Video Management System
{##Poll1719556378 - Which is the most challenging obstacle to entering the government market?##} Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market presents a number of challenges. We asked this week's Expert Panel Roundtable: What are the unique aspects of the government market, and how should the industry adapt?
Matrix, a pioneer in advanced security and telecom solutions, is thrilled to announce its participation in the upcoming Police Expo 2024. Scheduled for July 4th-5th at Pragati Maidan, New Delhi, this premier event will serve as a platform for Matrix to exhibit its innovative IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions. OWASP ASVS 4.0 L2 standards Revolutionising Security with Advanced Solutions At Police Expo 2024, Matrix will demonstrate its robust security...
The new T series wall-mount cameras from Hanwha Vision solve the obstructed-view challenges associated with dome surveillance devices in high overhead mounting positions. The new cameras deliver an “eye-level,” nearly 180° panoramic field of view while capturing detailed 5MP resolution video for accurate people and object identification. The T series cameras (model TNV-C8011RW) can fit a range of commercial surveillance applications requiring wide fields of view of any...
Paxton Access, the international security technology manufacturer, has recently welcomed new additions to their Training team, to support the growing demand for installer training. Zehn Zzyrone has taken the role of Field Training Engineer, and Casey Cribbin has joined as Senior Product Trainer. Zzyrone and Cribbin will focus on introducing Paxton’s smart access control solutions to customers and assisting them in growing their security business. Wealth of experience Brian Bonser, Vice...
Matrix, a pioneer in security solutions, is excited to announce the launch of the SATATYA VMSP, a new Video Management Software Platform. This enterprise-grade, server-based Network Video Recorder provides a turnkey video surveillance solution for medium to large organisations. Coming in three variants, supporting up to 255 Channels each, this VMSP server has 8/16/24 SATA Channels with a storage capacity of 144TB/288TB/432TB each. Challenges faced by customers Many businesses struggle w...
Axis Communications celebrated the grand opening of its latest Axis Experience Centre (AEC) in Frisco, Texas on Wednesday, May 8, 2024. The new Dallas-area facility replaces the original Irving AEC location with a larger, state-of-the-art facility built to accommodate the need for a greater Axis presence in North Texas and to better serve customers as the Axis product portfolio expands and its partner ecosystem grows. The space also offers additional meeting space, with plans to expand staffing...
News
Hospitals are turning to video technology to enhance patient care and safety with the rising demand for healthcare services and the ongoing battle against staffing shortages. However, hospitals looking to expand their video technology must ensure their surveillance systems are compliant with the Health Insurance Portability and Accountability Act (HIPPA). Being HIPAA compliant helps protect patient privacy and safeguard sensitive health information. This is non-negotiable in the digital age. With the increasing adoption of healthcare video analytics and artificial intelligence (AI) technology, it’s more crucial than ever to strike the right balance between leveraging technology and maintaining HIPAA compliance. This article explores how they can establish a HIPAA-compliant video surveillance system for the healthcare facility. HIPAA compliance in video surveillance Video analytics in healthcare systems must be set up in a way that saves patient privacy at every turn HIPAA extends beyond paperwork and digital records — its regulations include video surveillance and electronically protected health information (ePHI) in healthcare settings. While HIPAA does not specifically address video surveillance, its requirements for privacy and security of PHI affect how it should be implemented. This means anything that could identify a patient, whether their name, medical history or face in a video, falls under HIPAA’s watchful gaze. Now, when they’re thinking about bolstering the hospital’s video technology, ensuring that the video surveillance systems play by HIPAA’s rules is essential. This involves verifying that the cameras, recording devices and any healthcare video analytics tools they might use are all HIPAA-compliant. Video analytics in healthcare systems must be set up in a way that protects patient privacy at every turn. Some ways include encrypting recorded footage, restricting access to authorised personnel or blurring out identifying features. HIPAA requirements in video surveillance The following practices help ensure video technology usage complies with HIPAA’s overarching goals: Limiting PHI exposure: Place video surveillance in a way that reduces the possibility of collecting PHI unless necessary for a specific, justifiable purpose. Some settings to avoid include places where PHI is likely to be accessible or discussed, such as treatment areas or screen displays. Access control: Access to video material should be managed and limited to authorised personnel only. This aligns with HIPAA’s mandate to create technical policies and procedures restricting ePHI access to authorised individuals. Encryption and security: Video data should be encrypted in transit and at rest, mainly if it could capture PHI. Encryption keys should protect against unauthorised access, tampering and loss. Data retention and disposal: Set up policies for video footage retention and disposal. This security measure ensures it’s kept no longer than necessary and disposed of securely to prevent unauthorised access to PHI. Breach notification: If a breach occurs, then facilities must reference the HIPAA Breach Notification Rule. This rule requires they to notify affected individuals, the Department of Health and Human Services (HHS) and, in some cases, the media. Training and policies: Staff should be trained on proper video surveillance system usage. Additionally, they should set up policies regarding using, accessing and monitoring video surveillance to protect PHI. Physical safeguards: Camera placement and the physical security of the video surveillance system should be considered to prevent unauthorised viewing or tampering. Eight best practices for adopting video analytics Beyond the foundational HIPAA considerations, there are additional best practices to consider. With these concerns in mind, hospital administrators can improve compliance, protect patient privacy and use video surveillance technology effectively and ethically. Vendor Agreements: If a third-party provider offers or manages the video surveillance system, a Business Associate Agreement (BAA) is required. This agreement assures that the vendor follows HIPAA requirements for protecting and handling PHI. Regular