securitylinkindia

HCSA Program Empowers Security Professionals in Bangalore

The recent Hikvision Certified Security Associates (HCSA) program of the series conducted during 22-24 July 2019 in Bangalore also concluded at a successful note. In conformity of the set pattern, the three day comprehensive HCSA program included training sessions on optics basics, turbo HD analog solution, PTZ configuration, network basics, IP camera, NVR, fish eye camera, iVMS 4200 and smart functions and applications. The HCSA training program was conducted by.Vinit Narvekar, Senior Technical Support and Training, Prama Hikvision India Pvt. Ltd. The idea behind HCSA is to give hands-on training and demonstration as a part of the training program. As part of this certification program a dedicated online examination and practical tests were conducted after training sessions. “Hikvision has set the industry standard by offering professional video surveillance certification to validate video expertise under Hikvision Certified Security Associate (HCSA) program in India. This program is specially designed for the security professionals. Besides, Hikvision provides meaningful endorsement to those who succeed in the exams and become Hikvision certified security professionals,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. The HCSA certification program focuses on training participants in essential configurations, operations and maintenance of Hikvision video surveillance products and its features. It is designed for technical engineers who have worked in the security industry for some years and have already gained knowledge and experience about security basics. The certification program is open to anyone looking at to gain expertise in video surveillance and total security solution. The trainee should have at least one- year of work experience in the security industry and be familiar with security basics. The HCSA Bangalore got a good response from the young engineers and installers coming from nearby areas and towns like Mangalore and Mysore. The successful batch of the program participants will receive the HCSA certificates along with the enriching technology updates and training experience.  

Read More

Jio and Guavus Partner on AI-Powered Analytics

Jio, one of the world’s largest mobile data network service providers, and Guavus, a Thales company and the leader in AI-powered analytics for communications service providers, have recently announced a partnership centered on AI-driven analytics. Guavus’AI-based solutions will provide real-time customer experience analytics, predictive analytics to automate network troubleshooting and key marketing insights to Jio. As a result, Jio will be able to offer superior service to its customers while addressing critical service operations with intelligent automation. Jio is one of the world’s largest and fastest-growing data service operators with more than 300 million subscribers. The Indian service provider, which has disrupted the market with its affordable data plans and unlimited calling benefits, has created a completely digital experience for its users – ranging from data services on smartphones, to gigabit Internet at home, along with a portfolio of media offerings and IoT devices such as smart speakers and switches for the smart home. “Our networks generate 4 to 5 petabytes of data each day. If this data can be properly analyzed in real-time using big data analytics and predictive analytics techniques, we can both improve the health of our network through intelligent automation and offer multiple, customized personal services to our customers. Guavus’solutions enable us to do this – we can make data-driven decisions that allow us to deliver a great experience to our customers while bringing intelligent automation to our operations,” said Anish Shah, President of IT, Reliance Jio. “Guavus provides us data analytics technology and out-of-the-box analytics solutions for intelligent operations and marketing – but they’re not just fishing for us, they’re giving us the ability to fish. Our teams will be able to take advantage of a ‘self-service’ platform to build custom analytics applications that are tied very closely to their areas of the business and to deliver quality new products much faster,” said Kiran Thomas, President, Reliance Industries. Anukool Lakhina, Founder and President, Guavus said, “Guavus has been a pioneer working on AI-powered analytics solutions with service providers around the world. The rapid growth, range, and affordability of Jio’s service offerings and their innovative use of AI and analytics is transformative for their customers and India. We’re thrilled to be partnering with Jio to provide the AI and analytics foundation for the digital services revolution in India.”  

