6 Reasons your Business Needs Gates & Barriers
This blog is meant as a resource for Security Professionals,Property Managers, Builders, Designing Consultants, Architects, Project Managers, Law makers, Building approving authorities, Facility Managers, Security & Safety Officers & System Integrators. From Now we add Automation write-ups. For Safety please visit http://bhadrafiresafety.blogspot.in/ If you found this is useful then donate some amount, pls read my complete profile in RHS.
6 Reasons your Business Needs Gates & Barriers
Camera Ban Due to Zero Cyber Security
Since what some experts considered a password-free engineering hack was found between firmware layers in HikVision cameras around 5 years ago, CCTV cameras manufactured in China have been squeezed from Australian federal government contracts, despite the fact no Chinese-made video surveillance camera in Australia (or anywhere else in the world) has been found transmitting video streams to the Chinese Government.
The US communications regulator singled out
tech giants Huawei and ZTE and surveillance camera makers Hikvision and Dahua.
Spy chiefs have warned that the US could be vulnerable to economic espionage or
digital sabotage.
The UK Government departments have been
told to stop installing surveillance cameras made by Chinese companies on
"sensitive sites" because of security concerns.
Both the
UK and Scottish governments have
banned Hikvision plus other PRC providers from certain government usage for
national security reasons, in a sea change for UK video surveillance.
The
Governor of New Hampshire has banned
products from certain PRC companies including Dahua, Hikvision, and TikTok for
use on state networks or devices in an executive order.
Security
threat accusation is made against the Smart City project. The Mangaluru City Corporation (MCC) has
installed Hikvision brand CCTV cameras in the city. This company is of China
origin.
The Indian government has restricted PRC manufacturers such as Dahua and Hikvision from bidding on Indian government projects.
At this point, it’s worth noting that almost all professional CCTV cameras are installed on secure subnets supported by dedicated switches, servers, and video management systems, or they are installed standalone on DVR and NVRs. These systems log network actions from authorised users, including camera views, saves, searches and applications of analytics functionality, where this applies.
It goes without saying that no pro-grade network intrusion detection system could fail to alert network engineers to the transmission of big band video signals from secure network ports to an external network location. It would generate an immediate alert, remedial action and public condemnation.
While IP cameras can upgrade firmware automatically over public networks and will undertake handshakes with a manufacturer’s servers, these actions are ubiquitous across network devices of all types and, in the case of CCTV cameras, can be deactivated, with devices either left using original firmware, or upgraded manually.
Typically, network-based electronic security systems are updated manually by security teams managing system maintenance. These Australian security techs are highly integrated with an end user’s security operations team and will respond at a moment’s notice to issues of camera performance, network failure, or network breach.
Further, in compact applications, such as in the suburban high street offices of MPs, 3-4 CCTV cameras are installed in a basic star configuration that revolves around a PoE NVR/DVR supported by a dedicated keyboard, mouse and monitor. They are not connected to local data networks, let alone hooked to out of country servers – unlike a significant number of other manufacturers, neither Hikvision nor Dahua offers VSaaS in Australia.
Typically, the basic turret cameras used in such applications are mid-wide angle, have modest resolutions, fixed lenses, and are installed with an outward-facing angle of view covering front and rear entrances, car spaces and foyers to allow recording of events for police investigation after an incident.
Recordings are undertaken on local hard drives and written over after 30 days. Viewing of footage and event searches can only be undertaken by a person with access control rights to the location, and who is authenticated with a password issued by a nominated system administrator – typically an admin assistant or office manager who works on-site.
These cameras are installed for safety and security, not to ‘spy’ on MPs. Nor are these cameras being ‘found’ by shocked staffers in third-tier government applications, as if the cameras crept in at night and hung themselves onto walls, as some news websites have implied.
These CCTV systems were installed in plain sight by professional Australian security technicians using products supplied and supported by professional Australian security distributors with technical support from suppliers’ local operations, after an official government tender process.
These cameras and related systems were chosen by government decision makers because they offered the best performance for the least cost. This is not an imperative that will change when government agencies next take locations with modest security requirements to tender.
Similar strictures around installation and governance apply to the 11 Hikvision cameras at the Australian War Memorial, which are likely external bullet cameras installed to view choke points and entries, and are entirely governed by local subnet rules and managed and viewed using an over-arching video management system provided by a third party.