Audits and Assessments: Conduct security risk assessments and audits of the system to identify vulnerabilities and assess compliance with HIPAA regulations. These audits should include reviewing who has accessed video data, and ensuring access controls function as intended. It should also involve verifying that physical and technical safeguards are adequate. Incident Response Plan: Develop and implement an incident response plan. Ensure the response plan includes procedures for responding to security incidents that may affect the confidentiality, integrity or availability of video data containing ePHI. This plan should also outline steps for mitigating risks, documenting incidents and reporting breaches in compliance with HIPAA requirements. Notice of Privacy Practices: Ensure the Notice of Privacy Practices (NPP) reflects the potential for video recording in areas where patients are treated or where PHI may be disclosed. Patients should be informed about how their information — including video recordings — may be used. Patients should also be aware of their rights regarding those recordings. Consent and Signage: In some cases, it may be necessary or required to acquire explicit consent from patients or to display signage informing them of video surveillance. This depends on state regulations and the specific contexts in which video surveillance is used in healthcare facilities. State Laws and Regulations: Be aware of and comply with state-specific laws and regulations regarding video surveillance in healthcare settings. Some states may have more stringent requirements than HIPAA regarding patient consent, the use of video recordings or privacy protections. Integration With Other Security Measures: Ensure that video surveillance is integrated into the broader security and privacy framework. This approach includes aligning video surveillance practices with other physical and technical safeguards to protect PHI. These safeguards have secure communication channels, data encryption, and access control systems. Training and Awareness: Provide ongoing training and awareness programs for staff about the proper usage of video surveillance systems. These trainings can include the importance of protecting patient privacy, and the legal requirements surrounding PHI. AI and HIPAA compliance in healthcare These AI solutions help streamline guard operations and allow them to respond quickly to incidents Technology continuously evolves and they’ve seen increasing usage of artificial intelligence (AI). But how is AI used in healthcare? How is it used for video surveillance in healthcare settings? Imagine having a virtual assistant that constantly watches over the video footage, analysing it in real-time to flag any potential HIPAA violations. That’s where AI-driven analytics come in. These algorithms can automatically detect and redact sensitive information from the surveillance footage. This helps ensure that only authorised personnel can access it. But AI doesn’t stop there. With AI-powered remote monitoring solutions, they can monitor the surveillance cameras anywhere, anytime, from the device. These AI solutions help streamline surveillance operations and allow them to respond quickly to incidents or security breaches. See AI as giving the healthcare facility’s security system a high-tech upgrade that can help automate compliance tasks, improve data security and streamline surveillance operations. Enhance HIPAA compliance with AI and security technology Healthcare facilities can comply with HIPAA requirements with video analytics and AI-driven solutions while streamlining their surveillance operations. If they’re considering upgrading the facility’s video technology, partner with BCD. They offer innovative security solutions tailored to the unique needs of healthcare facilities. The solutions boast features like NDAA compliance, cyber-hardened hardware and validated integration with top VMS and analytics solutions. By exploring and adopting BCD’s solutions, hospital admins can enhance patient care, improve operational efficiency and build a safer, smarter healthcare environment.
A prominent figure in the Security and Telecom sector, Matrix concludes its successful participation at SAFE West Expo 2024 in Mumbai. With over three decades of industry expertise, Matrix seized the opportunity to engage with industry peers, gain valuable insights, and explore avenues for collaboration. Technology-centric solutions Matrix is steadfast in its dedication to delivering technology-centric solutions, with a paramount focus on ensuring customer contentment. This dedication is evident in the creation of cutting-edge products stemming from internal research and design endeavours. By purposefully allocating resources, 40% of its workforce is devoted to continuous innovation through research and development. This effort yields a comprehensive portfolio comprising over 60 technologically advanced products across four distinct domains. Strategic approach Matrix directs its sales endeavours exclusively through a vast and well-established partner ecosystem Matrix's global footprint is reinforced by a robust network of over 4000 partners, facilitating access to a user base exceeding 1 million worldwide. Demonstrating steadfast commitment, Matrix directs its sales endeavours exclusively through a vast and well-established partner ecosystem. This strategic approach underscores its dedication to delivering top-notch solutions and fostering enduring partnerships within the technological realm. Identifying growth areas At the expo, Matrix actively participated in discussions, seminars, and networking sessions, deepening its understanding of emerging trends and customer preferences in the safety and security landscape. The event served as a platform to exchange ideas, forge partnerships, and identify potential areas for innovation and growth. Innovation, collaboration, and value Matrix remains dedicated to driving continuous improvement and innovation in security and telecom Reflecting on the learnings from the event, Matrix acknowledges the importance of staying attuned to market dynamics and customer needs. Moving forward, the company plans to enhance its participation in similar expos, with a focus on showcasing its commitment to innovation, fostering industry collaboration, and delivering value to customers. Matrix remains dedicated to driving continuous improvement and innovation in the security and telecom domain. Leveraging market insights By actively participating in industry events and leveraging market insights, Matrix reaffirms its position as a trusted partner in providing cutting-edge solutions to businesses worldwide. Kaushal Kadakia, Head of Marketing at Matrix, highlighted the significance of events like SAFE West Expo in shaping the company's strategic initiatives. He emphasised the importance of leveraging market insights gained from such expos to refine product offerings and enhance customer engagement strategies.
