securitylinkindia

E-attendance BI’s Knock on the Door

In 1865 Richard Miller Devens, while talking about the then banker Sir Henry Furnese, in the book ‘Cyclopaedia of commercial and business Anecdotes,’ coined the term ‘Business Intelligence.’ The book states that Sir Furnese would maintain a complete and perfect train of business intelligence, throughout Holland, Flanders, France, and Germany. This resulted in him gaining various profits owing to his early receipt of information. In 1989 Howard Dresner proposed Business Intelligence as an umbrella term, to describe concepts and methods to improve business decision making by using fact based support systems. Later, Dresner became a Gartner Group Analyst, and today Business Intelligence is defined as an umbrella term in Gartner’s Glossary that includes the applications, infrastructure and tools, and best practices that enable access to, and analysis of information to improve and optimise decisions and performance. Pulling together these definitions, the analysis of information for profitability can be framed as the core purpose of Business Intelligence (BI). On the basis of the information available in our surroundings and definitions, it can be perceived that an organisation looking for business intelligence might have to go through heavy transitions in order to implement it. The required tools along with the information flow, need to be verified. The perception moves against BI for small scale industries, and when it comes to private security providers, BI struggles to find a seat among various operational requirements. BI and private security organisations Musselman and Jackson in 1992 defined business as an activity that meets the needs of society and the economy, and the company that is organised to engage in these activities. For private security sector the definition summarises business as the activities involved in providing security to customers and their belongings. Griffin and Ebert extended the business definition to providing goods and services to earn profit. This definition includes the business owners’ or managers’ interest. The organisations’ aim to maximise their profit makes it necessary for the decision makers to think out of the box. The usual practises are being challenged with the change of technology, and technology is evolving on day to day basis. Recently, some out of box solutions have been introduced around the world. Google, in an event recently had introduced a new level of artificial intelligence (AI) solution which can make calls on behalf of the user. Alexa, the amazon’s virtual assistant is now easily available in the market. Microsoft has been talking about the power of AI for a while. AI is filling gaps between human imagination and reality. Business is a different game altogether. Imagination has different meanings and definitions in business and therefore BI, as has been highlighted above, is business’s answer to profitability. The private security sector has a complex operational process. Remoteness is a crucial factor with its respective impact on every business step, from recruitment to delivery of services. While we mention the various business steps we shall not overlook the point that all the steps have the delivery of services as their epicentre. After all, it’s the delivery of services, i.e., the guards’ presence at the customer location that turns into earnings. This makes the attendance and allocation of guards, the front-runner for BI in the private security sector. BI is dependent on data and its utilization. In case of attendance, there are numerous solutions now available in the market which can help the agency to sail towards BI and profitability. Some of the possibilities and solutions are as follows. Biometrics A common practise apart from the pen and paper is the use of biometrics. The staff can punch their movement time, but the biometric’s output needs to be merged with the existing system before it turns into a meaningful resource. Biometrics, though low cost, is more of an old age solution, and the attendance process at the time of shift change, at customer’s location, can become messy. Also, it requires installing the machine at the customer’s premises. Looking from the future perspective, biometrics and BI do not gel-in as a solution. Video cameras Video cameras have now become an integral part of the security industry. Usually, it is considered as an agent to serve customers, but video cameras can help with attendance marking as well. Video analysis, a new trend in the market, is a technique of automatically analysing video and determining events like guards entering the premises, leaving the premises etc. Though the solution sounds interesting, it faces challenges on the cost front. Video analytics is an expensive option and organisations would prefer this kind of solution at high end locations only. RFID Radio frequency identification, popularly known as RFID, uses electromagnetic fields to detect the object. The common practise is to use RFID tags as identification cards and whenever the person holding the card enters the premises, their attendance is marked automatically. The RFID is useful when the agency can ensure that the guards will enter and leave from the specified gate or the RFID reader only. Also, the malpractices such as a guard giving his card to another fellow and leaving his duty cannot be controlled through RFID. The control measures for such malpractices can again be expensive or may even struggle with feasibility issues. GPS based attendance An interesting solution that has evolved with the growth of mobile phones is GPS based attendance. The agency can ethically track their guards and their movement. The solution’s usefulness is not just restricted to attendance marking, but can be used for various other services also. Various agencies have tried this method through either their telecom provider or through other service providers. With telecom providers, due to the established infrastructure, the cost might look to be on the lower side but connectivity emerges as an issue. Along with the connectivity, the low cost solution may give only brief information, which might fail the main purpose of having GPS based system. The service providers dealing in GPS can provide meaningful data, but then, the solution needs to be implemented at the bottom of…