This server-based VMS brings together all the cameras across the site onto a video wall for monitoring by a dedicated security team. It’s normal for a major site like the Australian War Memorial to have multiple camera brands and camera types installed for different reasons at different times with different priorities of budget. Expensive upgrades are undertaken in stages.
Milestone has discontinued technology partnerships with "mainland China" companies, including mega-manufacturers Dahua and Hikvision, the company confirmed to IPVM.
Ambarella, a major supplier of AI chips for IP cameras, has stopped selling to Dahua, Ambarella confirmed to IPVM.
Western Digital and Seagate are no longer selling to Dahua due to US semiconductor export controls imposed on Nov 2022, IPVM has confirmed with WD directly and from sources for Seagate.
ADI has stopped relabeling Dahua, a year after the company secretly started selling relabeled Dahua gear as an ADI house product, despite the NDAA ban, human rights sanctions, and the FCC designation of Dahua as a threat to national security.
The most cyber secure IP surveillance camera is Mobotix, however, the Australian government rarely uses this brand, despite its enormous operational flexibility and impeccable cybersecurity credentials. Bosch, Axis and iPro are also highly regarded, and tier 1 offerings from everyone else – including HikVision and Dahua, which put considerable effort into cybersecurity and transparency to correct early issues that impacted all CCTV camera makers – are close behind.
Unsurprisingly in the current geopolitical climate, Chinese CCTV cameras are by far the most examined network devices when it comes to cyber security, and their camera firmware and supporting management solutions are constantly trawled through by experts looking for issues in devices that, despite their ‘surveillance’ function, are static edge sensors, governed by the settings of the network switches and servers that manage them.
It’s impossible to believe the Australian government’s highly qualified cybersecurity experts are not perfectly aware that edge devices, like CCTV cameras, when properly commissioned and installed on well-designed and secure data networks, are impossible to access remotely, and can’t be infected by ‘spyware’ in the way a mis-managed workstation or laptop might be.
Instead, they must be acutely aware the greatest security threats to security systems are posed by errors in network application, a failure to activate camera cybersecurity settings during installation and pre-commissioning, and weaknesses in the physical security around network components. And cybersecurity experts must know such risks apply to every networked device across a department’s topology – phones, switches, wired and wireless routers, laptops, servers, apps – not just to devices offering click-worthy headlines.
In our opinion, given the highly evolved state of cybersecurity in professional CCTV cameras (and intercoms), the possibility edge devices in secure subnets from any camera manufacturer, could suddenly breach network security settings and start operating unilaterally is so vanishingly small that cybersecurity can’t be the problem.
Instead the government’s core issue seems to be one of uncertainty and misunderstanding around a technology that, when properly installed and managed, leaves virtually no room for uncertainty at all.
Trends at the intersection of video and AI
Installation
and use of CCTV Cameras for security & surveillance is a no-brainer.
Cameras are considered a fundamental commodity for setting up any surveillance
infrastructure, but at the same time, 24×7 monitoring of hundreds or thousands
of video feeds by operators doesn’t serve the purpose of providing proactive
surveillance and quick response to breaches.
2022, where most security cameras deliver HD performance, with more and more models offering 4K resolution with 8K on the horizon. Advanced processing techniques, with and without the use of infrared illuminators, also provide the ability to capture usable images in total darkness; and mobile devices such as drones, dash cams, body cams, and even cell phones have further expanded the boundaries for video surveillance. Additionally, new cameras feature on-board processing and memory to deliver heightened levels of intelligence at the edge.
But video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise.
This is
more than a big development for the physical security industry; it is a
monumental paradigm shift that is changing how security system models are
envisioned, designed, and deployed. Much of the heightened demand for advanced
video analytics is being driven by six prevalent industry trends:
1)
Purpose-built performance
Several
video analytics technologies have become somewhat commoditised “intelligent”
solutions over the past few years, including basic motion and object detection
that can be found embedded in even the most inexpensive video cameras. New,
more powerful, and intelligent video analytics solutions deliver much higher
levels of video understanding.
This is
accomplished using purpose-built deep learning, employing advanced algorithms
and training input capable of extracting the relevant data and information of
specific events of interest defined by the user. This capability powers the
automation of two important workflows: the real-time monitoring of hundreds or
thousands of live cameras, and the lightning-fast post-event search of recorded
video. Vintra video analytics, for example, accomplishes this with proprietary
analytics technology that defines multi-class algorithms for specific subject
detection, classification, tracking, and re-identification and correlation of
subjects and events captured in fixed or mobile video from live or recorded
sources.
