securitylinkindia

Johnson Controls Tyco Cloud for Secure and Simple Security

Johnson Controls has announced Tyco Cloud, a new cloudbased security suite developed to help customers move costly and complex security infrastructure for access control and video surveillance to the cloud. With Tyco Cloud, organizations can reduce costs, improve enterprise security management and scale security operations on demand, providing unlimited possibilities to deliver security services over the internet.   Tyco Cloud allows users to protect lives, assets and facilities through management of access control, video surveillance and other security operations using secure cloud services and connected devices such as cloud cameras and controllers. Cloud solutions from Tyco run on an open and modern microservices architecture to ensure fast, scalable and secure services. “Our customers worldwide are embracing and accelerating digital transformation to make their businesses more intelligent, agile and cost effective,” said Martin Renkis, General Manager of Cloud Solutions, Global Security Products at Johnson Controls, “Tyco Cloud empowers this digital transformation with on-demand security management that enables organizations to securely and cost-effectively customize their video surveillance and access control solutions based on site-specific and enterprise-wide requirements.” For video surveillance, organizations can enable Tyco Cloud with any Illustra Cloud camera or leverage existing camera systems using Tyco Cloud gateways, which will automatically locate existing cameras from dozens of different manufacturers on a network and enable secure cloud management of those cameras. Tyco Cloud enables video storage in camera, in gateway, in low latency cloud, in high latency cloud or a hybrid combination to support unlimited flexibility and cost effectiveness. The intuitive interface allows users to customize multiple recording parameters such as which cameras to record and for how long, video resolution, as well as create unique upload schedules to minimize bandwidth consumption. The service also offers Cold Cloud video storage for cost effective high latency online archiving. The new Hyper View feature enables users to search through 24 hours of recorded video from up to 100 cameras within 60 seconds. Tyco Cloud surveillance also supports powerful analytics such as heat mapping, object detection and crowd formation to name a few. For access control, the new ioSmart solutions from Tyco Cloud empower smartphone based mobile credentials and smart key managed access control for companies to securely allow personnel to conveniently access facilities using their smartphones without the security risk of lost, stolen, or cloning of legacy card technologies. Tyco Cloud ioSmart was cloud first designed to deliver convenience, cost savings and advanced security for access control. The Tyco Cloud Enterprise Manager portal provides users with a comprehensive view of their entire security solution through a single interface. It provides real-time status and management of every connected device on a clickable global map. This simple dashboard also enables tracking and management of users, bandwidth utilization, cloud storage and device firmware. Additionally, Tyco Cloud secures all data from any device to the cloud and to the end user. Every connected device as well as the cloud platform are supported by the Johnson Controls cyber solutions product security program, which delivers enhanced safeguards against cyber attacks, including additional controls for proper password management and end to end encrypted communications.  