Sweden's Södra Älvsborgs Rescue Service Association, (SÄRF) has increased its deployment of LiveU's real-time video transmission solutions, adding recording capabilities to create a complete 'live and store' video set-up for situational awareness and use in training scenarios. This significantly strengthens its decision-making, responsiveness and preparedness to deal with fires and accidents. Headquartered in Boras, the regional rescue organisation runs rescue services in six municipalities, including 25 fire and ambulance stations. LiveU's compact LU300S field encoder LiveU apps and field encoders are used for live transmission enabling real-time situational awareness LiveU's resilient IP-video technology is used for real-time situational awareness, with live video transmitted from the field to SÄRF's headquarters for fire and accident prevention as well as training. The equipment, set-up and support are provided by LiveU's longstanding local partner in Sweden, Entercast. SÄRF has supplied over 200 LU-Smart mobile apps to its rescue crews, most importantly for use by the fire truck operators on their personal smartphones. LiveU's compact LU300S field encoder, used with a DJI Mavic Pro drone operator, is deployed to provide a bird's eye view of major incidents. The LiveU apps and field encoder are used for live transmission enabling real-time situational awareness, response management and resource allocation, and storing for debriefing and analysis. Live feeds are transmitted to the LU2000 server in the HQ control room and displayed on a large 70-inch screen. The data from the live server is also transmitted out to the field, as needed, specifically to the team pioneers. Fire truck phones with the app Niklas Ignell, Fire Safety Manager, SÄRF, said, "It’s often said one picture says more than 1,000 words. We've been using LiveU technology for several years and its reliability, encryption and ease of use, in particular, are critical advantages. We're now using a complete solution where everyone on the team has the LU-Smart app; the firefighters can simply click two buttons after unlocking their phones to get the video app working." "The teams find it easy to use whether they're technical or non-technical. Our fire truck phones with the app are the ones used most actively in the field. Combined with the cloud service, the video is automatically recorded, and we can then analyse the critical pictures, deleting them when we close the report. The live streams are transmitted instantly into the main control centre and the operators can decide quickly if more help and resources are needed." Integrated with the LiveU solution The received encrypted feeds are forwarded to the Vindral platform from the LU2000 server Ignell continued, "Five of our guys are also certified drone pilots so they can operate the LU300S with the drone in major incidents, such as industrial fires. For example, we recently had a fire in a pizzeria and the LiveU unit and the drone were used to ensure that nobody was left inside the building. We also use the drone and LiveU for non-emergency situations, for example, checking the safety of the roofs of large factories and facilities in extreme weather conditions. LiveU has become an important element in our team training and education as well, such as handling situations with chemicals." Entercast also provides a real-time content-sharing platform from its sister company Vindral, integrated with the LiveU solution. The received encrypted feeds are forwarded to the Vindral platform from the LU2000 server. This gives a secure, low latency web page player with a pin number where team members can view the live streams in a browser from any device. Resilient video solutions Paul Shepherd, Channel Sales Director, LiveU, said, "We're increasingly seeing our resilient video solutions used for life-saving public safety applications, enabling emergency teams to respond faster and make informed tactical decisions." "SÄRF is a true innovator with the way that it maximises its use of our mobile apps and LU300S with the drone. It's very impressive to see how it has expanded its situational awareness capabilities throughout its region using LiveU."
Milestone Systems, a global pioneer in video technology, is at the forefront of the video security industry, emphasising responsible technology innovation across its operations. The company will host this free, one-day event on May 7 in Toronto. Geared to IT pioneers and security professionals, the day will feature engaging presentations from Milestone's technology partners across key industries such as education, healthcare, city surveillance, and hospitality. Attendees will gain insights into the latest developments in AI technologies, cloud video strategies, and Milestone's newest product offerings. Reshaping the future of security A keynote session from renowned AI expert Steve Brown promises to be a highlight of the event A keynote session from renowned AI expert Steve Brown promises to be a highlight of the event. Brown, a former executive at Google Deepmind and Intel, and an advisor to Fortune 100 pioneers on how to innovate with AI, will share his insights on how artificial intelligence is transforming video technologies and reshaping the future of security and business operations. "We are excited to bring together security professionals from across Canada to explore the cutting-edge video technologies that are shaping the future of our industry," said Peter Lintzeris, Director of Sales, Canada, at Milestone Systems. "The Toronto XPerience Day offers a unique opportunity to learn from experts, network with peers, and discover how Milestone's open platform solutions can help organisations optimise safety and efficiency." Video management innovations The event will be held at Steam Whistle Brewing in the heart of downtown Toronto. Following the day's presentations, attendees are invited to network with fellow security professionals and speak one-on-one with Milestone experts during a relaxed social hour. "Milestone is committed to empowering our partners with the knowledge and tools they need to succeed in today's fast-paced security landscape," said Lintzeris. "We look forward to an engaging and informative event, and to continuing to support the Canadian security community with our open platform video management innovations."