2) Increased
security with personal privacy protections
The demand
for increased security and personal privacy are almost contradictory given the
need to accurately identify threatening and/or known individuals, whether due
to criminal activity or the need to locate missing persons. But there is still
societal pushback on the use of facial recognition technology to accomplish such
tasks, largely surrounding the gathering and storage of Personally Identifiable
Information (PII).
The good
news is that this can be effectively accomplished with great accuracy without
facial recognition, using advanced video analytics that analyse an individual’s
whole-body signature based on various visual characteristics rather than a
face. This innovative approach provides a fast and highly effective means of
locating and identifying individuals without impeding the personal privacy of
any individuals captured on live or recorded video.
3) Creation and
utilisation of computer vision
There are
a lot of terminologies used to describe AI-driven video analytics, including
machine learning (ML) and deep learning (DL). Machine learning employs
algorithms to transform data into mathematical models that a computer can
interpret and learn from, and then use to decide or predict. Add the deep
learning component, and you effectively expand the machine learning model using
artificial neural networks which teach a computer to learn by example.
The
combination of layering machine learning and deep learning produces what is now
defined as computer vision (CV). A subset but more evolved form of machine
learning, computer vision is where the work happens with advanced video
analytics. It trains computers to interpret and categorize events much the way
humans do to derive meaningful insights such as identifying individuals,
objects, and behaviours.
4) Increased
operational efficiencies
Surveillance
systems with a dozen or more cameras are manpower-intensive by nature,
requiring continuous live or recorded monitoring to detect and investigate
potentially harmful or dangerous situations. Intelligent video analytics, which
provides real-time detection, analysis, and notification of events to
proactively identify abnormalities and potential threats, transform traditional
surveillance systems from reactive to proactive sources of actionable
intelligence. In addition to helping better protect people, property, and
assets, advanced video analytics can increase productivity and proficiency
while reducing overhead.
With
AI-powered video analytics, security and surveillance are powered by 24/7
technology that doesn’t require sleep, taking breaks, or calling in sick. This
allows security operations to redeploy human capital where it is most needed
such as alarm response or crime deterrence. It also allows security
professionals to quickly and easily scale operations in new and growing
environments.
5) A return on
security investment
The advent
of advanced video analytics is slowly but surely also transforming physical
security systems from necessary operational expenses into potential sources of
revenue with tangible ROI, or as it is better known in the industry, ROSI –
Return on Security Investment. New video analytics provide vast amounts of data
for business intelligence across the enterprise. Advanced solutions can do this
with extreme cost-efficiency by leveraging an organization’s existing investment
in video surveillance systems technology.
This easy
migration path and a high degree of cost-efficiency are amplified by the
ability to selectively apply purpose-built video analytics at specific camera
locations for specific applications. Such enterprise-grade software solutions
make existing fixed or mobile video security cameras smarter, vastly improving
how organizations and governments can automatically detect, monitor, search for
and predict events of interest that may impact physical security, health
safety, and business operations. For example, slip-and-fall analysis can be
used to identify persons down or prevent future incidents, while building/area
occupancy data can be used to limit crowds or comply with occupancy and
distancing guidelines. In this way, the data gathered is a valuable asset that
can deliver cost and safety efficiencies that manual processes cannot.
6) Endless
applications
Indian Army to be equipped with AI-based threat assessment software linked to national databases
The 5 D’s Of Outdoor Perimeter Security For Business
When
it comes to your business, you must ensure that every inch of it is protected.
Many people ignore the outdoor perimeter of their establishment and focus on
the inside. However, the outdoor security of your business is equally
important. To protect your building’s entire structure, there is a key security
principle that you can use: The five D’s. They are Deter, Detect, Deny, Delay
and Defend. Each plays a specific role in securing your business’ exterior.
Deter
Your first line of defence is deterrence. In order to keep criminals away, you have to deter them from even thinking about setting foot on your property. To create a shield of deterrence, you need to start simple with signs. Put up signs that say “No Trespassing,” “Property Under Surveillance,” “We review CCTV footage Everyday”, “Guard Dog on Premises” and “Security Personnel On Duty 24-7.” You may not have a guard dog but the suggestion of one could be enough to keep criminals at bay. Another line of deterrence is to have surveillance technology. Having CCTV security cameras visible will discourage criminals.