Read More

ACTIONABLE VIDEO INTELLIGENCE

Traditional CCTV systems use a set of cameras and a local network to connect these cameras to a video management software. The video management system typically runs on a network video recorder (NVR) or a digital video recorder (DVR). The fundamental difference between the two – NVR records IP cameras while DVR records analog cameras connected via coaxial cables, hence a DVR system would not require a network but connect cameras to the DVR as point to point connections. In traditional CCTV system, monitoring is done by using a central monitoring system where human beings would watch multiple screens to make security-based decisions and take appropriate actions. With the technology advancement to IP, most of the earlier DVR systems have been replaced by NVR systems. This is because the IP cameras can be controlled remotely, and more importantly, they produce a digital video stream. The video stream could be in a raw or compressed form to save bandwidth as well asstorage space. Both network bandwidth and storage space are of premium significance and hence they need to be optimized for cost considerations. Analog video streams cannot be processed by software unless they are converted into a digital stream, and in the conversion process from analog to digital video, detail, color and resolution are lost from the original analog video stream. Many deployments use this technique to process video because it is cheaper than replacing the existing system with an IP system. This is a trade-off between cost and losing key video data that could have been otherwise processed accurately to build a superior video surveillance system. Any green field project should implement an IP system as the flexibility, long term costs and future scalability of the system are at stake. For the corporate business and high security installations such as nuclear power stations, hydro-electric power generators, airports, highway monitoring systems etc., an NVR based system is no longer an option because of its limited ability to scale. If the software processing engine is a server-based system then the scaling of the surveillance system is easily solved. A server gives one the option of building a custom solution based on the project requirements by including other surveillance and security software and hardware components besides cameras. These can be integrated into the VMS easily to build a comprehensive surveillance and security system. The other security components are access control systems, radar, signage, facial recognition, fire alarms etc. By now one must realize that an NVR based surveillance system is incapable of providing all the features to build a comprehensive surveillance and security system. Software components that make a comprehensive Actionable Video Intelligence System The following diagram illustrates the various security and surveillance components that are built around a central VMS software that runs on the main server. The key points to note are as follows: A central VMS component. A VMS that runs on a separate client-server. A VMS client software that runs on a separate client workstation. The above three components are well integrated with each other. An optional video analytics module that is tightly coupled with the main VMS, which analyzes each video frame from a camera and executes programmed video analytics. This constitutes the basis of actionable video intelligence (AVI). The ability to integrate other security software components into the main VMS software core. This is accomplished using application programming interfaces (API) and a software development kit (SDK). Popular video analytics algorithms Following is a capture of some popular video analytics algorithms: Motion detection Seamless integration of motion detection results available from cameras. Motion detection processing from application. Independent motion detection settings for every camera. ‘Motion detected’ and ‘No motion’ alarms to indicate start of motion and end of motion. Advanced motion detection algorithm with high accuracy and low resource utilization. ● Record on motion. Motion detection meta-data overlay on videos with configuration for overlay level – no overlay, only motion indicator, motion grids, full overlay. Option to exclude motion detection alarms from alarms database entries. Video analytics Video analytics on IR cameras and thermal cameras. Support for video analytics on PTZ cameras, while the camera is in ‘home’ position. Video analytics is automatically disabled when camera moves from the home position and video analytics is automatically started when camera is moved back to home position. Seamless integration of video analytics module as video analytics is not a separate software application. No manual synchronization and maintenance is needed. Dedicated video analytics screen to display analyzed videos from multiple cameras, with analytics meta-data overlay.Quick access to video analytics settings for each camera. Independent video analytics settings for every camera. Easy to manage, tightly integrated simple user interface. Enhanced algorithms which need only few parameters to be configured to get good results from video analytics in most of the deployment situations. Advanced parameters are available to handle special situations. Local or remote processing of video analytics. Availability of wide range of standard analytics features. Intrusion detection Wrong direction movement detection. Line crossing/ trip-wire. Camera tamper/ scene change detection. Crowd detection Un-attended object detection. Queue length detection. Asset protection. Loitering detection. Tailgating detection. Object stopped detection. People counting, Vehicles counting. Object trace/ travel path. Object speed calculation. Digital auto-tracking. Vibration removal. Flexible architecture to quickly support customized video analytics features. Option of project specific combined analytics on data generated by multiple external devices and video streams. Option to use 3rd party video analytics libraries using their SDKs. VMS integration techniques There are several challenges when it comes to integrating several diverse security components with one another such as integrating several diverse software stacks e.g., ALPR, FR, PIDS (including radar/ thermal cameras), ACS, IVAS, VMS, and others. VMS integration needs following points to take into consideration such as: Assess integration cost Integration is an expensive and time-consuming process. Establish performance and functionality metrics for all vendors. Establish due diligence process to assess impact to first deployment. Ensure seamless integration of all security components The integrated system should work seamlessly. No change to…