Read More

World’s Largest Cathedral Trusts Vicon To Delivering World-Class Security

The Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world has recently completed installation of a Vicon Valerus video management system to secure the Cathedral and surrounding 11.3 acre complex in Manhattan. As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, the most reverend Desmond Tutu and President Bill Clinton. The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon highresolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras includes models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Cameras also provide coverage of the Cathedral’s exterior, administrative and residential buildings that support the Bishop, clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths, and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally ill and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-toend Vicon solution including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing.

Read More

Americas: Hundreds of Human Trafficking Victims Rescued

Nearly 350 potential victims of sexual exploitation and forced labour have been rescued in an INTERPOL coordinated operation targeting human trafficking in the Caribbean, Central and South America. More than 500 police officers in 13 countries also arrested 22 individuals during Operation Libertad (3-9 April), held under the INTERPOL Project to combat human trafficking in the Caribbean. The Joint Regional Communications Centre (JRCC) in Barbados hosted the operational coordination centre, with specialist officers from INTERPOL’s Trafficking in Human Beings unit deployed to the region. Support was provided by the INTERPOL Command and Coordination Centre at the General Secretariat in Lyon, France and at the INTERPOL Regional Bureau in Buenos Aires, Argentina. In addition to coordinated police raids, searches were carried out against INTERPOL’s criminal databases, generating 30 hits, including 25 for stolen and lost travel documents. Computer equipment, mobiles phones and cash were also seized. “Operations like this show the power of INTERPOL providing a platform for the 13 participating countries, but what sits behind these numbers is the human story,” said INTERPOL Executive Director of Police Services Tim Morris, “Whether it is someone’s mother, father, brother, sister, son or daughter, there is an intensely personal story that is usually unfortunately accompanied by a lot of sufferings.” Targeting the most vulnerable Both men and women, including minors, were discovered working in night clubs, farms, mines, factories and open-air markets. With thousands looking to cross borders in search of work, traffickers are targeting the most desperate and vulnerable members of society with promises of a better life. Cem Kolcu, Coordinator of INTERPOL’s Trafficking in Human Beings unit, said, “What traffickers don’t advertise are the working conditions their victims will be subject to once their final destination is reached. During this operation, we identified women being forced to work out of spaces no bigger than coffins, for example.” In Guyana, young women were found working as prostitutes next to extremely remote gold mines, from which they could not escape. This is a common modus operandi as the geographical location of the mines also complicates investigations. “Isolated locations make it difficult for officers to avoid detection when travelling to these camps. By the time intelligence is acted upon, perpetrators have had the opportunity to act and move the victims,” explained Diana O’Brien, Assistant Director of Public Prosecutions, Ministry of Public Security, Guyana. A victim-centric approach To ensure victims received the necessary care following their rescue, social services and NGOs were involved in conducting post-operation interviews and providing support services to victims. Because they can earn more than they would in their home countries, some victims don’t identify as such, making it difficult to gather evidence and prosecute cases of suspected trafficking. Other victims are manipulated and intimidated into providing false information. In Saint Vincent and the Grenadines, Asian ‘employees’ at a factory had been stripped of their passports and made to be completely dependent. Having never received wages, they relied on their handlers for housing, transport, food and the most basic necessities. With similar examples across the region, this highlights the need to raise awareness amongst vulnerable communities in both source and destination countries and to ensure appropriate support mechanisms are in place. INTERPOL global task force on human trafficking The operation was the culmination of the two-and-a-half year project funded by the Government of Canada, which provided specialized training to investigators and immigration officers in order to enhance operational expertise and regional coordination to combat human trafficking. The programme is one of several projects under the INTERPOL Global Task Force on Human Trafficking, which received the backing of G7 Security Ministers last week.

