Showing posts with label Milestone. Show all posts
Showing posts with label Milestone. Show all posts

Monday, January 1, 2024

Access Control Server Guide

Access Control Server Guide 

Wish you a very Happy New Year 2024.

Electronic access control systems need to be managed. The 'server' though can range across:-

  • Panel based / 'serverless' systems
  • Combo workstation / server systems
  • Dedicated servers
  • Virtual servers

We explain, compare and contrast each one, including with a review of manufacturer minimum server specifications.

Server Specs Determined by System Size, Version

Typically the biggest factor when choosing an access platform version is sizing based on the overall number of doors, cardholders, schedules, or system integrations required. The smaller and less complex an access system is, the fewer servers resources required, with options ranging from 'serverless' small systems to multisite, multiple server 'enterprise' systems controlling thousands of doors.

For example, take a look at how specification varies for the platforms below:

  • Lenel goEntry (now Honeywell) vs. OnGuard: goEntry / truPortal is serverless and panel based, while OnGuard uses dedicated servers.
  • Software House SiteServer vs. Enterprise: The SiteServer appliance manages a fraction of the doors and users possible with Enterprise.
  • RS2: Offerings ranging from workstation based 
  • DSX: While dedicated server dependent for even small systems, DSX supports virtualization (other access platforms do too) proving options on how many and how strong system servers should be.
  • S2: A differentiation of S2's offerings are that they are completely 'serverless' designs, instead hosting all software inside controller panels.

In the sections below, we examine the four basic system architectures and which type of servers are required for each option.

Panel Based Systems

Some access systems are 'serverless' because the system controllers or panels themselves contain the hardware for administering the system. No external or additional server is needed for production use.

This architecture is most common in small or highly dispersed access systems, where installing and maintaining multiple servers would be very costly.

Examples of panel based architecture include:

  • Axis Entry Manager
  • HID Edge SOLO
  • Vanderbilt BrightBlue
  • Honeywell NetAXS-123
  • Interlogic truPortal (formerly Lenel goEntry now Honeywell portal)
  • S2

While being panel based defrays the cost of additional servers, performance can be quite sluggish and storage limited compared to server based alternatives. Integration with panel based systems is also very limited, with almost no examples of externally reference shared databases or video surveillance integration in the market.

Enterprise class serverless platforms are available, with offerings like S2's Netbox or Linear's Emerge being familiar examples.

Combo Workstation/Server Systems

The next tier are 'combination' servers, where the parent management application is light enough it can be installed as a concurrent service running on multi-tasked workstations. The size of systems using this server option are still small, although multiple servers can typically be combined in a central management platform. Outside integrations with other systems are possible

Often, these types of software are bundled in non-enterprise versions running on appliances:

  • Genetec's SV16
  • Milestone Husky
  • SoftwareHouse C*CURE 9000 Site Server

While 'software-only' versions feature installations where server and clients placed on the same workstation:

  • RS2 AccessIt Lite
  • Infinias  Intelli-M
  • Keyscan System VII

In general, workstations for these types are modest dual core, 8GB RAM, Windows OS personal computers that can be used in general office duty while serving as access server.

Dedicated Server Systems

At the enterprise level, system management and databases can grow to be so large and expansive, dedicated server hardware is required. In many cases, cardholder database and access permission rules can be tens of thousands of records, and drawing from general corporate SQL databases is mandatory to control management costs.

Also at this level, integration with other systems like payroll, visitor management, and even accounting systems are commonly required. Features like fail-over, data mirroring, LDAP/Active Directory support, and cross-domain networking of access devices are routinely needed. For these complex implementations, dedicated servers (and even multiple servers) are typically required.

Incumbent brands like Lenel, Software House and other enterprise platforms use dedicated servers. The below details a C*CURE 9000 Enterprise system:

Usually dedicated servers in this class are specified as multiple cores, Server OS, rack mount units designed for enterprise management and use.