Read More

Securing ATMs 24/7 with Intelligent Security Technology

ATMs have become a cornerstone for the day-to-day life of millions, but they are vulnerable to attacks. The global ATM Industry Association has reported a 12% increase in ATM crimes during 2017. Attacks often involve ATM users, potentially injuring them, and thereby causing them trauma. Since ATMs are mostly situated outside buildings and are made for use at all times of day and night, securing them is a challenge – and therefore banks are turning to more intelligent solutions. An outdoor vulnerability According to ATM Industry Association (ATMIA), there is an estimation of about 3.5 million ATMs in the world serving those in need of cash 24/7, 365 days a year. This, coupled with the fact that they hold hard cash, makes them an attractive target. Criminals target these machines, or more precisely, the people using them in numerous ways. They distract customers at ATMs in an attempt to take their cards or cash, or to steal their PINs for later use. At cases, they also install false card readers that sneak customer’s card details for reuse. On the other side of the story, banks need to deal with customers’ disputes. In the situation of a very small percentage of ATM transactions, customers question whether the transaction has been carried out as requested – or even dispute at all in real time for any error while making the withdrawal. Thus, security precautions for ATMs are an important part of an overall security solution for financial institutions. When deep learning technology steps in Inside an ATM machine, two covert cameras are installed – one trained on the user and the other on the ATM panel. Deep learning technology embedded in the ATM security system can detect any ‘abnormalities’ in the facial scenes in front of it, referring to the existing data patterns. So, if there is another face in the picture (for example someone looking over a user’s shoulder, or if the person wearing a mask), an alarm can be triggered in the security center. By using the same technology, the security system can also flag if the number pad is covered with a strip to steal PIN codes, or if a false card reader (or ‘skimmer’) is present to steal card details. All of these ‘smart’ alarms streamline the security monitoring processes, meaning that security personnel can react to real-time scenarios and would not waste time on false alarms. The footage can also provide evidence for any investigation. Hikvision solution Hikvision DeepinMind NVR – a robust deep learning ‘engine’ – takes information from the camera and analyses it using deep learning algorithms. This also ‘manages’ footage in conjunction with other NVRs and a video management system, providing a powerful tool set for security and business intelligence. Securing assets and mitigating risks through security solution is a lot easier with deep learning technology. Even ATMs outside a building can be safer, avoiding fraud and protecting customers every day.  