i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security solutions for surveillance and public safety announced that it has appointed Gerard Figols as the company's Chief Product Officer (CPO). With a career spanning over 17 years in the physical security industry, Figols brings a wealth of global experience and strategic vision to his new role. Experience and responsibilities In his most recent position as President of i-PRO EMEA and i-PRO APAC, Figols demonstrated exceptional leadership in driving the company's growth and success in these markets. Leveraging his extensive experience in engineering, marketing, and sales, Figols has been instrumental in shaping i-PRO's presence in the security industry. As Chief Product Officer, Figols will spearhead i-PRO's global product strategy. Leveraging insights “Gerard’s appointment as CPO underscores our mission to establish i-PRO as a truly global organisation,” said Masato Nakao, CEO at i-PRO, adding "Building on his years of experience working across cultures, Gerard can leverage insights from different business regions to develop best-in-class products suited to the needs of different industries and markets." Innovation and pursuit of excellence Commenting on his appointment, Gerard Figols said, "At i-PRO, we're driven by innovation and the pursuit of excellence, pioneering the global market with our open AI platform and reputation for quality engineering. I am honoured to be Chief Product Officer at i-PRO and excited to lead the company's global product strategy focusing on ethical AI, cybersecurity, and seamless integration with our VMS partners." He adds, "By fostering international collaboration between i-PRO stakeholders and making it easier than ever for our channel partners to work with us, we will continue to drive innovation and deliver exceptional hardware to our customers worldwide." Driving growth and deliver value In a related announcement, i-PRO has appointed Jose Riolobos as Figols’ successor to the role of President of i-PRO EMEA. For several years, Riolobos held senior positions within i-PRO and, previously, Panasonic in Europe and Japan. "I am honoured to lead i-PRO EMEA’s operations and build upon the foundation of success established by Gerard," commented Jose Riolobos, adding "I look forward to continuing to drive growth and delivering value to our partners and customers across the region."
Matrix Comsec, a pioneering provider of cutting-edge security and telecom solutions, has introduced SATATYA NPC430 - Network PTZ Controller with 4D Joystick. This CCTV accessory is designed to complement Matrix's range of PTZ Cameras, and Cameras with Motorised Varifocal Lens (MVL) offering users a convenient solution for camera monitoring. Addressing surveillance challenges For many organisations, the task of controlling and managing the viewing angles of PTZ cameras poses significant challenges. Traditional methods, like relying on NVRs, VMS systems, or navigating through each camera's webpage, often exacerbate these difficulties. The complexity and time-consuming nature of these approaches become apparent, particularly when dealing with multiple cameras across various locations. Matrix grew its IP-based PTZ Keyboard Controller to revolutionise surveillance management Faced with these obstacles, organisations struggle to maintain effective surveillance operations, risking gaps in security coverage and operational inefficiencies. Recognising the pressing need for a simpler and more intuitive solution, Matrix has introduced its IP-based PTZ Keyboard Controller to revolutionise surveillance management. Features of Matrix IP-based PTZ Keyboard Matrix IP-based PTZ Keyboard Controller offers a host of features designed to simplify surveillance management. The 4D Joystick Control allows users to effortlessly navigate Pan, Tilt, Zoom, and Focus functions, providing precise control over camera positioning and monitoring. With intuitive joystick movements, users can easily adjust the viewing angles to capture critical areas of interest. The Smart Keyboard offers convenient access to Preset, Patrol, Pattern, and Scan functions. Users can configure these functions with ease, ensuring smooth and seamless monitoring of multiple camera feeds. The Intelligent LED Display provides a user-friendly interface without the need for accessing web pages. With clear and intuitive controls displayed on the LED screen, users can navigate through options effortlessly, reducing the time required for setup and adjustment. The Matrix IP-based PTZ Keyboard Controller supports both IP and Analog camera versions concurrently, allowing users to connect and remotely monitor up to 999 cameras. This versatility ensures compatibility with a wide range of camera models, enabling seamless integration into existing surveillance systems. Furthermore, the controller is compatible with the ONVIF protocol, facilitating interoperability with various surveillance devices and systems. This compatibility ensures flexibility and ease of integration, allowing users to leverage their existing infrastructure while expanding their surveillance capabilities. Additionally, the controller features Power Over Ethernet (PoE) support, enabling hassle-free integration and configuration. With PoE support, users can power the controller and connected devices through a single network cable, simplifying installation and reducing cable clutter. Overall, the Matrix IP-based PTZ Keyboard Controller offers a comprehensive solution for surveillance management, combining advanced features with user-friendly design to enhance security effectiveness and operational efficiency. Launch of SATATYA NPC430 Kaushal Kadakia, Marketing Manager, Matrix Comsec said, “We are excited to announce the launch of SATATYA NPC430. Responsive, robust, precise, and user-friendly, it offers the most convenient solution for camera monitoring." "With Matrix PTZ Controller, users can seamlessly manage surveillance without the need to access the camera webpage, NVR, or VMS."