Read More

March SE2 Series IP Cameras

March Networks®, a global provider of intelligent IP video solutions, introduces its SE2 series IP cameras. The new camera line delivers 1080p video and a comprehensive range of advanced features for indoor and outdoor applications. It also incorporates a smart low bit rate (LBR) setting that reduces bandwidth and storage consumption by 50% or more, making the SE2 series IP cameras a costeffective option for businesses with dozens or hundreds of surveillance cameras. Compatible with all March Networks video recording platforms including the 8000 series and 9000 series video recorders and command recording server (CRS) software, the cameras are also easily managed with powerful March Networks Command™ enterprise video management software. Command Enterprise enables customers to administer the complete video solution more effectively, and benefit from capabilities such as centralized video management, mass camera management and system health monitoring. The SE2 series cameras are also compatible with third-party video recording systems via the ONVIF Profile S standard. Organizations can choose from three distinct SE2 series models, each available with multiple mounts and accessories. These include: The SE2 Indoor NanoDome, a low-profile dome with an extra-wide, 134-degree field of view (FOV) that enables organizations to monitor an entire area with a single camera. In surface mount applications, all wires terminate inside the camera, eliminating the need for a separate side cable access housing. Other key features include a 3-axis gimbal for simple positioning during installation, and a 90-degree hallway mode rotation to better capture vertically-oriented scenes. The SE2 Indoor IR Dome that ensures high-quality video capture in challenging lighting conditions – including bright sunlight and complete darkness – through a combination of high dynamic range (HDR) and integrated infrared (IR) LEDs. The camera also incorporates hallway mode and helps speed installations with features including remote zoom and focus, and a convenient EMT mount that attaches directly to an unthreaded pipe, ideal for high ceiling installations. The SE2 Outdoor IR Dome, a ruggedized dome protected by a weather-proof (IP66), vandal-resistant (IK10) enclosure to ensure optimum performance in all climates. The camera’s integrated HDR, IR and P-Iris deliver clear, focused video capture in varying lighting and regardless of an object’s distance within its FOV. Similar to the other SE2 models, the camera incorporates hallway mode. It also includes a 3-axis gimbal and remote zoom and focus. For ease-of-service, each SE2 series camera comes with a unique QR code that technicians can scan with their smartphone or tablet using March Networks’ free GURU smartphone application. The combined functionality enables technicians to access product serial numbers, warranty status, video tutorials and product manuals, run installation audits, submit an express RMA and more – saving them valuable time and cost. “We are thrilled to add these SE2 series IP cameras to our portfolio,” said Nathan Dinning, Edge Devices Product Manager, March Networks, “They expand the range of IP cameras our customers can choose from, and are a full-featured option for applications such as warehouses, grocery stores and big-box formats with many cameras and few ultra-high definition requirements. They are also our company’s lowest-cost camera offering to date, and we expect the combination of high-performance and affordability will make them a popular choice in new and existing installations.”