Read More

Minimizing Downtime in Critical Environments

At worst, unplanned downtime in a critical environment can cause a catastrophic event that negatively impacts public safety and/ or the environment on a mass scale. At best, it could mean production losses costing thousands, or even millions, of dollars. A predictive maintenance strategy that incorporates Axis technology can help companies minimize costly downtime and improve their bottom lines. At worst, unplanned downtime in a critical environment can cause a catastrophic event that negatively impacts public safety and/ or the environment on a mass scale. At best, it could mean production losses costing thousands, or even millions, of dollars. A predictive maintenance strategy that incorporates Axis technology can help companies minimize costly downtime and improve their bottom lines. Considering the stakes, it’s no wonder that companies are transitioning from a reactive to a preventive and even predictive maintenance strategy. But many of these companies are still relying on an ‘old-school’ route-based approach – sending technicians out at scheduled intervals to physically assess and record critical asset findings. For a typical commercial petroleum company with over 20,000 well sites, this represents a significant cost. And inevitably, critical assets will either be over-maintained or under-maintained as they rarely break-down on schedule. When the cost of oil is low every barrel counts. But operational efficiency is key to a healthy bottom line. That’s why progressive companies are adopting a predictive maintenance strategy that includes distributed online monitoring. With advancements in automation, wireless technology, SCADA systems and solar powered hardened devices, remote data collection from permanent sensors provides much better insight on the status of critical assets and helps keep operations flowing smoothly. Let’s look at how Axis technology is ‘fueling’ this trend Thermal imaging for better flare stack monitoring The controlled combustion of excess gases in the chemical and petrochemical industry is essential to eliminate pressure on critical assets. Should the flame go out, it poses a serious health and safety risk for workers – and carries a hefty fine from environmental authorities. Axis thermal cameras provide better flare stack monitoring, ensuring a stable thermal profile and proactively sending an alarm to operators if the flame decreases. Explosion protected cameras improve health & safety In hazardous environments, preventing injuries and fatalities is paramount – both for the safety and well-being of workers, as well as the associated downtime cost. Certified for explosion-prone applications according to all applicable international standards, Axis explosion-protected cameras allow HSE site engineers to monitor areas where accidents typically occur – such as the working of tubulars on drilling rigs. Additionally, their temperature alarm camera monitors for temperature deviations and leaks in critical assets – to prevent an incident before it occurs. A new and attractively priced alternative to traditional steel housings, the AXIS F101-A XF P1367 is specifically designed for hazardous environments. Its lightweight aluminum housing is Class I/II/III, Division 1, Zone 1, ATEX and IECEx certified, it’s easy to configure remotely, and it delivers clear images in challenging light conditions. The red color also helps workers locate it to signal operators in emergency situations. Real-time condition-based monitoring With the advancement of video imaging and processing power, network cameras are a valuable redundancy in condition-based monitoring systems – providing visual confirmation of sensor alerts and full situational awareness in an emergency. Edge-based video analytics enable the cameras themselves to serve as a primary sensor for HSE engineers  to detect e.g., occupancy levels on a drilling rig, PPE compliance, or obstructed evacuation routes. Better communication with network speakers With Axis network speakers, it’s easy to communicate both live and alert-based pre-recorded messages to workers in remote locations – to warn of a safety risk or instruct them to take action on a sensor alarm. With the introduction of Power-over-Ethernet (PoE) speakers, oil and gas companies also save on the maintenance and implementation cost of PA systems. What’s more, the system can scale without having to upgrade proprietary, bulky amplifier racks, and the integration of Axis speakers and cameras is a simple one-click configuration process. Connected technology Axis network I/O relay modules extend the functionality of any Axis device and integrate with other facility systems such as fire alarm, HVAC and BMS. This technology is particularly useful in extending the I/O signals from any field-based temperature sensor to the central SCADA system to trigger, for example, strobe lighting, loudspeaker messaging and camera recordings in an emergency. Reliable intrusion protection Any unauthorized physical intrusion can have a major impact on critical assets and cause downtime. With an Axis intrusion protection solution, one can safeguard the whole site – from perimeter to critical core. A combination of thermal, radar and PTZ technology detects, identifies and tracks intruders. Access control limits free movement in critical or hazardous areas, and audio capabilities with alarm-based pre-recorded messages deter any unauthorized entry. Getting more from your technology It all comes back to operational efficiency contributing to a healthy bottom line. A complete system of Axis video, intelligent analytics, access control and audio address all key aspects of critical infrastructure protection – intrusion, operational efficiency and health and safety – all of which present risks to unplanned downtime. By incorporating Axis solutions in the condition-based monitoring strategy, the user can more easily detect incidents before they happen and keep production up and running.  