Virtual Machines

Unlike Video Management Platforms where virtualization is often discouraged, using virtual servers to host physical access software is common and even officially supported by many vendors. The specific requirements, limitations, and virtualization platform support vary according to access control system. The below details DSX's requirements:

Minimum Server Specifications

Choosing the exact computer needed for an access install is spelling out in minimum requirement specifications like the ones below:

  • Lenel OnGuard ES (min Xeon E5-1607 v2, Quad Core, 3.0GHz, 16GB RAM) 
  • SoftwareHouse (min Intel 3.4 GHz with 64-bit CPU, 8GB RAM)
  • RS2  (min Pentium Dual Core or AMD Athlon II 2.00GHz, 8GB RAM for 64bit OS)
  • Keyscan (min Pentium Dual Core 2.20GHz, 8GB RAM)
  • Paxton (min Pentium Dual-Core 2.00GHz, 8 GB RAM)

However, additional roles can impact the minimum build needed. Other factors include:

Additional Functions Impacting Server Size

On occasion, certain functions are run on the access control management server, such as:

  • Main Operator Interface: If the access server also hosts the main interface client, especially if video surveillance is integrated, the overall build of the server (especially video card performance) may need to increase.
  • Visitor Managment Kiosk: Another common add to access platform servers are Visitor Management Systems.
  • Enrollment Station / Badge Printing:  Access platforms typically onboard new cardholders and generate credentials through separate applications. In many cases, these can be combined with base access management software, but may impact hardware requirements.

Database Integration

The most common connection between an access management system and a network environment is the database. In the interest of maintaining the minimum number of datasets and creating records once, the access system often ties into a master roster kept in enterprise grade databases.

Integrating to these platforms often requires a hardware overhead of its own, and licensing an access server to access these records can drive additional resources.

Monday, August 15, 2022

Security Cameras in Medical Collage

 Security Cameras in Medical Collage

CCTV surveillance is now an integral part of the overall security apparatus across the world. The university has a significant responsibility to take appropriate steps to protect personal privacy and civil liberties when it operates security camera systems. When successfully deployed, security camera systems enhance overall campus safety and security, deter crime, and otherwise support the protection of people and property. A security camera is defined as video surveillance technology that records people’s activities in order to detect, deter, prevent, or investigate crime or other threats to public safety.

In a bid to improve the quality of medical education in the country, regulatory body NMC has issued an advisory recommending installation of cameras in the premises of all medical colleges and institutions. This is in continuation of the digital mission mode project being run by the National Medical Commission (NMC) and the erstwhile Medical Council of India to ensure and monitor availability of adequate number of patients teaching faculty and also to monitor regular teaching programs in the medical colleges. This is a step forward towards developing a robust monitoring mechanism and providing for transparency and accountability in functioning of medical colleges, official sources said.

If utilised properly, this would also be a way forward for digitisation of the assessment process for approvals being granted to medical colleges either for enhancement of under graduate courses or starting or enhancement of postgraduate courses, they said. "Use of such technology and artificial intelligence would make assessments and instructions transparent and an ongoing process instead of the current one time process," an official source said.

The most important things they can incorporate on all IP equipment are much more tangible—Trusted Platform Module (TPM) and National Defense Authorization Act (NDAA) complianceThe primary concern should be that the vendor is providing a system that is secure and in compliance with ISO 20243, particularly when it comes to assurances regarding the supply chain. Today more than ever, it is essential that video appliances are held to an IT standard, including TPM and NDAA compliance. The importance of making these properties a top priority has become a standard for end-customer expectations.
But installing a CCTV camera doesn’t mean you’re safe; here is a list of seven things you ought to consider before securing your territory with closed-circuit television cameras:

#1) Deciding how you’ll be monitoring the system

If you decide to monitor your system using the Internet, getting an IP Address for your Digital Video Recorder (DVR) or Network Video Recorder (NVR) will equip it to survey and record easily; an Ethernet cable carries all information via the Ethernet witch.

#2) Determining the number of Closed Circuit Television Cameras required

Depending upon the nature of your requirement and the expanse of the area you want to survey, decide on the number of cameras required to ensure complete security. As per the NMC guidelines, the medical colleges have been advised to install cameras at OPDs (depending upon number of OPDs in the college). The cameras should cover the medicine, surgical, gynaecological, paediatrics and orthopaedics OPDs, the highly-visited OPDs in a medical institution.

#3) Positioning the CCTV cameras

Cameras if visible could caution the trespasser. Thus most people prefer having clandestine cameras to having exposed and evident ones! Contemporary CCTV cameras can be easily hidden from view by being in the most exquisite of crevices and clefts in the wall; these places also offer the advantage of protecting the cameras from extreme weather conditions such as hailstorms, high-speed winds, and rains. One camera needs to be installed at the main entrance of the hospital and college and two cameras at the patient registration counter. All lecture theatres in the medical college should be equipped with cameras.