Read More

Fire Accidents & Role of First Responder

  Fire safety assumes huge significance equally for a corporate and/ or a small enterprise. It begets proportionate impact on the businesses, and any lapse therein brings overwhelming bearing on the safety of personnel (loss of life), property, and data etc., and ultimately on the business of both entities. Majority of researches hitherto on the fire incidents that occurred across all business domains affirm that the ‘first responder’ plays the key role in diverting and mitigating the impact of a fire incident – whether the person is a security guard or an employee, or anyone else for that matter. His/ her prompt and correct reaction to the detection of fire may save many precious lives, and assets worth billions, while an erratic and/ or panic ridden reaction may cause loss of similar metrics. The compliance of building parameters as defined in the NBC 2005 in terms of the installation of fire detection and suppression systems within the building and in a premise also plays an equal role. There is a large number of fire incidents where the AP Securitas security guards have taken prompt and courageous actions to save lives and properties. They brought us laurels and appreciations from across the clients. We discuss one of the cases here: Profile of premise The branch office of one of our corporate clients is housed on the 4th and 5th floor of a five story building, called Bhanot House in Yusuf Sarai, New Delhi. While the branch manager and his staff operate from 4th floor, the advisors and others function from 5th. The aforesaid corporate client got the fire panel installed on both floors for fire detection and subsequent alarm. Their office working hours are from 09.30AM to 06.30PM, and the employees strength is approximately 150 including advisors/ agents. They observe every Wednesday as the ‘lights out day.’ Two security guards are on duty at a time in the day – one at each floor. There is no security guard at night after office closes in the evening. The building security at night is assigned to another security provider. Incident profile At about 06.30pm on the fateful day of 17 July 2019, when most of the employees had left and it was time to close the office, the branch manager instructed Uday Singh, who was the security guard deployed at 4th floor, to take a round of 5th floor and switch off all lights, and ensure that all employees had left. Mr. Angad who had left earlier that day due to some urgency at his home was the usual security guard at the 5th floor. While Uday Singh was climbing the staircase, he heard a hooter alarm. He rushed upstairs to the fifth floor where he found the training room was full of smoke up to the ceiling. There was a short circuit in the LED light mounted on the ceiling. The smoke had already spread through ceiling to the adjacent Server Room. He took prompt response, switched off the mains immediately and shouted loudly – FIRE! FIRE! FIRE! – to inform the branch manager. He dialed 101 to inform Delhi Fire Services of the fire in the premise, picked up the fire extinguisher installed on the 5th floor and entered the training room where the fire was in full blaze by then. Notwithstanding the risk to his own life, he used the fire extinguisher and doused the fire. Further, he proceeded to the Server Room which was locked by a glass door, broke the glass door and extinguished the fire using a second fire extinguisher. This is how he was able to save vital data stored in the server, and loss of other assets of not only premises of our client but of the entire building. The branch manager and the admin are the eye witness of this act of our brave security guard. This is just one incident which has been illustrated here but there are several others. For instance, two similar incidents took place in a premise of Sujan Vihar, Sector 43, Gurugram where the AP Securitas security guards saved the flat from fire in 2017. The fire broke out there when the owners of the flats had gone to their offices. Later, the concerned security guard was awarded cash prize by the RWA. In another similar incident in 2018, our security guard Buddha Prakash showed his dutifulness and saved the head office of another client from devastation due to fire located at Rattan Square building near Burlington Chowk, Lucknow. Lessons learnt Following vital lessons can be drawn out of these incidents: Adequate focus and weightage to fire safety in all types of training. Need to check premises on a daily basis just before the offices are closed. The importance of fire detection and suppression system in giving the early warning of the incident. Significance of multiple tasks needed to be done in a short span of time on detection of fire by the first responder. Selection of the right fire extinguishers for the type of fire identified. The training and confidence level of the first responder i.e., the security guard hold key to the success of the operation at the grass root level. The degree of ownership displayed and risk appetite demonstrated to depend upon the motivation and inspiration drawn from his trainer. The established system of reward and recognition in the company to enhance the level of motivation to security guards. Conclusion The score of high profile fire accidents during this year in Delhi-NCR and elsewhere in India has drawn the attention of the concerned authorities that resulted in the tightening of rules and regulations. However, the continuous pressure needs to be kept to ensure compliance. We in the APS Group take pride to state that our clientele has benefitted at large and ensured their premises are safe and secure through the dedicated team efforts of APS training team by ensuring regular fire safety inspections, fire safety audits, conceptualizing of building evacuation plans, ERT training, and…

Read More

Enterprise IT World & InfoSec Conducting the Third Chapter of 4 City CISO Security Symposium

The Delhi chapter of the Enterprise IT World and Infosec Foundation’s Security Symposium and Awards 2019 has been successfully concluded. The event is a series of 4 city CISO events aimed at initiating discussions on the security questions among the security leaders in the metro cities – Bengaluru, Kolkata, Delhi, and Mumbai. The theme for this year’s Security Symposium is ‘Zero Trust Security: Capitalizing on the Adoption Wave.’ At a time when cybersecurity breaches have become a contributor to the economic crisis in India, a platform like this allows the stakeholders to come together and discuss ways to control and mitigate the economic impact of cybercrime. The series of events saw a huge turnout wherein the security leaders came in and participated in panel discussions on topics like ‘Protecting Your Company and Your Customers from Cyber Attacks,’ and ‘Why a Zero-Trust Approach Can Make the Cloud More Secure.’ The Delhi chapter, Security Symposium, held at Hotel Le-Meridian on 9th August, was inaugurated by Lt. Gen Rajesh Pant (Retd.), Chief of National Cyber Coordination Centre; Dr. Pawan Duggal, Advocate, Supreme Court; Ms Orly Naomi Goldschmidt Gartner, First Secretary (Public Diplomacy), Israel Embassy; Sanjay Mohapatra, Group Editor, Enterprise IT World; and Sushobhan Mukherjee, Chairman, InfoSec Foundation and CEO – Prime Infoserv. In his inaugural address, Lt Gen Rajesh Pant (Retd.) said, “Cybercrime is taking away 2.5 percent of the GDP. In a tight microeconomic situation, the impact of cybercrime on the nation is very serious, this makes cybersecurity so crucial.” Emphasising the government’s stake on the issue, Pant said that the centre is working on a new strategy for cybersecurity that will be released early next year and will take into account the newly emerging technological threats with regards to 5G, IoT, and the likes. This new cyber security strategy is expected to set norms and standards that would help the enterprises to navigate towards a secure digital transformation. Dr. Pawan Duggal elaborated on the legal aspects of cybersecurity as prevalent in countries across the world and highlighted the areas where India’s own legal framework is lacking with respect to a comprehensive cybersecurity strategy. In addition to the keynote sessions and discussions, the leading CIOs and CISOs in the enterprise market were recognized with the Cyber Sentinel Awards 2019.  