Read More

The Top Five Factors Driving Access Control Market Growth

It’s safe to say that both the perception and reality of growth in the access control market have certainly changed over the last few years. What was once known for its slow and conservative trajectory has now transformed into an industry that is seeing fast-paced development, with the latest forecasts predicting the global market will grow at a CAGR of 13.2% from 2018 to 2025, reaching a value of $16.66 billion by the end of that timeframe. As is common in any segment of the security industry, this growth can be attributed to a number of factors, with each one playing an important role in the overall evolution of the market. Here we take a look at the top five: Increasing threats Soft targets around the world such as educational facilities, venues, shopping centers, transportation hubs and more, are continuing to face the challenge of staying prepared for the increasing significance and frequency of threats. One of the first methods of protection that often comes to mind for these facilities is securing the perimeter of the building or campus, leading to an increase in the use of access control solutions that enhance safety and allow for swift lockdowns with the push of a button. Advanced technology The emergence of the cloud and Internet of Things (IoT) have positively impacted the entire security industry as a whole, and this undoubtedly includes the access control market. These intelligent technologies have opened up new possibilities for the traditional access control systems of the past such as remote monitoring, less cumbersome installments and central reporting/ management. Additionally, technology such as mobile credentials and biometrics offer exciting and innovative options for access control solutions, propelling market growth through interest in the convenience of these features. ACaaS One of the key benefits the cloud creates for the access control market is the access control-as-a-service (ACaaS) model, which we’re seeing a high adoption of – particularly in small to medium sized businesses (SMBs) – and is therefore facilitating market expansion. SMBs are taking advantage of the ability to turn over system management to an integrator, benefiting from cost savings, continued support and scalability. Integrations Open-platform technology has given rise to the seamless integration of access control systems with other solutions, encouraging market growth by allowing organizations to obtain added functionality from their technology investments. Enterprises can seamlessly converge their access control with surveillance cameras, video management systems (VMS), intrusion platforms and more, enabling them to invest in a solution that can address multiple needs. Added functionality Though access control is primarily used for security purposes, as these systems become more intelligent and capable of engaging with other operations outside of safety, their value increases and therefore leads to market growth. For example, an access control system can integrate with a building management system to lock/ unlock doors for an event, turn on/ off lights or control temperature. Over the next few years, as technology advances further and becomes smarter, we can expect to see these trends continue to push the access control market forward. It’s encouraging to see how far its come and we look forward to embracing new possibilities in an effort to help organizations keep people, assets and property safe.  

Read More

The MOBOTIX Partner Society Conquering New Markets Together

The leading manufacturer of intelligent IP video systems ‘Made in Germany’ is significantly expanding its existing successful partner program with the MOBOTIX Partner Society. Its goal is to develop secure complete solutions based on joint innovations with MOBOTIX partners that expand the MOBOTIX portfolio and open up new markets. With the combined expertise of two or more companies that know what the market needs through working with their customers, MOBOTIX is also able to solve special challenges and close market gaps. As a new platform, the MOBOTIX Partner Society bundles the entire spectrum of individual application solutions and makes them accessible to a wide market. “Thanks to the Partner Society, we are able to offer a unique platform that makes the search for intelligent components that have individual requirements much easier. The new platform creates new connections, generates synergies, and opens up new markets,” explained Thomas Lausten, CEO of MOBOTIX AG. Successful partnerships have long been a core element of MOBOTIX’s DNA. It’s already very successful global partner program is being expanded with the Partner Society, which offers numerous advantages for MOBOTIX, all partner companies, and above all, MOBOTIX customers worldwide. “Our products and solutions very often result in individual solutions for customers that can also be of great interest to other companies, thanks to the expertise and competence of our partners. By means of the Partner Society, we offer a platform through which our partners can distribute these innovations worldwide,” said Hartmut Sprave, CTO of MOBOTIX AG. Technology and solution partners: Integration and innovation with MOBOTIX Two Partner Society programs – technology partners and solution partners – have been created thus far. Technology partners are innovative manufacturers of complementary products who have integrated MOBOTIX in their own products. By cooperating with technology partners, MOBOTIX supports the market and cooperates exclusively with organizations that are leaders in their field. Quality standards that offer the best solutions together with MOBOTIX premium camera technology are therefore put in place. Solution partners are existing MOBOTIX channel partners who have already developed their own intelligent application solutions based on MOBOTIX technology. Demand for individual solutions is incredibly high. To this end, each solution partner has developed special solutions with enormous added value. MOBOTIX offers these companies marketing across the world via the new platform. “The Partner Society is another important step for MOBOTIX in its transformation process from a premium product manufacturer to a full-service provider of cyber secure solutions based on our strong German DNA,” explained CEO Lausten. After the initial successes of the MOBOTIX Partner Society on various markets, he is very confident that this new form of cooperation will be a ground-breaking success story.  