The pre-anaesthesia area, recovery area in the operation theatre complex, faculty lounge and attendance marking areas, anatomy dissection hall, physiology laboratory, biochemistry UG laboratories, pharmacology laboratory, patient attendant waiting area and emergency and casualty ward need to be equipped with cameras, the NMC stated.

#4) Placing the DVR/NVR

It is paramount to secure the digital video recorder (DVR) or the network video recorder (NVR). If you lose the DVR or the NVR to the trespasser, needless to say, you lose all the money you spent on your CCTV camera along with your stolen valuables! If you place your DVR or NVR centrally, you can minimize your cabling cost and reduce the complexity of your closed-circuit television system.

#5) Deciding on power backup of CCTV Camera

The constant power supply would ensure incessant surveillance. Thus make sure you have both constant power supply and a reliable power backup in case of power cuts to ensure security at all times.

#6) Deciding how you’ll be create Secure Network system

NDAA compliance assures that the video recording appliance does not include System on Chip (SoC) or other components capable of processing software from banned Chinese companies. All servers and workstations use NDAA-compliant chipsets as a standard. Having the NDAA seal of approval guarantees that the product is fully supported under those regulations as federal agencies have banned all non-compliant equipment from RFQ’s and projects. Those companies not adhering to NDAA standards are unable to work with any federal organization via a published blacklist. Business and commercial entities are also following suit, as they have privacy concerns consistent with the federal government as well.

Trusted Platform Module enhances computer privacy and security. Consider it a hardware-level security measurement to protect your video recording device from malicious attacks. Once the TPM module is enabledthat physical chip is now permanently tied to that specific server or workstation and cannot be moved to any other system. TPM-based microchips on system boards offer another layer of hardware and intrusion security.

This software agnostic TPM module is utilized for high-level security file encryption, network security, and password management. These modules are secured by cryptographic algorithms and ensure total system security for the most sensitive data on your video recording system. As a matter of fact, TPM modules are a standard requirement from every video management software manufacturer and independent software vendor in the security marketplace.

#7) Testing the CCTV Camera system

After you’re done with the installation process, it is very important to have a test run. Any problems that you might face with your closed-circuit television system, can be best fixed before it’s too late – a stitch in time, does save nine!

#8) Maintaining the CCTV-cameras

Best practices include cleaning the cameras on a monthly basis to rid them of any dirt, cobwebs. Timely replacement of the cables used is also advised to keep the systems from any potential failures in the most crucial of hours.

#9) "Cameras never lie". But how will one know, unless one 'sees' what the camera 'saw'?

Encourages all medical collage authority of CCTV to audit their own CCTV video footage as a standard operating procedure. Regular auditing of CCTV footage by the public means that the Police/LEA have more 'eyes' working for them through crowdsourced surveillance. This enables the Police/LEA in identifying potential threats and dangerous situations before they occur. Also, in the case of a crime, if a standardized incident report is delivered to the Police/LEA by the affected party in PowerPoint carrying the entire story (what, where, when, why, who, how, and the video clip), crime will get solved faster.

The aim is to bring the colleges under the National Medical Commission’s surveillance, protect doctors from any attack during duty hours. There are a lot of brands in the market selling closed-circuit television cameras. The best brands include Infinova, Hanwha Techwin, Avigillon, Pelco, Axis, NUUO, Milestone and GVD etc Solution for reliable CCTV cameras. To get free consultation contact us.



