOTEK’s AI-powered cameras with a user-friendly video management platform, the solution ensured enhanced campus security, and a more efficient overall system. Solutions VIVOTEK’s security technology played a central role in transforming CDO Newton’s security infrastructure. A carefully planned deployment saw the installation of a range of VIVOTEK cameras, complemented by Network Optix Video Management System(VMS) and VIVOTEK's Deep Search Plugin, to provide an integrated and effective solution. Key components of the system included: 12MP 360-Degree Fisheye Cameras: These cameras deliver panoramic coverage, eliminating blind spots and reducing the number of cameras needed. With their wide coverage area, they also minimise installation and maintenance costs, offering a highly cost-effective long-term solution. 5MP 180-Degree Panoramic Cameras: Ideal for areas requiring broad, high-definition coverage, these cameras ensure clear, distortion-free footage across key zones. 89-v2 Fixed Dome Cameras: These cameras were strategically placed to secure high-risk areas, delivering clear, AI-powered analytics that support enhanced object detection and incident management. Network Optix VMS and VIVOTEK Deep Search Plugin: Integrated into the system, these tools significantly enhance usability, enabling security personnel to quickly search and identify objects and individuals within large video datasets using advanced AI-based filters. Key benefits to CDO Newton Comprehensive Coverage with Cost Savings: VIVOTEK’s combination of 360-degree and 180-degree panoramic cameras ensures wide coverage of CDO Newton’s campus, reducing the need for additional cameras. This translates to lower installation and maintenance costs while still providing robust security coverage. AI-Powered Object Detection and Real-Time Alerts: Equipped with VIVOTEK’s Edge AI technology, the system’s advanced object recognition capabilities detect unusual trespassing in restricted areas or unauthorised vehicles parked in no-parking zones. This ensures security staff can investigate and intervene promptly, minimising risks and enhancing overall campus safety. Intuitive Video Management: The integration of VIVOTEK’s Deep Search Plugin with Network Optix VMS provides a user-friendly interface that allows security staff to easily manage and monitor live footage, conduct investigations, and access historical data. This streamlined process reduces the need for extensive training and enhances operational efficiency. Scalability for Future Growth: The modular nature of the system ensures that it can be expanded to meet the future needs of CDO Newton as the campus continues to grow. Additional cameras can be easily added without significant disruption to existing operations, ensuring that the institution’s evolving security requirements are met. Results and customer feedback VIVOTEK, in collaboration with local partners Educorner bvba and Optima Networks, successfully implemented an efficient security solution at CDO Newton. This exciting example demonstrates the integration of innovative technology and expertise to create a secure, scalable, and cost-effective system, providing a safer learning environment for both campus management and students. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
Ohio’s Nationwide Arena, home of the Columbus Blue Jackets of the National Hockey League (NHL), is protected by an outdated, end-of-life security system. The cost to maintain and repair it was becoming unsustainable. The system is composed of multiple disparate systems with different interfaces and management systems, and multiple requirements for software updates and support. Situational awareness The Security Director of the Arena wanted to modernise the system to enable proactive alerts for situational awareness and a unified platform to manage and visualise all 350 cameras installed across the venue. Offering a camera-agnostic solution, Hive Logic chose to keep the existing camera deployment and retrofit it with a powerful video management system. A 3-cluster enterprise server is used to manage all video streams and access control systems, empowered by Hailo’s AI accelerators for high-computer workloads. The Product The Hive software enables video management, access control, and AI video analytics running applications such as: People count to monitor the entrance and exit of the venue. Zone management for high traffic/dwell time. Security forensics to identify regulation violations and crime. Storage and search to identify past events and provide video evidence. Iron Link servers from Velasea are used in a cluster, sharing data to distribute workload and uptime. Each server is equipped with a HailoCentury 0804 PCIe acceleration card with 104 TOPS. Why Hailo? Lower Cost: The previous system did not include AI capabilities. GPUs were considered in the past but were too expensive to deploy at such scale. Hailo brought the most cost-effective solution while maintaining high computing capabilities. Scalability: Hailo’s scalability allows more cameras without overloading the central processing infrastructure while maintaining high accuracy in detecting and identifying objects. AI/ML pipeline “Hailo is the ideal choice for our product because it enables real-time analytics on camera streams, without relying on a central analytics server. This enhances bandwidth efficiency and overall performance while reducing power consumption." "Now we have a very robust AI/ML pipeline to rapidly deploy new AI models onto our edge devices," said Nate Green, Hive Logic, CEO. Effective and simple “I am grateful for HIVE and the wonderful technologies they offer as a standard package," Barry Kirby Security Director, Nationwide Arena. "The introduction of Hailo then makes it a highly effective and simple system to navigate.”
Type of Site: Apartment Building Location: Chodkiewicza 10, Warszawa, Poland The situation This housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. One entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution highlights Easy Intercom Retrofitting with Existing Cables. Remote Access with App-based Features. Good Scalability for Easy Addition of New Units or Expansion. Installed products S615 4.3” Facial Recognition Android Door Station 290-S8 7” Linux Indoor Monitor (2-wire Version) Solution benefits Future-proofing: With DNAKE 2-wire IP intercom solution, residents can enjoy high-quality audio and video communication, multiple access options including remote access, and integration with surveillance systems, providing a more versatile and secure living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