Read More

Al-Khodari Opts for Matrix Time-Attendance Solution

Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste-water treatment, oil-gas and pipelines. It has 25 construction sites across the Middle East. Managing time-attendance, shifts, overtime and leave of 20,000 employees at different locations was a challenging process for them, and they wanted a centralized time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Challenges Al-Khodari is engaged in widespread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leave and overtime of 20,000 employees at different locations is a very time consuming and tedious task. Previously, the customer was using hand geometry solution, which was very time-consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading to loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralized time-attendance and access control solution which could be managed and controlled from the head office. Solution After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. Optical fingerprint-based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office where attendance data of all locations is collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Results The time required for salary calculation reduced by 30%. Productivity increased by 20%. Control of all sites through a live monitoring window. Error-free time-attendance and overtime data. Database management of all employees. Centralized report generation.  

Read More

Secureye Launches 4G Wi-Fi Outdoor Camera

Secureye, one of the leading security and surveillance solutions providers in both commercial and residential space, has recently launched 4G Wi-Fi outdoor camera with advanced tech integrations for the common users. The model SIP-2HDG-W40 is equipped with the latest path breaking technologies to keep the homes safe and secure. It is equipped with motion detection alarm, APP remote monitoring, intelligent Wi-Fi configurations, 24/7 monitoring capabilities and huge storage space; thus, making it the go to product for any consumer looking to ensure their safety. The home security space has evolved so much over the years that every bit of tech integration upgrades the whole ecosystem by many notches. Manish Agarwal, Director, Secureye said, “Home security is a prime concern for everyone. The product offerings from Secureye are built keeping in mind the tech innovations in the industry so that we can outdo the products available in the market. Our offerings are not just good but are always ahead of its peers. We hope that the cost-effective home solutions will keep everyone smiling without the threat of an untoward incident.” The video surveillance market which is growing at 10.5% CAGR is already over Rs.5000 crore in India. Fueled by the infra growth in both commercial and residential space the market is going to see lots of tractions in the demand for surveillance equipment.  

Read More

Future Ready U

Forces Network, a professional network of the military veterans in the corporate, has conducted a full day seminar on the theme ‘Future Ready U’ at Pride Plaza, Aerocity, New Delhi on 25 August 2019. “Today’s world is changing at a rapid pace. It offers continuous challenges as well as opportunities. However, to grab the opportunities, it calls for agility, informed decision making and taking massive action. Now if you consider the transitioning of military veterans embarking on a second career it seems that they would have to do a fair amount of heavy lifting to thrive in such a world. It was with this as the backdrop, the theme of the seminar was chosen. It aimed to inform and educate the seminar participants about the upcoming future trends and also how to prepare for them” – Col Iqbal Singh (Retd) Founder of Forces Network The seminar had an impressive lineup of marquee speakers. Prabhjeet Singh, Director, Operations and Head of Cities, Uber India & South Asia spoke on the future of mobility in a riveting talk. Randeep Sekhon, CTO, Airtel – an ex-IAF officer spoke about the apparent permanence of telecom industry in the future lives. He further emphasized upon the importance of learning new skills like computational thinking, new media literacy, trans-disciplinary abilities, design mindset, social intelligence, agility, and learning and unlearning ability. Vinay Gupta, Head of Data Analytics, SGSL made an extremely engaging presentation on data science whereby it was completely demystified for a layman to understand it. He also covered the path to building one’s skills as a data scientist. In the last segment of the seminar, there was an interesting discussion about whether in the era of digitalization, cloudification and virtualization would remain the jobs of physical security officers, or the chief info security officer (CISO) would take over these roles. The seminar was attended by convincingly a large number of participants – closed to 250 – who expressed a great deal of satisfaction over the content and conduct of the seminar. Strikingly, the participants came from across the length and breadth of the country such as Shillong, J&K, Cochin, Hyderabad and Binaguri etc. The seminar ended with an hour-long mentoring session where selected industry experts mentored the mentees in small groups of 4-6 people on a round table. They encouraged the mentees to ask questions – all that they wanted to ask and didn’t know where and whom to ask. The mentees found this session extremely enlightening. The Forces Network is more than 11 years old and it has more than 4900 members spread across the globe. Forces Network is focused on helping military personnel transition smoothly in to a corporate career and in building the network of the military veterans in the corporate.  