সুষ্ঠ প্রশাসন রোগীস্বার্থকে সামনে রেখে মেডিক্যাল কলেজগুলির দৈনন্দিন কাজে সরাসরি নজরদারি চালাতে উদ্যোগী ন্যাশনাল মেডিক্যাল কমিশন। আর এই জন্য দেশের সব মেডিক্যাল কলেজের মূল প্রবেশদ্বার-সহ ২৫টি স্থানে সিসিটিভি বসানোর ফরমান জারি করল কমিশন। কমিশনের এই সিদ্ধান্তকে বেনজির বলেই মনে করে শিক্ষক-চিকিৎসকদের বড় অংশ। দেশের সব সরকারি বেসরকারি মেডিক্যাল কলেজ হাসপাতালে সিসিটিভি (CCTV) বসানোর নির্দেশ জারি করা হল। আর এই নির্দেশকে ঘিরে চিকিৎসকদের মধ্যে শুরু হয়েছে বিতর্ক। ন্যাশনাল মেডিক্যাল কমিশনের (The National Medical Commission) তরফে একটি অ্যাডভাইজারি করে দেশের সব রাজ্য সরকারকে মেডিক্যাল কলেজ হাসপাতালের মূল প্রবেশদ্বার-সহ রোগীর নাম নথিভুক্ত করার কাউন্টার, আউটডোর এমনকী প্রতিটি ফ্যাকাল্টির শিক্ষক, চিকিৎসকগণ যে জায়গায় দৈনিক উপস্থিতি স্বাক্ষর করেন সেই জায়গাতেও সিসিটিভি বসাতে প্রস্তাব দেওয়া হয়েছে। জাতীয় মেডিক্যাল কমিশনের আদেশনামায় একটি মেডিক্যাল কলেজের অন্তত ২৫টি স্থানকে নির্ধারিত করা হয়েছে যেখানে সিসিটিভি বসাতে হবে। ক্যামেরা IP সম্বলিত ও 4K মাত্রার বিশ্লেষণ যোগ্য সংরক্ষক যন্ত্র সাথে 4K  মাত্রার বিশ্লেষণ যোগ্য প্রদর্শিত  মাধ্যম ব্যবহার করা। 

যেসব স্থানকে সিসিটিভি বসানোর জন্য চিহ্নিত করা হয়েছে তার মধ্যে উল্লেখযোগ্য হল : মেডিসিন, শল্য চিকিৎসা, স্ত্রী শিশুরোগ এবং অস্থিরোগের আউটডোর। ) রোগীর অ্যানাস্থেশিয়া জ্ঞান ফিরিয়ে আনার এলাকা। ) প্রতিটি বিভাগের ফ্যাকাল্টি লাউঞ্জ এবং উপস্থিতি এলাকা। ) লেকচার থিয়েটার। ) মেডিক্যাল পড়ুয়াদের অ্যানাটমি ডিসেকশন হল। ) ফিজিওলজি, বায়োকেমিস্ট্রি ল্যাবরেটরি। ) প্যাথলজি মাইক্রোবায়োলজি ল্যাবরেটরি। ) ফার্মাকোলজি ল্যাবরেটরি। ১০) রোগীর অপেক্ষার স্থান। ১১) জরুরি ক্যাজুয়ালটি ওয়ার্ড।

ন্যাশনাল মেডিক্যাল কমিশনের চেয়ারম্যান ডা, সুরেশচন্দ্র শর্মা তাঁর প্রস্তাবে নির্দিষ্ট করে জানিয়েছেন, সিসিটিভিগুলি যেন ডিভিআর উচ্চক্ষমতার নেটওয়ার্ক যুক্ত হয়। সাংসদ তথা চিকিৎসক সংগঠন আইএমএ তরফে শান্তনু সেন বলেন, ‘‘কিছু অসাধু রয়েছেন। তাঁদের নিয়ন্ত্রণ করতে কমিশনের এই পদক্ষেপ।’’ জাতীয় মেডিক্যাল কমিশনের এই প্রস্তাবে চিকিৎসক-অধ্যাপকদের একাংশ যেমন অসন্তোষ প্রকাশ করেছে তেমনই আরেকাংশ বলছে, এই নিয়ম আগেই ছিল। কলকাতা মেডিক্যাল কলেজের অধ্যক্ষ ডা. রঘুনাথ মিশ্র বিষয়টিকে গুরুত্ব দিতে নারাজ। তাঁর কথায়, কলেজ বা হাসপাতালের কোনও জায়গা সিসিটিভিতে দেখতে না পেলে মাঝে মধ্যে ফোন করে।