Motorola Solutions announced that Lancashire Police will deploy the M500 in-car video solution across its entire fleet of vehicles. The new video solution observes the vehicle’s environment from multiple viewpoints to provide officers with real-time awareness of their surroundings, whilst capturing video evidence that can provide accurate incident documentation to aid investigations. Motorola Solutions M500 "Police officers face unpredictable challenges and fast-moving events every day,” said Chris Hardy, chief superintendent for Lancashire Police. “The ability to respond quickly is paramount. The Motorola Solutions M500 can live-stream video back to the control room, enabling our team to build a clear picture of unfolding events by giving us eyes on the scene. It is a highly configurable, easy-to-use system that can automate processes such as triggering video recording when the blue lights are activated, helping officers to focus on the job at hand.” Technological and organisational capabilities Lancashire Police has made some recent investments in new technological and organisational capabilities Lancashire Police has made a number of recent investments in new technological and organisational capabilities. Since its establishment in June 2023, Lancashire Police’s Roads Crime Team and Roads Policing Unit, with support from wider police departments in the county, has been integral to efforts to locate and recover vehicles and assist with road traffic collisions. The deployment of the M500 in-car video solution will provide front-line officers with an additional tool to help fulfil its priority of making the roads safer for the community. Motorola Solutions VideoManager The M500’s interface is designed to be intuitive for officers to operate in demanding situations. Video captured is automatically uploaded to the Motorola Solutions VideoManager for secure, auditable storage that is intelligently organised. Recorded footage is tracked and audited to protect the chain of custody so that the police, public and judicial systems can be confident in the integrity of video evidence. VideoManager’s consolidated incident overview also helps to ensure that incident information, including footage recorded by the M500, as well as Lancashire Police’s body cameras, can be easily viewed from one location. Video security solutions “Video security solutions are a vital tool for police officers as they work to help keep their communities safe,” said Fergus Mayne, U.K. and Ireland country manager, Motorola Solutions. “As part of the Motorola Solutions safety and security ecosystem, the M500 connects with Lancashire Police’s existing mission-critical technologies, providing productivity and agility to the forces operational response to help protect people, property and places." Motorola Solutions’ Pronto application Motorola Solutions has been trusted by Lancashire Police throughout its digital transformation, supporting the force’s evidence capture, data storage and workflow efficiency. The M500 will complement the force’s existing technology infrastructure which includes Motorola Solutions’ Pronto Digital Policing application, TETRA radios and VB400 body cameras.
České Budějovice is a city located in Southern Bohemia in the Czech Republic that serves as the regional capital, with important commercial and political ties, and is the seat of many large corporations. An important trans-European road, the E55, that runs from Sweden to Greece also passes through the city. Protecting the citizens and visitors of České Budějovice on the roads is extremely important, both for strengthening the tourist attractiveness of the city and for ensuring smooth travel. The city of České Budějovice (the municipality) was awarded a tender for the installation of a traffic system with more than 170 cameras. The system was to ensure the protection of road users and pedestrians. Automatic incident detection Camera models include the X series cameras-XNO-6080R, XNO-6120R, XNP-6400R and XNO-6123R The winner and supplier of the contract were Swarco Traffic Cz s.r.o. and Telmo a.s., having proposed the best solution in cooperation with distributor, Abbas, a.s. This solution included cameras from manufacturer Hanwha Vision, combined with a video management system (VMS) by Genetec and an automatic incident detection and traffic collection system from the Italian technology company, Sprinx. The solution provides continuous recording and analysis of major roads in the city. Camera models include the X series cameras - XNO-6080R, XNO-6120R, XNP-6400R and XNO-6123R, the PNB-A9001LP 4K RoadAI camera, the multi-sensor camera PNM-9031RV, and the PNO-A9081R 4K AI bullet camera. PNO-A9081R for business intelligence The PNO-A9081R camera features 4K resolution with real-time day/night recording and integrated infrared illumination up to 30 metres away, enabling continuous outdoor surveillance. Edge AI in the camera provides accurate AI object detection and classification as well as valuable business intelligence including people, vehicle and heatmap analytics within pre-defined areas. This solution improves the accuracy of object detection and alerts, reducing time-consuming false alarms caused by wildlife, waving trees and shadows. PNB-A9001LP for efficient traffic management The camera is ideal for monitoring busy urban traffic and covers up to two lanes at speeds up to 100 km/h The PNB-A9001LP, 4K RoadAI camera is a comprehensive traffic monitoring solution with pre-installed and licenced ANPR, Make/Model and Colour Recognition (MMCR) and vehicle classification analysis. The camera is ideal for monitoring busy urban traffic and covers up to two lanes at speeds up to 100 km/h. Edge AI provides valuable insights and reduces false alarms, with analysis performed within the device itself to reduce server requirements and save energy and costs. In addition, the camera is equipped with a licence plate list management function, while the camera output can be connected to an access control system, helping operators manage parking lots and toll roads. PNM-9031RV for panoramic view The PNM-9031RV outdoor multi-sensor IP camera is equipped with four 5MP sensors and a 192° panoramic view that covers wide areas. Each sensor can also be remotely adjusted with pan and tilt capabilities. Operators can transmit surveillance footage through four separate channels or as a linked panoramic view. Artificial intelligence for faster responses MKDS project was funded by the Transport Infrastructure Fund and a grant from the European Union AI-powered features enable better situational awareness, supporting faster responses to emergencies such as accidents or stopped vehicles, evidence for investigations, and detailed insights for future city planning. This includes vehicle counting and classification, which can be used to inform road management and parking. Meanwhile, the detection of stopped vehicles and congestion means that operators can take appropriate action when necessary, such as opening new routes and rerouting vehicles to keep traffic flowing in the city. The MKDS project was funded by the Transport Infrastructure Fund and has a contribution from the European Union. Monitoring and analytical features Ing. Zuzana Trousilová, Deputy Director for Internal Affairs and Methodology from the Municipal Police of České Budějovice, said: "When it comes to monitoring and ensuring safety on the roads of our city, Hanwha Vision cameras fully meet the specified requirements for camera parameters and are compatible with the integration needs of the operational software applications." With its monitoring and analytical features, the video surveillance system provides the city with vital information for solving traffic and safety issues in the municipal area of České Budějovice.