Read More

IBM Study Shows Data Breach Costs on the Rise

Breaches Pose Growing Risk for Small Businesses, Costing up to 5% of Annual Revenue IBM Security has recently announced the results of its annual study examining the financial impact of data breaches on organizations. According to the report, the cost of a data breach has risen 12% over the past 5 years comparison of the average global cost of a data breach from the 2014 Cost of as Data Breach Report to the 2019 report, which now costs $3.92 million on average. These rising expenses are representative of the multi-year financial impact of breaches, increased regulation and the complex process of resolving criminal attacks. The financial consequences of a data breach can be particularly acute for small and midsize businesses. In the study, companies with less than 500 employees suffered losses of more than $2.5 million on average – a potentially crippling amount for small businesses, which typically earn $50 million or less in annual revenue. For the first time this year, the report also examined the longtail financial impact of a data breach, finding that the effects of a data breach are felt for years. While an average of 67% of data breach costs were realized within the first year after a breach, 22% accrued in the second year and another 11% accumulated more than two years after a breach. The longtail costs were higher in the second and third years for organizations in highly-regulated environments such as healthcare, financial services, energy and pharmaceuticals. “Cybercrime represents big money for cybercriminals, and unfortunately that equates to significant losses for businesses,” said Wendi Whitmore, Global Lead for IBM X-Force Incident Response and Intelligence Services, “With organizations facing the loss or theft of over 11.7 billion records in the past 3 years alone, companies need to be aware of the full financial impact that a data breach can have on their bottom line – and focus on how they can reduce these costs.” Some of the top findings from this year’s report include: Malicious breaches – Most common, most expensive: Over 50% of data breaches in the study resulted from malicious cyberattacks and cost companies $1 million more on average than those originating from accidental causes. ‘Mega breaches’ lead to mega losses: While less common, breaches of more than 1 million records cost companies a projected $42 million in losses; and those of 50 million records are projected to cost companies $388 million. Mega breach cost calculations are based on an analysis of 14 companies, applying a Monte-Carlo analytic approach to simulate results of greater statistical significance. Practice makes perfect: Companies with an incident response team that also extensively tested their incident response plan experienced $1.23 million less in data breach costs on average than those that had neither measure in place. U.S. breaches cost double: The average cost of a breach in the U.S. is $8.19 million, more than double the worldwide average. Healthcare breaches cost the most: For the 9th year in a row, healthcare organizations had the highest cost of a breach – nearly $6.5 million on average (over 60% more than other industries in the study). Malicious breaches pose a growing threat; accidental breaches still common The study found that data breaches which originated from a malicious cyberattack were not only the most common root cause of a breach, but also the most expensive. Malicious data breaches cost companies in the study $4.45 million on average – over $1 million more than those originating from accidental causes such as system glitch and human error. These breaches are a growing threat, as the percentage of malicious or criminal attacks as the root cause of data breaches in the report crept up from 42% to 51% over the past six years of the study (a 21% increase). That said, inadvertent breaches from human error and system glitches were still the cause for nearly half (49%) of the data breaches in the report, costing companies $3.50 and $3.24 million respectively. These breaches from human and machine error represent an opportunity for improvement, which can be addressed through security awareness training for staff, technology investments, and testing services to identify accidental breaches early on. One particular area of concern is the misconfiguration of cloud servers, which contributed to the exposure of 990 million records in 2018, representing 43% of all lost records for the year according to the IBM X-Force Threat Intelligence Index 2019. Breach response remains biggest cost saver For the past 14 years, the Ponemon Institute has examined factors that increase or reduce the cost of a breach and has found that the speed and efficiency at which a company responds to a breach has a significant impact on the overall cost. This year’s report found that the average lifecycle of a breach was 279 days with companies taking 206 days to first identify a breach after it occurs and an additional 73 days to contain the breach. However, companies in the study who were able to detect and contain a breach in less than 200 days spent $1.2 million less on the total cost of a breach. A focus on incident response can help reduce the time it takes companies to respond, and the study found that these measures also had a direct correlation with overall costs. Having an incident response team in place and extensive testing of incident response plans were two of the top three greatest cost saving factors examined in the study. Companies that had both of these measures in place had $1.23 million less total costs for a data breach on average than those that had neither measure in place ($3.51 million vs. $4.74 million). Additional factors impacting the cost of a breach for companies in the study included: Number of compromised records: Data breaches cost companies around $150 per record that was lost or stolen. Companies that fully deployed security automation technologies experienced around half the cost of a breach ($2.65 million average) compared to those that did not have these technologies deployed…