মেডিক্যাল কলেজগুলির দৈনন্দিন কাজে সরাসরি নজরদারি চালাতে উদ্যোগী ন্যাশনাল মেডিক্যাল কমিশন। দেশের সব মেডিক্যাল কলেজের মূল প্রবেশদ্বার-সহ ২৫টি স্থানে সিসিটিভি বসানোর ফরমান জারি করল কমিশন যেটা খুব ভালো প্রস্তাব, কিন্তু পাশাপাশি ক্যামেরা চলছে কিনা এবং তা ঠিকমতো সংরক্ষিত হচ্ছেকিনা তা দেখার জন্য প্রতিদিন ভিডিও চিত্র নিরিক্ষণ করা উচিত। IP ক্যামেরা বর্তনীতে যেন এই ভিডিও প্রতিলিপি সুরক্ষিত থাকে সেবিষয়ে নজর রাখতে সেই ধরণের IP ক্যামেরা DVR / NVR  বসানো উচিত। আপনাকে দেখতে হবে সেই IP দ্রব্যটি যেন NDAA অনুমোদিত হয়।  


Saturday, January 1, 2022

Security Camera Input Setup

 Security Camera Input Setup

Artificial Intelligence (AI) security cameras are specialized network IP cameras that perform advanced analytical functions such as vehicle detection, person detection, face detection, traffic counting, people counting, and license plate recognition (LPR). These artificial intelligence functions are achieved using highly advanced video analytics software that is built-in to the camera and recorder they are connected to. AI cameras can be used as a stand-alone device by recording to an SD card, or they can be connected to a network video recorder (NVR) to create a multi-camera AI system that records to a central hard drive. Please note that only certain models are capable of license plate recognition / automated number plate recognition (ANPR).

A special characteristic some network video devices possess is an integrated input & output ports. This incorporation allows for the communication and interaction of external devices, such as but not limited to:
1.   Doorbells
2.   Switches
3.   Alarm System Relay
4.   Pressure strips
5.   Detectors (frequency, smoke, movement, sound, temperature, and humidity sensors)

All these functions can be achieved via:
1.   NVR/DVR (remote or local)
2.   Application through a smart device (Tablet or Phone)
3.  
Computer (local or remote / software or browser)

 

Camera / DVR / NVR Alarm Input

Motion sensors / motion detectors can be integrated with video surveillance systems to provide additional security for buildings and also outdoor areas. For example, a PIR sensor (passive infrared) can be connected to the alarm input of a security camera DVR or IP camera NVR to trigger video recording and send an alert to the property owner that motion has been detected in a certain area.

When motion is detected by the motion sensor, it triggers the following alarm actions.
1.   Trigger video recording on the camera associated with the alarm.
2.   Enable the alarm output on channel one, where I have an alarm light attached (turn the strobe light on).
3.   Pop-up live video of the camera associated with the alarm on the DVR’s display monitor.
Here are some additional actions that can be triggered from an alarm input.
1.   Capture a still image snapshot.
2.   Send a push notification to the mobile app for iPhone & Android.
3.   Enable the alarm buzzer on the DVR / NVR.
4.   Send an email notification.

The inputs and outputs can be used to eliminate unnecessary recording of video or coincide with your alarm system to systematically create a reliable and accountable security source. When input and output mechanisms are triggered, you can (manually or automatically) request through the network video device that certain actions be performed over the network as well as trigger devices attached to the output ports. Example:

This example picture above shows a person interrupting a sensors function. This creates a signal that travels to the camera and the camera computes the message. The camera then functions as programmed and starts recording (snapshots or footage) to the delegated device while simultaneously triggers a relay to close. When the relay closes, it completes the circuit for the siren or strobe to activate. Another configuration (as long as the cameras capable), have the camera record to the desired method based on motion and simultaneously trigger the relay to set off the siren. In this example, a motion sensor is taken out of the equation.

Again, the above picture shows only one of many configurations. You can configure in whatever method you desire. Including or excluding recording methods based off of:
·        Motion (movement takes place)
·        Masking (the camera has been covered or obstructed significantly)
·        Video Loss (picture is no longer materializing, this feature is more prone to function correctly via a recorder or program)

Other devices that can be attached and configured to your I/O ports are as follows:

Device Type

Description

Occurrence of activation

Entry Contacts

Simple magnetic sensors detecting opening of doors, windows, gates and shutters.

When the circuit is broken (door is opened) the camera can record and/or send a snapshot and notifications

Motion Sensors

A sensor that detects motion either based on heat, light, or frequency

When motion is detected, the sensor breaks the circuit and  the camera can record and/or send a snapshot and notifications

Glass Break or Glass Shock Sensor

A sensor capable of distinguishing the sound/vibration of breaking glass and/or splintering wood.