Detect
Protect your building’s perimeter with equipment that can detect trespassers. Surveillance cameras, motion sensors, and other security equipment that can sense movement are all must-haves to ensure that anything out of the ordinary is detected.
Deny
To keep your perimeter secure while letting authorized personnel come and go, you need to deny those who aren’t supposed to be there. With a manned security gate at the main point of entry, anyone who isn’t supposed to be coming and going will be stopped immediately. Another way to deny criminals entrance to your property is with card access. This is an added security measure that ensures that even when people are in the building they need to use an access card to get into certain areas. You can even have your employees scan their cards at the manned security gate.
Delay
A delay system should be in place in case something should go wrong with your security system and an intruder is able to penetrate the building’s perimeter. This can be done through interior locking doors and barriers. By having a delay system you give your security team and the police enough time to respond to the intrusion and the criminal cannot get away.
Defend
To
defend your perimeter against intruders you will need the help of local law
enforcement and your security personnel. This involves having a protocol in
place for making sure a criminal is being watched during the time period after
they’ve been apprehended by your security personnel, and the time law
enforcement arrives scene.
Creating optimal outdoor perimeter security requires planning. However, once you have the Five D’s in place, you can rest assured that your business is safe.
For,
free suggestion consultancy about security alarm system can contact SSA
Integrate via mail ssaintegrate@gmail.com
Should I Upgrade My Existing Security System?
A security system is designed to do one thing: keep you, your property, and those you care about safe. However, if you are using a security system that is ten or more years old, it may not be able to provide you with the level of security you want or need. Not only are older systems susceptible to malfunction, but since they are less sophisticated than systems available today, they put you at risk of malicious activities by tech-savvy thieves.
Unsure how to decide whether it is time for your upgrade? Below are three reasons that you should consider installing a new security system today!
Here
are four signs it is time to upgrade your security system:
1. Dated
technology
Security
systems are not a once-in-a-lifetime investment. Like any piece of technology
that you purchase, they have to be frequently updated and maintained to
optimize their functionality. Your security system is like a phone — it
requires periodic investment and replacement over time, not to mention that
since technology changes so quickly, your device could soon become obsolete.
2. Alarm safety
Before
the days of wireless data, security systems were operated via land lines with
wires that could be easily manipulated by unwanted intruders. Luckily, since
modern alarm systems operate using cellular transmitters to send and receive
messages, they provide a safer alternative for homeowners.
At
Video, Intrusion or Fire Monitoring in India, we have partnered with Netra
Monitoring to provide customers with specialized Interactive Alarm Monitoring
services, including home automation, remote arming and disarming, thermostat
control, video surveillance and much more. Unlike an outdated security system,
the Alarm Monitoring service feature can be managed centrally for one location
or multiple locations through an app on your iPhone, iPad, or Android-powered
device.
Your safety is of the upmost importance, but with Netra Monitoring, it doesn’t have to be an inconvenience.
3. Transmission
The
biggest reason security systems become obsolete is that technology becomes
outdated. Since most modern security devices use the same towers as cellphones
to send and receive alerts, it is most likely that the reason your product will
be unusable is that, much like a cell phone, the network it uses to operate is
no longer available.
The
good news is that there is often quite a bit of overlap in what networks are
available. For instance, 2G technology is being phased out, but 3G, 4G, and 5G
are still available and often work interchangeably.
What
is great about a system that works on this kind of network is that while 2G
will soon be unavailable, you don’t have to replace your entire system to still
use it. Often, you will need to replace a small component to keep it running.
4. Protecting Your
Investment
The
best way to ensure that you are getting the most out of your investment is to
purchase your new security system from a company that is dedicated to making
your experience with their product the best one possible. At Fire Monitoring at
India, we perform regular service and maintenance on your products and make
sure you are informed of any upgrades that your system requires and technology
changes or your system ages.
We
think of keeping an alarm system up-to-date as being similar to maintaining a
car. Just because your car gets old doesn’t mean it is useless — if something
breaks, you fix it and keep on driving. By working with one of our technicians,
you will get more life out of your equipment than you ever imagined and be able
to enjoy the safety you deserve for years to come.
When your security system becomes an afterthought – and eventually an outdated afterthought – it leaves your building vulnerable.