Read More

HCSA Program Empowers Security Professionals in Bangalore

The recent Hikvision Certified Security Associates (HCSA) program of the series conducted during 22-24 July 2019 in Bangalore also concluded at a successful note. In conformity of the set pattern, the three day comprehensive HCSA program included training sessions on optics basics, turbo HD analog solution, PTZ configuration, network basics, IP camera, NVR, fish eye camera, iVMS 4200 and smart functions and applications. The HCSA training program was conducted by.Vinit Narvekar, Senior Technical Support and Training, Prama Hikvision India Pvt. Ltd. The idea behind HCSA is to give hands-on training and demonstration as a part of the training program. As part of this certification program a dedicated online examination and practical tests were conducted after training sessions. “Hikvision has set the industry standard by offering professional video surveillance certification to validate video expertise under Hikvision Certified Security Associate (HCSA) program in India. This program is specially designed for the security professionals. Besides, Hikvision provides meaningful endorsement to those who succeed in the exams and become Hikvision certified security professionals,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. The HCSA certification program focuses on training participants in essential configurations, operations and maintenance of Hikvision video surveillance products and its features. It is designed for technical engineers who have worked in the security industry for some years and have already gained knowledge and experience about security basics. The certification program is open to anyone looking at to gain expertise in video surveillance and total security solution. The trainee should have at least one- year of work experience in the security industry and be familiar with security basics. The HCSA Bangalore got a good response from the young engineers and installers coming from nearby areas and towns like Mangalore and Mysore. The successful batch of the program participants will receive the HCSA certificates along with the enriching technology updates and training experience.  

Read More

Jio and Guavus Partner on AI-Powered Analytics

Jio, one of the world’s largest mobile data network service providers, and Guavus, a Thales company and the leader in AI-powered analytics for communications service providers, have recently announced a partnership centered on AI-driven analytics. Guavus’AI-based solutions will provide real-time customer experience analytics, predictive analytics to automate network troubleshooting and key marketing insights to Jio. As a result, Jio will be able to offer superior service to its customers while addressing critical service operations with intelligent automation. Jio is one of the world’s largest and fastest-growing data service operators with more than 300 million subscribers. The Indian service provider, which has disrupted the market with its affordable data plans and unlimited calling benefits, has created a completely digital experience for its users – ranging from data services on smartphones, to gigabit Internet at home, along with a portfolio of media offerings and IoT devices such as smart speakers and switches for the smart home. “Our networks generate 4 to 5 petabytes of data each day. If this data can be properly analyzed in real-time using big data analytics and predictive analytics techniques, we can both improve the health of our network through intelligent automation and offer multiple, customized personal services to our customers. Guavus’solutions enable us to do this – we can make data-driven decisions that allow us to deliver a great experience to our customers while bringing intelligent automation to our operations,” said Anish Shah, President of IT, Reliance Jio. “Guavus provides us data analytics technology and out-of-the-box analytics solutions for intelligent operations and marketing – but they’re not just fishing for us, they’re giving us the ability to fish. Our teams will be able to take advantage of a ‘self-service’ platform to build custom analytics applications that are tied very closely to their areas of the business and to deliver quality new products much faster,” said Kiran Thomas, President, Reliance Industries. Anukool Lakhina, Founder and President, Guavus said, “Guavus has been a pioneer working on AI-powered analytics solutions with service providers around the world. The rapid growth, range, and affordability of Jio’s service offerings and their innovative use of AI and analytics is transformative for their customers and India. We’re thrilled to be partnering with Jio to provide the AI and analytics foundation for the digital services revolution in India.”  