When glass is  disturbed or shattered, the glass sensor breaks the circuit and the camera can record and/or send a snapshot and notifications

Pressure strip or switch

A pressure or switch sensor that are needed to interact with before gaining entry or exiting a premise or structure

When the sensor is triggered it breaks the circuit and the camera can record and/or send a snapshot and notifications


How-to Install Motion Detectors with a Security Camera System

Installing a motion detector and integrating it with a security camera system is fairly simple. CCTV Camera Pros supports professional and DIY installers. Most PIR motion sensors are 12V DC powered which gives installers the choice of using a individual 12V DC power supply or one of the ports on a multi-channel power supply box (the same ones used with security cameras).

In this first diagram, a single 12V DC power transformer is used. This is how it works.

1.   On the right side of the diagram, the alarm input / output panel of the DVR is shown. This is what the alarm panel on the back.

2.   18/2 gauge power cable connects the output of the motion detector to one of the alarm input ports on the DVR.

3.   18/2 gauge power cable is also used to connect the motion detector to an individual DC power supply.

4.   A PT-4 power lead connects the raw cables to the 3.1mm plug on the power supply.

Installation with Power Supply Box

A multi-channel power supply box can be used instead of an individual power supply.

This installation is the same as the one above using the single power supply. The only difference is the use of a multi-channel power supply box to power the motion detector. CCTV Camera Pros supplies many of these power boxes for security camera installations. These power boxes can be shared with cameras and 12V DC powered alarm sensors. Because power supply boxes use screw based wire terminals, there is no need to use a PT-4 power lead (as with the individual power supply installation). Same connection for Camera & NVR.

Most of Camera PIR motion sensor is located on the front of the camera, just below the camera lens. This motion sensor is designed to detect movement of human sized objects when they come into view of the camera’s lens. The camera has a 2.8-12mm varifocal lens which when adjusted to the widest angle (the 2.8mm setting) the camera provides a 109 degree horizontal field of view. The PIR sensor detects motion across a 100 degree field of view. Please note that if you adjust the lens to a more narrow field of view, this does not effect the area where the PIR sensor will detect motion.
In my experience, using a PIR sensor based motion detection is much more reliable than software based video motion detection (especially for outdoor video surveillance). Typically there are a lot of small moving objects outdoors which makes it difficult to get the sensitivity just right. When security cameras turn to night mode, there is typically some video noise because of the lack of light. This noise can cause false alarms when using video motion detection. A PIR sensor uses infrared light to measure the radiation reflected by objects in its view. When a certain amount of this radiation changes, the PIR sensor triggers an alarm, so they are not susceptible to some of the challenges of outdoor video motion detection.

FAQ

Here are some frequently asked questions about integrating PIR motion detectors with security camera systems.

·        How are motion detectors used with security camera systems?
The most common way to integrate a motion detector with a security camera system is to hard wire the motion detector to the same surveillance DVR that your security cameras are connected to. You must make sure that your DVR that has alarm inputs.

·        Can I just use motion detected from my security camera instead of an external motion sensor?
Yes, most DVRs support video motion detection triggered by cameras. Please note that this is different from PIR (passive infrared) motion detection and can be less reliable. Video motion detection tends to produce more false positives than PIR motion detection, especially in outdoor and infrared camera applications. This is because the video tends to be more noisy and outdoor environments tend to always have some motion from wind and other natural elements.

·        What type of cable is used to wire motion detectors to DVRs?
The following types of cable can be used to wire motion detectors: CAT-5 cable (one pair), 18/2 conductor power cable.

·        Do motion detectors require power?
Yes. Most PIR motion detectors use 12V DC power. All of ours include the proper power supply with them.

·        Can I use multiple motion detectors with my surveillance system?
Yes, as long as your DVR has multiple alarm input ports, you can use multiple motion detectors. Different model DVRs support different numbers of alarm inputs so consult the specification or contact us if you need help.

Not every camera or NVR/DVR possesses this unique features or can be operated through the above mentioned methods. Be sure you research everything you will need to make this type of setup successfully work for you. This includes the correct relays, power supplies, capable camera and recording devices. Most our IP mega pixel cameras and recorders have the capability of all previous mention features above.

If you are not understand, you can touch with us for further support. We deal Infinova, Hanwha, Milestone, Mirasys & Luxriot brand.