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Corsight AI is proud to announce its involvement in a groundbreaking security project at the 14th Battalion in Osasco, a neighboring city within the metropolitan area of São Paulo. The initiative marks a significant step forward in leveraging advanced technology to enhance public safety. Comprehensive security solution Captain David, a key sponsor and advocate for this initiative, has been instrumental in integrating Segdboa's comprehensive security solution at the battalion. The solution features Corsight AI's cutting-edge Facial Intelligence platform, Digifort's Video Management System (VMS) and License Plate Recognition (LPR), IP Extreme's video analytics for gun detection, smoke detection, fall detection, and fight detection, as well as Dahua's cameras, video walls, and touch screen TVs positioned throughout the battalion. Faster response times "This project is a significant milestone in our efforts to enhance public safety in Osasco and beyond," said Captain David, coordinator of activities at the 14th Battalion. "With the advanced technology provided by Segdboa and Corsight AI, we can respond more quickly and effectively to potential threats." Real-time monitoring Segdboa also installs surveillance poles with cameras in front of critical private and public venues This initiative is part of a Public-Private Partnership (PPP) spearheaded by Segdboa, which donates fully-equipped monitoring rooms to each battalion, outfitted with the latest security technology. These rooms enable real-time monitoring and rapid response to potential threats. Segdboa also installs surveillance poles with cameras in front of critical private and public venues such as shopping centres, condominiums, bridges, and parks. These cameras detect suspects and alert the Military Police forces within the battalion’s jurisdiction, ensuring swift action and increased public safety. Accuracy in public safety "We are proud to support this initiative and bring our cutting-edge technology to the forefront of public safety efforts," said Roberto Rocha, CEO of Segdboa. "Our goal is to create a safer environment for everyone by integrating the best technology available with the dedicated efforts of our police forces. We chose Corsight AI's technology for its proven accuracy in real-world conditions and its unbiased performance across gender and ethnicity." Advanced technology Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city To date, Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city. The project aims to eventually deliver monitoring rooms to each of the 380 battalions of the Military Police of São Paulo state, known as Brazil's powerhouse and often sets the standard for the nation. "We are excited to be part of this innovative project that leverages our Facial Intelligence platform to enhance security and public safety," said Geraldo Sanga, Corsight AI's Brazil Regional Sales Director. "This collaboration demonstrates the power of combining advanced technology with dedicated public service." Efficient law enforcement operations Additionally, Segdboa plans to integrate each battalion's facial recognition database with the national Cortex system from the Ministry of Justice. This national database includes photos of all citizens with legal mandates and records of stolen vehicles, facilitating more efficient law enforcement operations across the state. Corsight AI is committed to supporting this vital initiative and enhancing public safety through innovative facial recognition technology. It looks forward to continuing the collaboration with Segdboa and the Military Police of São Paulo.
Omnilert, a pioneer in active shooter solutions, announced that it has integrated Omnilert Gun Detect with the Hanwha Vision Wisenet WAVE video management software (VMS) to provide a complete solution for gun violence and active shooters that can help save lives in the event a gunman comes onto a customers' facilities. Wisenet WAVE VMS is a software platform for IP video surveillance applications that detects, streams, records, and analyses live video from connected IP cameras and networked video sources. By integrating with Omnilert Gun Detect, the Wisenet WAVE platform now has the ability to rapidly respond to detected weapons in a fraction of a second, and once verified, activate a complete and robust response that could include locking doors, notifying police, sending alerts and providing situational intelligence throughout the entire event. Integration of Omnilert Gun Detect The Gun Detect events can trigger operations within WAVE such as sending notifications The Omnilert Gun Detect integration enables selectable bookmarking and/or event triggering in response to a gun detection within Wisenet WAVE VMS. The Gun Detect events can trigger operations within WAVE such as sending notifications and displaying on the Alarm layout. "The integration of Omnilert Gun Detect with Wisenet Wave VMS will bolster the security we can provide our joint customers to protect against the growing threat of active shooters and gun violence, which is at an all-time high in the U.S.," said Nick Gustavsson, CTO and Co-Founder at Omnilert. "This means that video feeds already being managed in the WAVE platform can now be monitored 24/7 for weapons, allowing for a proactive response before shots are fired." Integration into Wisenet WAVE Omnilert Gun Detect's end-to-end workflow of detection and activation allows for automatic initiation "Omnilert's gun detection platform provides especially strong gun detection analytics as well as one of the most flexible and powerful alerting systems on the market," said Mark Heintzman, Technical Partnership Manager at Hanwha. Omnilert Gun Detect's end-to-end workflow of detection, activation, and notification allows for an automated initiation of an organisation's active shooter response, with 24/7 monitoring and local first responder escalation, integrated notification, and integration into Wisenet WAVE. Omnilert's active shooter solution The integration enables selectable bookmarking and/or event triggering in response to gun detection within Wisenet WAVE. The Gun Detect events can trigger multiple operations within WAVE such as sending notifications and displaying on the Alarm layout. Additionally, Omnilert will automatically configure the camera setup, including IP address, camera name and location, which will help speed the deployment of Omnilert's active shooter solution.