Netra
Monitoring installs custom-designed, scalable, user-friendly usable commercial
intrusion alarm systems, and we feel that even the least experienced user will
be able to use our systems with the proper training. Netra Monitoring also work
for Central Alarm Monitoring with Video Verification services in India.
IoT is future of Video Technology
The
Internet of Things is about connecting network-enabled devices and exchanging
data between them. This offers great potential for improving processes wherever
information needs to be exchanged securely and quickly. It enable devices and
add much more value than they have had so far. For this, there is no better
example than security cameras. With IoT we’re able to push and pull nuggets of
intelligence from sources we never considered before: environmental sensors,
pressure plates, door lock timers and much more. It’s helped us break through
the constraining mindset that security systems are strictly single-purpose.
Acting alongside other sensors, such as motion or smoke detectors, security cameras have been in use for a long time, however without being connected to each other through data networks. Growing demands for smart video surveillance in public spaces, commercial buildings, public transport and other areas and the rise of IoT will drive for the further integration of these cameras systems. Let's see how video surveillance has evolved to this day and where the journey is heading.
The past: standard security surveillance systems
Closed-circuit
television systems (CCTV) have demonstrated that they can do what they're
supposed to: give humans a better eyesight on the security situation in order
to reduce security incidents. CCTV cameras can only show and record video
footage and not much more beyond that. As they do not understand what they are
watching, they are also unable to do anything about it.
To fight
theft, violence, vandalism or fire effectively, cameras must be able to detect
and interpret such incidents by themselves. They must also have the capability
to cooperate with other systems, such as alarm systems.
This is
where the Internet of Things comes into play. It connects network-enabled
cameras with other devices and systems that perform other tasks and turns
security surveillance into smart safety and security management.
Video
surveillance systems built the largest segment in our country. That’s why today
modern camera systems are widely used in many areas of life, retail, commercial
buildings, stadiums, transportation and public spaces in cities.
Security cameras frame the next technological step in the security surveillance evolution…
The future: smart security surveillance
The times
when video surveillance systems only deliver video that must be continuously
observed by humans are over. Machines able to record and analyse video data in
one go are already available, and they can provide security managers with deep
insights instead of single pieces of information.
This will
significantly improve security and security-related processes in many areas and
industries by enabling faster and more insightful response to any sort of
incidents.
Future security surveillance essentially combines 3 technologies that will completely change the game: computer vision, automation and deep-learning, driven by powerful processors and apps on cameras in the IoT. Let's take a quick look at these technologies.
Data is the new digital oil
All these
devices at their most basic, simply collect data. This information is used to
streamline, manipulate and measure the way you interact with the world. From
your online habits to your physical day-to-day routine – every single thing you
do or don’t do is, or will very soon be, monitored.
In the case of connected ‘things’ – now known as ‘smart devices’ due to their ability to collect and transmit information – each one sends bytes of data over the internet to an application that interprets and collates that data into valuable insights. Your service provider and the product manufacturer can then use those insights to achieve a variety of objectives – from improving the device’s performance, and your experience of using it, to identifying how or when they should be selling you extra services or products.
What precisely is connecting all of these IoT
things
2G, 3G and
4G are terms that we all know and understand well but how about radio, Wi-Fi,
NB-IoT or LPWAN? There are various types of connectivity that can underpin the
Internet of Things and these latter ones are arguably the most widely used
outside of pure cellular connectivity.
When we
talk about the ‘internet of things’ it’s not immediately clear which type of
‘internet’ connectivity we’re referring to because many devices are now being
designed to intelligently select the connectivity that best suits its needs,
based on the following three things:
Power
consumption –
How much power does the device or sensor need to operate?
Range –
Does it need to connect and send data over great distances?
Bandwidth –
Will it transmit small or large amounts of data e.g. low bandwidth and high
bandwidth?
Two of the most commonly utilised connectivity networks are:
Cellular
Most of us
are very familiar with cellular connectivity as it is used around the world to
connect our mobile phones to the internet. IoT devices also use cell towers to
connect to a cellular network. Cellular connectivity is prolific, has excellent
range and the capacity to send high volumes of data over the network but uses a
lot of power and, therefore, is not ideal for IoT devices which don’t have
access to an immediate power supply and need a long battery life to operate
over long periods of time, for instance in rural or agricultural areas.