Read More
House-Break

4 Ways to Proactively Protect Your Home

The statistics don’t lie. Home burglary rates are high. According to a survey of 1,000 Australians, 1 in 5 people have had experienced a burglary or attempted burglary. When compared to the rest of the world, it’s clear we have a problem. The international average of home burglaries is 1.8%, and ours is 2.5%. This means that 1 in 40 Australian homes may be burglarized this year. These figures are startling, but you can take action to avoid becoming another statistic. Here are 4 easy ways to proactively protect your home. With these tips, you can safeguard your family, property, and home. 1.     Install a home security system Only 1 in 3 people from the above-study responded that they had a home security system. However, the presence of a home security device is a powerful deterrent for a would-be intruder. A study by the University of North Carolina found that 60% of burglars would be deterred by the presence of an alarm. Technological advances have now made it easy to install home security. As a leader in the DIY home security space for over 30 years, Swann is dedicated to helping keep your home safe around the clock with affordable solutions. Our wireless security cameras eliminate messy cabling and make installation easy. In addition, our high-definition security cameras can capture facial features, license plates, and see in the dark up to 30m. You can even check on your property remotely from anywhere in the world with your smartphone and a Swann app. Additionally, Swann has cameras with True Detect™ heat- and motion-detection and the ability to generate push notifications and video recording when the camera detects activity. Using heat-sensor technology versus only motion detection means fewer false triggers and more reliable notifications. This combination can help prevent burglaries while also capturing and recording valuable video evidence most efficiently. How do I choose between wire-free cameras or wired system? First, decide how many cameras you need and where you need them, try analysing potential break-in points around your home. Take a look at your home from the road and consider all of the potential points of entry. Next, consider whether you want to install a system that connects to your home’s Wi-Fi network or not, including the distance from your router and how many devices will be connected. Do you want a system that is hardwired into your home, or totally wire-free cameras? Hard-wired security systems give you more recording features. For example, if you’re concerned about a specific area of your property, you can set parameters to include or exclude certain areas from your camera’s view. All of these features provide you with reliable, affordable, and userfriendly home security. Also, wired cameras can offer a more stable signal at times. Installing a home security system with cameras allows you to take proactive steps to protect your family, home, and valuables before anything happens. Not only does a visible security presence at your home mean that you may be less likely to be broken into, but it also gives you peace of mind. 2.     Be vigilant Having a home security system isn’t the only action you can take to protect your home and family from intruders. A few easy steps can potentially make your home less attractive to burglars It’s difficult for a burglar to steal what they can’t see. Don’t tempt would-be burglars. It’s advisable to keep valuables hidden and your blinds closed when you leave your home. Or if you’re expecting a package, ask a neighbour to collect it for you to decrease the risk of theft and so it doesn’t look like you’re not home. While seemingly minor, these tips may help keep your property safe. Are you among the 35% of Australians who leaves a spare key outside their home? If so, it’s time to rethink the idea of hiding a key under a flower pot or somewhere outside your home. This is a common practice, so it’s often one of the first things that a potential intruder will look for. Don’t make it easy for them to enter your home by leaving a key for them. And, be aware of potential hiding spots on your property. You may not realise that you are creating the ideal blind spot outside of your home with poor lighting. Investing in simple outdoor lighting, including sensor lights, can sometimes be enough to help prevent a home break-in. 3.     Work with your neighbours You may not realise it, but you have strong allies in the fight against burglary – your neighbours. When you get to know the people who live near you, you can look out for their homes while they keep an eye on yours. Watchful eyes can be very helpful against home invasions and theft. After you get to know your neighbours, consider taking your safety efforts a step further by creating a neighbourhood watch program. Together, you and your neighbours can arrange for community meetings and nightly patrols. 4.     Discuss insurance coverage Your best efforts sometimes aren’t enough to prevent a break-in. Home or renter’s insurance can make sure that you’re prepared if something does happen. Budget Direct Home Insurance offers a number of options that protect your home and belongings from burglaries, fire, storm damage, and more. The act of obtaining insurance is another great way to protect you from the unthinkable. By following these easy home security tips, you can feel confident that you have taken proactive steps to reduce your risk of being a victim of a home break-in. We recommend taking a proactive approach regardless of if you’re going on holiday, especially if everyone in your home is gone during the day. Nothing can compare to the peace of mind that you have when you know that you’ve protected your home, property, and family.

Read More
Convergence of Physical Security

How the Convergence of Physical Security and Cybersecurity will Benefit Businesses

The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs, and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow. Need for education and enhanced security With the increased profile of the industry, one can clearly see that the physical security industry is expand ing globally to new consumers, bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols, and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprising cloud services at nearly $7B. Sharing security service best practices In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities. Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions, VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers. Cloud versus non-cloud services The insight that one was able to glean from this information, and that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition, and as such should be addressed across all levels of manufacturing, implementation and customer utilization. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products. Ensuring successful deployment As a SaaS service provider, the technical personnel make up results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions. Data security strategies Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimize attack surfaces, create complex proprietary associations in a multi-layered and multi-tiered connection throughout the application, and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests. Addressing cyber threats These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market. An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner. Knowledge of networks and cybersecurity best practices The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions. In most cases, this will…