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefitted local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defence Authorisation Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting an integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorised vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorised individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
The airport, named after a notable historical figure, serves as a key transportation hub for both domestic and seasonal international flights in its region. Serving over 11 lakh passengers a year, it ranks as one of the busiest airports in terms of passenger and aircraft movements. The terminal building at this airport is spread over 26,936 square metres and has 14 check-in counters, four immigration counters for departures, and six immigration counters for arrivals. Located near major transportation arteries, it offers convenient access to travellers from various directions. Business scenario They required a robust video surveillance solution that could ensure 24x7 recording capabilities With a growing number of passengers and flights at the airport, a new terminal was recently constructed at this airport. To facilitate the security of passengers and staff at this terminal building, they required a robust video surveillance solution that could ensure 24x7 recording capabilities. Without adequate surveillance coverage, this airport was vulnerable to security threats such as perimeter breaches, theft, vandalism, and terrorist activities. Challenges Ensuring passenger and staff safety: Being one of the busiest airports in the state, the absence of a video surveillance system was risking the safety of passengers and staff from potential threats like theft of personal belongings or other such criminal activities. Continuous monitoring with redundancy: The airport wanted continuous 24x7 monitoring with a dual setup ensuring that surveillance operations continued uninterrupted even in the event of equipment failure or maintenance downtime. Ensuring cargo safety: The airport faced challenges in ensuring the safety and security of cargo pioneering to risks such as theft, tampering, and damage during handling and transportation processes. Regulatory non-compliance risk: Without adequate surveillance systems, the airport was facing the risk of non-compliance with security regulations, which could lead to penalties and legal liabilities. Solution The entire airport terminal was covered with Matrix Project Series Bullet, Dome, and PTZ Cameras to provide extensive coverage. Matrix Project Series Bullet IP Cameras were deployed in/at: Outdoor public spaces such as drop-off zones and walkways: To monitor crowd movements and enhance overall security. Cargo handling areas: To monitor the loading and unloading of cargo and ensure compliance with security protocols. Matrix Project Series Dome IP Cameras were deployed in/at: Main entrances and exits: To monitor the flow of passengers and detect any suspicious behaviour. Check-in counters: To oversee passenger interactions and baggage handling. Baggage claim areas: To monitor baggage claim areas and prevent theft or tampering of luggage. Retail areas: Placed in retail shops and duty-free zones to deter shoplifting and ensure security for both customers and staff. Matrix PTZ Cameras were deployed at: Elevated structures overlooking runways and aprons: To provide a panoramic view enabling operators to zoom in on specific aircraft or incidents. These cameras also aided in monitoring critical infrastructure such as control towers, fuelling stations, and power substations, providing close-up views for detailed inspection and surveillance. Monitoring and managing video surveillance SATATYA SAMAS - Video Management Software was deployed at two sites within the terminal Matrix SATATYA SAMAS - Video Management Software was deployed at two locations within the terminal. The first location served as a primary control centre for monitoring and managing video surveillance feeds, and coordinating security responses. The second location served as a secondary control centre. This could be used in case of failures or emergencies at the primary control centre, ensuring the continuity of surveillance operations. Also, different users at two different locations could manage and monitor the camera streams, if needed. Products offered SATATYA SAMAS PLT (1 No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1 No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM20 (3 Nos.): Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM5 (2 Nos.): Licence for Adding five Additional Cameras SATATYA SAMAS USER10 (1 No.): Three Concurrent User Licence for Smart Client and Mobile Client SATATYA CIDR20MVL12CWP (52 Nos.): 2MP IR Dome Motorised Varifocal 2.8-12 mm with Audio SATATYA CIBR20MVL12CWP (14 Nos.): 2MP IR Bullet Motorised Varifocal 2.8-12 mm with Audio SATATYA PZCR20ML33CWP (9 Nos.): 2MP PTZ Camera 33x Zoom with Audio Benefits The superior image quality enabled security personnel to identify potential threats quickly Matrix IP Cameras provided full coverage at the new terminal building. The superior image quality enabled security personnel to identify potential threats quickly. The motorised varifocal lens in Matrix IP Cameras enabled zooming in for specific details when required. Matrix PTZ IP Cameras provided 360° surveillance and up to 33x zoom, providing perimeter security at the airport. Matrix IP Cameras are cyber-secure, complying with the OWASP ASVS 4.0 L2 norms, certified by STQC, Delhi. This helps in safeguarding sensitive surveillance footage, maintaining network integrity, and complying with stringent cybersecurity regulations. Matrix IP cameras are also NDAA compliant, which helped in meeting the regulatory standard requirements at the Airport. The dual setup of Matrix Video Management Software helped in providing redundancy to the surveillance system, ensuring continuous monitoring and recording even in the event of equipment failures, network disruptions, or other unforeseen circumstances. It also allowed for distributed monitoring and management capabilities, enhancing overall surveillance effectiveness. Features like Day Highlights and Time-lapse in Matrix Video Management Software aided airport security teams in leveraging intelligent search functionalities to conduct thorough investigations quickly.