Products


Round table discussion
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market presents a number of challenges. We asked this week's Expert Panel Roundtable: What are the unique aspects of the government market, and how should the industry adapt?
The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how well do security integrators provide end users with what they need? We asked this week’s Expert Panel Roundtable: What are the biggest challenges that end users face when working with integrators?
White papers

How to lower labour costs when installing video surveillance
Download
Understanding all-in-one solutions
Download
How video technology is transforming loss prevention, operations, and customer experience in the retail sector
Download
Troubleshooting IP video systems
Download
2024 trends in video surveillance
Download
The real cost of an outdated Video Security System
Download
5 easy steps to an upgraded video surveillance system
Download
VSS - Top 4 questions to get you started
Download
Why SAAS Security Platform is more popular in American SMEs
Download
Camera cyber lockdown
Download
Video technology strategies for hospitals are moving beyond security
Download
Healthcare Surveillance: Finding efficiencies from OR to ER and beyond
Download
Unlocking wide-angle camera dewarping
Download
Intelligent video security solutions
Download
Simple Security Solutions for SMBs
Download

Videos
Video Management System: Manufacturers & Suppliers
- exacqVision Video Management System
- Honeywell Security Video Management System
- Dahua Technology Video Management System
- Bosch Video Management System
- AMAG Video Management System
- Meyertech Video Management System
- March Networks Video Management System
- Hikvision Video Management System
- OT Systems Video Management System
- Eagle Eye Networks Video Management System
- Axis Communications Video Management System
- Video Storage Solutions Video Management System
- Senstar Video Management System
- IDIS Video Management System
- Vicon Video Management System
- Hanwha Vision Video Management System
- Geutebruck Video Management System
- AV Costar Video Management System
- Vanderbilt Video Management System

The key to unlocking K12 school safety grants
Download
Honeywell GARD USB threat report 2024
Download
The truth behind 9 mobile access myths
Download
5 surprising findings from OT vulnerability assessments
Download
Physical access control
Download