LPWAN
‘LPWAN’ stands for Low-Power Wide-Area Network, which is a type of radio technology and is so far one of the most ideal connectivity networks available to IoT sensors that are deployed in areas where there is a lack of range. These devices are usually battery-powered and send very small packets of data over the network. This connectivity is ideal when it comes to monitoring utilities such as water, gas and electricity using smart meters and for farming and agriculture to check on water quality, sensing soil moisture and tracking livestock.
Computer Vision
Computer vision is becoming smarter because of more sophisticated algorithms, faster devices, larger networks and access to a wider range of data sets through IoT. This allows machines to “see” and analyze in real time.
“Deep Learning and general AI techniques within computer vision, makes possible what would be impossible to do by the naked eye.” - Matt Candy, Global leader for IBM’s iX creative solutions.
Example: Detect
fire and smoke within seconds
Many
threats, such as smoke, are difficult for the human eye to detect in videos,
especially in poor lighting conditions. Seconds later, however, a fire may have
broken out. Security cameras equipped with smoke and fire detection can alert
at an early stage and activate the proper safety measures without any human
assistance.
Source: Bosch Security Systems |
Automation
Speed
plays an important role in safety and security. The faster you react to
security incidents, the greater the chance of preventing or at least reducing
damage. In case of theft in a store, every second counts, because criminals may
disappear before security personnel can intervene.
Standard security surveillance via CCTV wastes valuable time because reaction paths between machines and human operators are too long. Smart cameras take a shortcut by saving staff from interpreting videos. They immediately deliver notifications or initiate appropriate actions themselves.
Example: Detect
and catch thieves in retail
The "AI Guardman" security camera helps shopkeepers identify potential thieves in time. Software installed on the camera scans live video streams and analyzes the poses of any person it can see. This data is automatically matched against predefined "suspicious" behavior. When it sees something remarkable, it alerts onsite personnel via app for double checking.
Deep learning
“Cameras
capture the video, but video analytics captures the value.” (IBM)
Using
computers for video analysis is not a new idea. However, there is a problem
that slows the development of video analytics: mobile video made on drones or
vehicles is full of dynamic variables that can confuse even the most
intelligent computers. That's why many companies and startups are working on
smart systems using self-learning algorithms.
Deep
learning is a machine learning method based on artificial neural networks.
Video analytics, which gives security cameras the ability to analyze video data
on board, is one application of deep learning. Another application is
automation, which embeds video analysis into processes.
The good thing about deep learning is that developers of video analytics apps for security cameras don't have to reinvent the wheel themselves. There are already sophisticated frameworks that simplify developing deep learning models, such as Google's Tensorflow, Microsoft’s Custom Vision and IBM’s PowerAI Vision.
Example: Training
object recognition using IBM’s PowerAI Vision
To determine whether workers are complying with safety regulations such
as wearing helmets, security cameras need to know what helmets look like. In
case a person is not wearing a helmet, a camera could react and alert. This is
what a simplified training process looks like…
Source: IBM |
Flood Management Assistance
As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem.
Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure?
Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event.
Environmental Control Assistance
Data
centers house the lifeblood of a business so it’s no wonder why companies work
hard to protect them. We’re all familiar with the integration of network
cameras with access control systems to visually verify who is actually using
the credentials.
But
there’s another aspect to protecting data centers and that’s environment
control. Data centers need to maintain optimum humidity and temperature for the
racks of electronics. When environmental sensors in the facility detect
out-of-norm ranges technicians can remotely command a network camera to zoom in
on the gauges and help them determine whether remediation might be necessary.
Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security.
Roadway Management & Parking Assistance
Network
cameras have long played a part in city-wide traffic management. Adding video
analytics and integration with network sensors, makes those cameras that much
smarter and versatile. They can detect cars driving in bike lanes or
driving in the wrong direction and capture license plates of offenders. Their
ability to detect anomalous traffic flow patterns can be integrated with car
counting sensors, networked electronic road signs and traffic light systems to
automatically redirect vehicles to alternate routes.
They make
great, intelligent parking lot attendants, too. Working in conjunction with
weight sensors network cameras can count vehicles coming into and leaving a lot
or garage and verify when the facility has reached capacity. License plate
recognition and video analytics can be used to ascertain that a vehicle
entering a reserved parking space doesn’t match the credentials and vehicle
attributes in the database.
With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders.
Shopper Experience Assistance
In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings.
With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience.
For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked.
Capturing Business Intelligence
Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup.
They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns.
Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping.
A Natural Cross-Over Technology
This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond.