360 Vision Technology, the UK-based manufacturer of ruggedised HD, radar, and thermal PTZ surveillance cameras, has been selected to supply its radar surveillance camera technology to a solar farm site in Ross-on-Wye, Herefordshire. Predator Radar camera Capable of generating 1-Megawatt of electrical power, the solar farm site was constructed by VARTEC EPC Limited for Lowther Renewables Ltd, to help offset the carbon footprint of its parent company, AJ Lowther & Son Ltd, which provides a range of steelwork, cladding, and refurbishment services, including steelwork structures catering for manufacturing, industrial, agricultural, commercial and equestrian buildings. In collaboration with VARTEC, a technical specification for the solar farm was jointly devised by Craig Carton, 360 Vision Technology’s Technical & Customer Support Manager, resulting in the specification of a 360 Vision Predator Radar camera unit specified to secure the entire site. Cost-effective perimeter solution With up to 200m radius/400m diameter constant surveillance capability, this provides a highly effective solution The 360 Vision Predator Radar camera unit deployed integrates radar technology with a Predator 1080p HD camera, to offer a cost-effective perimeter and wide area surveillance solution. With up to 200m radius/400m diameter constant surveillance capability, this provides a highly effective solution with which to secure the solar farm site, while minimizing costs compared to traditional CCTV camera solutions, with only one radar/camera unit being required. Surveillance cameras installation “The site’s remote countryside location, coupled with its significant slope and numerous access points along its perimeter, presented many challenges,” says Craig Vardy, Managing Director of VARTEC. “Lowther Renewables required coverage of the entire solar farm and it would normally have required several traditional security cameras to provide adequate surveillance coverage which would have been prohibitively expensive. However, we were able to negate the need to install several surveillance cameras by specifying just one 360 Vision Predator Radar camera unit to cover the same area.” Object detection Predator Radar works in all-weather scenarios (rain, fog, snow, mist) providing uninterrupted protection Designed for applications where wide area detection and tracking of moving objects is required, Predator Radar works in all-weather scenarios (rain, fog, snow, mist) providing uninterrupted protection by scanning 360° twice every second, to detect and automatically track up to 40 simultaneous objects. “At the site, on detection of an object by the Predator Radar camera, an alarm activation is sent to the NX Witness VMS via an I/O module." Live and recorded video and audio "NX Witness sends this alarm onwards to the Sentinel alarm management platform at the Doncaster Security Operations Centre (DSOC), where alarms are prioritised and evidence for the events is retrieved. This provides the operators with live and recorded video and audio, allowing them to make a quick and accurate decision as to the cause of the alarm." "Operators are guided through pre-defined manual and automated actions, based on the cause, to ensure a rapid response to the situation. The whole alarm handling process is fully audited allowing further analysis and reporting post alarm handling.” Real-time activation At DSOC, any Predator Radar camera alarm activations are overlaid on the screen to notify the operator DSOC detects, responds, and reports any threat activation in real time, meaning the solar farm is protected and immediately aware of any security issues. At DSOC, any Predator Radar camera alarm activations are overlaid on screen to notify the operator that an intruder has been detected, and tracking images are automatically sent to the operator’s screen for visual confirmation, all while the object is continuously and automatically tracked, whatever its path onsite. Dispersing threats On verification of an alarm threat, DSOC operators analyse the video data to make an informed decision; to either contact the police, a keyholder, or OCTAGA, Hereford (a key-holder/physical patrol guarding service who responds in the event of an incident needing attendance). Providing an additional deterrent and avoiding the requirement for a physical attendance to the site for every activation, the Predator Radar camera carries integrated LED white light capability, to help confirm and disperse threats in the hours of darkness. Cloud-based NX Witness VMS In addition to DSOC, monitoring of the site and events can also be performed via a cloud-based NX Witness VMS “Since its installation, the VARTEC installed radar-based camera system has run trouble-free and there have been no false alarms, thanks to visual verification from DSOC,” says Anthony Lowther, of Lowther Renewables. In addition to DSOC, monitoring of the site and events can also be performed via a cloud-based NX Witness VMS, where the transmitted video and data can be accessed remotely and a live insight viewed via a graphically rich desktop interface. Error-free security surveillance solution Craig Vardy adds, “Using the unique capabilities of the 360 Vision Technology Predator Radar camera, we were able to provide an error-free security surveillance solution while also saving the customer money on capital outlay by using just one radar unit, versus the several traditional video cameras that would have been otherwise required to secure this large solar farm site.” “We are very happy to have been able to support VARTEC and Lowther Renewables to secure an effective solution for their challenging wide area surveillance challenge at the solar farm site,” says Craig Carton of 360 Vision Technology. Radar camera solutions “Across the globe, our innovative radar camera solutions are supporting high-security, safety, and site management applications, from the protection of national borders to protecting utility and commercial sites." "This 5-acre solar farm project underlines the highly effective surveillance capability of the Predator Radar camera range.”