Read More

ACTIONABLE VIDEO INTELLIGENCE

Traditional CCTV systems use a set of cameras and a local network to connect these cameras to a video management software. The video management system typically runs on a network video recorder (NVR) or a digital video recorder (DVR). The fundamental difference between the two – NVR records IP cameras while DVR records analog cameras connected via coaxial cables, hence a DVR system would not require a network but connect cameras to the DVR as point to point connections. In traditional CCTV system, monitoring is done by using a central monitoring system where human beings would watch multiple screens to make security-based decisions and take appropriate actions. With the technology advancement to IP, most of the earlier DVR systems have been replaced by NVR systems. This is because the IP cameras can be controlled remotely, and more importantly, they produce a digital video stream. The video stream could be in a raw or compressed form to save bandwidth as well asstorage space. Both network bandwidth and storage space are of premium significance and hence they need to be optimized for cost considerations. Analog video streams cannot be processed by software unless they are converted into a digital stream, and in the conversion process from analog to digital video, detail, color and resolution are lost from the original analog video stream. Many deployments use this technique to process video because it is cheaper than replacing the existing system with an IP system. This is a trade-off between cost and losing key video data that could have been otherwise processed accurately to build a superior video surveillance system. Any green field project should implement an IP system as the flexibility, long term costs and future scalability of the system are at stake. For the corporate business and high security installations such as nuclear power stations, hydro-electric power generators, airports, highway monitoring systems etc., an NVR based system is no longer an option because of its limited ability to scale. If the software processing engine is a server-based system then the scaling of the surveillance system is easily solved. A server gives one the option of building a custom solution based on the project requirements by including other surveillance and security software and hardware components besides cameras. These can be integrated into the VMS easily to build a comprehensive surveillance and security system. The other security components are access control systems, radar, signage, facial recognition, fire alarms etc. By now one must realize that an NVR based surveillance system is incapable of providing all the features to build a comprehensive surveillance and security system. Software components that make a comprehensive Actionable Video Intelligence System The following diagram illustrates the various security and surveillance components that are built around a central VMS software that runs on the main server. The key points to note are as follows: A central VMS component. A VMS that runs on a separate client-server. A VMS client software that runs on a separate client workstation. The above three components are well integrated with each other. An optional video analytics module that is tightly coupled with the main VMS, which analyzes each video frame from a camera and executes programmed video analytics. This constitutes the basis of actionable video intelligence (AVI). The ability to integrate other security software components into the main VMS software core. This is accomplished using application programming interfaces (API) and a software development kit (SDK). Popular video analytics algorithms Following is a capture of some popular video analytics algorithms: Motion detection Seamless integration of motion detection results available from cameras. Motion detection processing from application. Independent motion detection settings for every camera. ‘Motion detected’ and ‘No motion’ alarms to indicate start of motion and end of motion. Advanced motion detection algorithm with high accuracy and low resource utilization. ● Record on motion. Motion detection meta-data overlay on videos with configuration for overlay level – no overlay, only motion indicator, motion grids, full overlay. Option to exclude motion detection alarms from alarms database entries. Video analytics Video analytics on IR cameras and thermal cameras. Support for video analytics on PTZ cameras, while the camera is in ‘home’ position. Video analytics is automatically disabled when camera moves from the home position and video analytics is automatically started when camera is moved back to home position. Seamless integration of video analytics module as video analytics is not a separate software application. No manual synchronization and maintenance is needed. Dedicated video analytics screen to display analyzed videos from multiple cameras, with analytics meta-data overlay.Quick access to video analytics settings for each camera. Independent video analytics settings for every camera. Easy to manage, tightly integrated simple user interface. Enhanced algorithms which need only few parameters to be configured to get good results from video analytics in most of the deployment situations. Advanced parameters are available to handle special situations. Local or remote processing of video analytics. Availability of wide range of standard analytics features. Intrusion detection Wrong direction movement detection. Line crossing/ trip-wire. Camera tamper/ scene change detection. Crowd detection Un-attended object detection. Queue length detection. Asset protection. Loitering detection. Tailgating detection. Object stopped detection. People counting, Vehicles counting. Object trace/ travel path. Object speed calculation. Digital auto-tracking. Vibration removal. Flexible architecture to quickly support customized video analytics features. Option of project specific combined analytics on data generated by multiple external devices and video streams. Option to use 3rd party video analytics libraries using their SDKs. VMS integration techniques There are several challenges when it comes to integrating several diverse security components with one another such as integrating several diverse software stacks e.g., ALPR, FR, PIDS (including radar/ thermal cameras), ACS, IVAS, VMS, and others. VMS integration needs following points to take into consideration such as: Assess integration cost Integration is an expensive and time-consuming process. Establish performance and functionality metrics for all vendors. Establish due diligence process to assess impact to first deployment. Ensure seamless integration of all security components The integrated system should work seamlessly. No change to…

Read More