IoT laid
the groundwork for network security solutions to seamlessly integrate with
other IP-based technologies, sensors and programs. How we capitalize on that
connection is only limited by our imagination.
Video Wall Magic
Whenever people talk about CCTV, one of the first associations is video walls. No matter how powerful the servers behind, it is the visual that produces the "wow" effect — even on the most tech-savvy customers. Yet, they often back off, having heard the price. And this is where all EVO Global customers clearly benefit: EVO video wall has just got a major enhancement, and it does not cost you a rupee. EVO by LUXRIOT.
Video walls are widely used everywhere from airports to rock concerts. Traditionally, in CCTV their application includes, but is not limited to, showrooms and control centres. To build a video wall, you take narrow bezel monitors, projectors, or TV sets, and tile them together. Depending on the goal, some or all of them may form one huge screen. This resulting "transformer" display is much better rather than just one large display: it offers customizable shape and size, distributed processing, and superior reliability.
Typically, you would employ additional technologies to make several output devices work as one. EVO Global allows casting a single picture onto a combination of displays from separate workstations. Most importantly: without anything other than just regular Windows display management. EVO is one of the most comprehensive enterprise-level VMS solutions on the market, featuring interactive maps linked to alarms; an advanced event and action manager; analytics tools; video wall support and other components you will definitely appreciate. To ensure the safety of your data, the software also offers edge recording for synchronising all data with IP devices storage, archive replication, advanced system health monitoring and failover, which will reduce the disruption of your video surveillance recordings to zero. SSA Integrate is India Regions business partner.
Fantastic FlexibilityVideo
walls have been available in EVO Global since its very first versions. So
what's different now?
Earlier, we already saw how the Luxriot virtual video wall helps organize collections of displays, including those in different locations. Now, EVO Global offers another option: mosaic display, or, according to a customer, "the real video wall". Previously, you could have a virtual collection of screens, scattered across the place, managed from your office. From now on, EVO Global also gives you an opportunity to combine several local screens into one. Both approaches fit into the video wall definition, yet they have different use case scenarios. And, both retain EVO's convenient and flexible management instruments.
As you would expect, the rest of EVO Global video wall functionality remains the same. Once configured, any video wall screen contents can be controlled from anywhere in the universe.
Smooth Setup
Add a single screen video wall in EVO Console
Detailed description
Step 1: in
your EVO Console, add a new video wall. For the current setup, the wall
layout will be simply one screen, 1x1 grid. We shall use the same video wall
screen for both the showroom and the operator's room.
Step 2: install EVO Monitor
on all client workstations. The client application does not require a
license, and you can use either 32- or 64-bit packages. Each
application instance may have one or several windows. Therefore, the
four panels can be split between two, three, or four workstations. Let's assume
we have two client PCs here, each driving two displays.
Step 3: link physical
displays to video wall screens. In this case, we have only got a single video
wall screen, and we shall use it twice.
First, in the showroom, all 2x2 displays will
belong to the video wall screen with a "tiled" option. To
do this, open the multi-display settings, select a window, tick the Video
wall screen setting, then also tick the Tiled display option
on the right. In the mosaic preview, enter the grid size and then select the
part of the big screen that is occupied by the underlying physical display.
Second, in the operator's room, simply point the
monitor to the same video wall screen, without selecting the
"tiled" setting. As a result, the same output will be produced on a
single preview display.
Create a tiled video wall in EVO Monitor via
multi-display setup
Step 4: have fun managing the video wall remotely or with E&A. For manual remote administration, there is a separate tab in the EVO Monitor application called — who would have thought? — Video wall. To start, drag and drop your video wall from the Resources section on the left. And then, place the desired layouts, channels and maps onto the preview area below. All adjustments will take instant effect and you will notice the changes in both rooms. Don't forget to save the current layout as start-up by clicking the "three stripes" button in the upper right corner of the preview area.
Tips & Tricks
Hardware requirements
Refer
https://www.luxriot.com/support/hardware-calculator/
Benefits
EVO Global video wall feature is a strikingly simple yet powerful solution for anyone. All the more, we are proud to present the "stretchy" video wall option as a further advantage.
Luxriot Evo Global, is not only offering 64-bit speed and all the necessary tools for setting up an absolute situational alertness system aimed to respond quickly to events, but also introduces a central server governance hierarchy of all the components. To know more on this, can mail to ssaintegrate@gmail.com