An end-to-end IDIS video solution has overcome performance, quality, and affordability challenges that had hampered public space surveillance in Bristol city centre. The upgrade, which tackled a growing list of problems including degraded picture quality, unreliable transmission and data storage, and poor usability, has been completed at Temple Quay and Glass Wharf by KIS Fire & Security. GDPR-compliant video surveillance The successful project is enabling significant operational improvements by the 24/7 security team that manages the site, according to Property Manager, Avison Young. The company reports faster responses to medical incidents and more effective prevention of petty crime and antisocial behaviour, thanks to surveillance coverage without blind spots and the ease with which officers can retrieve and export GDPR-compliant video evidence to support police investigations. Temple Quay and Glass Wharf The original video system at the site was almost twenty years old and proving to be increasingly unreliable Temple Quay and Glass Wharf are part of the Bristol Temple Quarter Enterprise Zone which is home to hundreds of businesses, government offices, serviced offices and co-working spaces, bars, restaurants, and residential properties. The original video system at the site was almost twenty years old and proving to be increasingly unreliable, with underground cabling and equipment prone to flooding and cameras producing increasingly poor-quality images. Challenges faced "The problems were made worse by a cumbersome VMS operating system," says KIS Director - Rob Morgan, adding “The prospect of a complete system upgrade seemed daunting because it would need a complete replacement of the backbone infrastructure, cameras, recorders, etc. and a new VMS management system." He continues, "But we were able to satisfy Avison Young with IDIS technology, showing them a major public space system that we’d recently completed for Bristol Zoological Society.” IDIS Center VMS The new solution, managed by the cost and licence-free IDIS Center VMS, includes NDAA-compliant 8MP IDIS PTZ cameras delivering superior images at up to 31x zoom; vandal-resistant 5MP IR dome cameras; 8-ch 4K recorders supporting UHD display; a specialist network operator’s keyboard; plus, mountings, POE switches, and all other network accessories. The system is easier to use and gives the security team complete area coverage, including full visibility KIS completed the upgrade ahead of schedule in under four months, with rapid installation supported by IDIS plug-and-play DirectIP® technology ensuring instant and seamless functionality of all devices. The system is also easier to use and gives the security team complete area coverage, including full visibility along – and across – a waterway that runs through the site. Instant device functionality “With IDIS, the instant full functionality of all devices means we can be more certain about completion times, even for major public space projects like Temple Quay and Glass Wharf,” says Rob Morgan. He adds, “The system also comes with extended warranties, and failover protection against loss of data in the event of network instability - for public area surveillance this kind of reliability is essential.” Award-winning solution “Following our successful partnership with the award-winning solution for Bristol Zoo, IDIS was delighted to support KIS with this major city centre surveillance project,” says Jamie Barnfield, Senior Sales Director, IDIS Europe. He adds, “Both these projects show video technology at its best, helping to create welcoming public spaces where people can feel safe.”
Products
Round table discussion
The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how well do security integrators provide end users with what they need? We asked this week’s Expert Panel Roundtable: What are the biggest challenges that end users face when working with integrators?
Security systems are often seen as an investment, but usually not one that pays dividends. However, newer technologies are enabling end users to extend their efforts to cost-justify a security system beyond the mirage of “measuring what didn’t happen.” Nowadays, security systems provide quantifiable benefits that yield a return on customers’ investments. We asked this week’s Expert Panel Roundtable: How can security systems maximize return on investment (ROI)?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
White papers
How to lower labour costs when installing video surveillance
DownloadUnderstanding all-in-one solutions
DownloadHow video technology is transforming loss prevention, operations, and customer experience in the retail sector
DownloadTroubleshooting IP video systems
Download2024 trends in video surveillance
DownloadThe real cost of an outdated Video Security System
Download5 easy steps to an upgraded video surveillance system
DownloadVSS - Top 4 questions to get you started
DownloadWhy SAAS Security Platform is more popular in American SMEs
DownloadCamera cyber lockdown
DownloadVideo technology strategies for hospitals are moving beyond security
DownloadHealthcare Surveillance: Finding efficiencies from OR to ER and beyond
DownloadUnlocking wide-angle camera dewarping
DownloadIntelligent video security solutions
DownloadSimple Security Solutions for SMBs
DownloadVideos
Video Management System: Manufacturers & Suppliers
- exacqVision Video Management System
- Honeywell Security Video Management System
- Dahua Technology Video Management System
- Bosch Video Management System
- AMAG Video Management System
- Meyertech Video Management System
- March Networks Video Management System
- Hikvision Video Management System
- OT Systems Video Management System
- Eagle Eye Networks Video Management System
- Axis Communications Video Management System
- Video Storage Solutions Video Management System
- Senstar Video Management System
- IDIS Video Management System
- Vicon Video Management System
- Hanwha Vision Video Management System
- Geutebruck Video Management System
- AV Costar Video Management System
- Vanderbilt Video Management System