Read More

Cash Logistics & Private Security Agencies Flag Concerns over RBI Directive

The RBI has recently issued a notification regarding cash-in-transit companies involved in replenishment services of ATMs, cash pickups and drops. As per the notification, only those companies are recognized for these services which have a minimum net worth of INR 100 crore and a fleet of 300 vehicles, among other requirements. The cash logistics private security agencies at large don’t go well with the notification and voice their concerns. As Central Association of Private Security Industry (CAPSI) claims, the RBI decision has shaken more than 65 medium and small companies that are involved in cash logistics, and which do not fall under the criteria, and therefore they would render jobless and have to shut their companies. In this connection, CAPSI has approached Competition Commission of India (CCI) and petitioned to D K Sikri, Chairperson, CCI to take immediate action to stop the directive of RBI which is against the spirit of fair competition and jeopardize the interests of a large section of the industry. CAPSI has also approached MSME as the RBI circular grossly violates the spirit of the MSME act; the decision will result in closing of more than 65 companies. As CAPSI suggests, high ranking officials of MSME assured support to the cause. A delegation of CAPSI comprising Kunwar Vikram Singh, Anil Puri, Pawan Alhuwalia, Mahesh Sharma and Sanjeev Paul met Shiv Pratap Shukla, Minister of State, Ministry of Finance and discussed the RBI notification towards CIT business. The Minister informed that he will bring this serious issue to the notice of PMO so that appropriate action can be taken soonest. They also discussed the negative impact of GST on the entire PSI business which the Minister said that the matter is already under consideration of the Ministry. The grouping of private security agencies has also written a letter to the Prime Minister of India, Narendra Modi for his intervention. In the letter Kunwar Vikram Singh, Chairman, CAPSI alleged that the RBI decision would facilitate only two or three foreign-based companies and would create monopoly of foreign firms in the business. CAPSI also filed a writ petition in the Delhi High Court challenging the RBI notification. A separate petition was filed by Premier Shield Pvt. Ltd. which was heard on 30 May 2018.The judge clubbed their petition with that of CAPSI, and that will be heard on 17 August 2018. Considering that only partial redressal has been granted, the association has decided to file an appeal to a Division Bench, which is likely to come up for hearing in July when the court reopens. Kunwar Vikram Singh, said that the RBI decision is a serious security threat to the economic state of nation and the nation at large. Under the notification only a few big companies mainly foreign ones will be eligible to undertake this critical national assignment. This will render more than 65 companies out of business and cause them huge financial losses. Majority of Indian companies are being run by ex servicemen. “The government intelligence organizations must carry out a risk analysis on handing over the entire cash management to foreign based companies, and imagine a scenario when they stop cash delivery to banks and ATMs under instructions from their masters who may conspire with our enemies and create huge upheaval in the country. It can prove fatal for a country like India,” said the Chairman, “Moreover, should these companies crash due to some international financial crisis and terminate their operations in India, what will be the fate of our banking sector and public enterprises. RBI must have considered these serious security threats before taking such decision.” CAPSI represents more than 2,000 entities that provide private security services.

Read More
gujrat_infinova

Gujarat CSITMS Project of City Surveillance

A few years back, when Gujarat government decided to deploy CCTV based city surveillance and intelligent traffic management system (CSITMS) across major cities such as Ahmedabad, Vadodara and Gandhinagar, Infinova with successful integration with Larsen & Toubro (L&T) provided a real-time surveillance system that was able to integrate digital maps, video with good quality, and high-quality evidences for challan generation as well as court proceedings. Infinova’s video analytic capabilities included red light violation detection, wrong lane detection, over speed detection, automatic number plate recognition identifying traffic rule offenders, and other criminal activities. It was an initiative taken by the Government of Gujarat for intelligent traffic monitoring and also to bring transparency in the imposition of traffic lines. Infinova’s round-the-clock surveillance system provides real-time information including audio and video to enhance quick response in all emergencies situations and heavy traffic. The integrated system helped prevent crimes, reduce threats, and enhanced safety and security in public area. Infinova deployed 220 PTZ cameras for accurately monitoring traffic across major cities of Gujarat. The IP based PTZ cameras with in-built remote control provide immediate response to the operators’ commands, making it highly responsive during emergency situations. Infinova’s smart surveillance system assures 360 degree coverage and offers highest precision in day and night. The camera system installed is dynamically efficient and resistant to bad weather conditions. The project has marked significant progress by creating smart surveillance and intelligent traffic management solutions, and generated a spectrum of scalable security solutions by executing large number of cameras over the cities. By providing extensive video management systems, picture intelligence units and geographical information systems, the project has tremendously helped deal with increase in road traffic. The integrated surveillance solutions have reduced traffic congestions by improving incident response time and optimizing traffic flow proactively. Infinova’s multi-faceted traffic management solutions have also helped analyze and even predict traffic patterns by leveraging automated information. Infinova is a leading security and surveillance product manufacturer, acclaimed globally, and is committed to technology, innovation and quality. It manufactures end-to-end analog and digital surveillance solutions and is specialized in offering integrated video surveillance solutions. Infinova has the technical ability and manufacturing flexibility that allows integrators to propose customized solutions. Additionally, it collaborates with other manufacturers of surveillance equipment and software to help the channel partners create turnkey solutions. Infinova backs-up partner’s products to assure integrator’s as well as customer’s trust.  

Read More