Read More

Business Losses to Cybercrime Data Breaches to Exceed $5 Trillion by 2024

A new report from Juniper Research found that the cost of data breaches will rise from $3 trillion each year to over $5 trillion in 2024, an average annual growth of 11%. This will primarily be driven by increasing fines for data breaches as regulation tightens, as well as a greater proportion of business lost as enterprises become more dependent on the digital realm. The new research, the Future of Cybercrime & Security: Threat Analysis, Impact Assessment & Mitigation Strategies 2019-2024 noted that while the cost per breach will steadily rise in the future, the levels of data disclosed will make headlines but not impact breach costs directly, as most fines and lost business are not directly related to breach sizes. The human element remains key, despite AI advances Cybercrime is increasingly sophisticated; the report anticipates that cybercriminals will use AI which will learn the behaviour of security systems in a similar way to how cybersecurity firms currently employ the technology to detect abnormal behaviour. The research also highlights that the evolution of deep fakes and other AI-based techniques is also likely to play a part in social media cybercrime in the future. In spite of cybersecurity becoming increasingly part of corporate culture, it is not necessarily gaining traction with system users. As a result, Juniper Research expects that security awareness training will become an increasingly important part of enterprise cybersecurity practice. The gains that can be made by increasing human awareness of cybersecurity can make more efficient use of cybersecurity spending, which Juniper Research expects to rise by only 8% per annum in the forecast period. “All businesses need to be aware of the holistic nature of cybercrime, and in turn, act holistically in their mitigation attempts,” remarked Research Author Susan Morrow, “As social engineering continues unabated, the use of human-centric security tactics needs to take hold in enterprise security.” “All businesses need to be aware of the holistic nature of cybercrime, and in turn, act holistically in their mitigation attempts,” remarked Research Author Susan Morrow, “As social engineering continues unabated, the use of human-centric security tactics needs to take hold in enterprise security.”  

Read More

XProtect Corporate Obtains GDPR-ready Certification

Milestone XProtect Corporate 2019 R2 is one of the first major video management software products to obtain a GDPR-ready certification covering all core VMS functions from EuroPriSe. XProtect Corporate 2019 R2 video management software obtains the highly sought-after EuroPriSe (European Privacy Seal) GDPR-ready certification. With the GDPR-ready certification from the independent and recognized institute EuroPriSe, end-users can be confident that they have the right foundation to build a GDPR compliant video surveillance installation. The certification covers all core capabilities of Milestone XProtect Corporate, building on the native XProtect cyber security features. To help system integrators and end-users design, implement and operate GDPR-compliant video management installations, Milestone Systems provides a holistic set of tools including an extensive GDPR privacy guide with ready-to-use templates, as well as privacy awareness training for end-users. “While GDPR is an EU-centric regulation, data privacy is a concern in many parts of the world where we see similar regulations coming into force. GDPR is on par with, or in many cases tougher than these domestic regulations, so the EuroPriSe GDPR-ready certification is of great importance to us. System integrators and end-users can rest assured that they have the right foundation on which to build GDPR-compliant solutions,” says Chief Technology Officer Bjørn Skou Eilertsen, Milestone Systems, “With the continuous technology evolution, video management products have become very powerful, which calls for a responsible use by end-customers. In 2017, Milestone Systems leaders joined more than 150 representatives from tech companies around the world in signing the Copenhagen Letter, a declaration that calls on tech companies to use technology in a responsible, human-centered way. Enabling our customers to protect personal data captured and processed by XProtect VMS systems is a natural extension of this commitment.” The GDPR-ready certification covers Milestone Systems’ top range product XProtect Corporate. The ambition is to certify the entire XProtect VMS product range, to allow all sizes of installations to build their video management installations on a proven GDPR-ready base. Seamless access to test licenses, audio improvements, and increased cyber security Other updates in the new XProtect 2019 R2 release include a simplified process of working with and getting test licenses, as they can now be obtained directly from the Milestone customer dashboard, allowing partners to evaluate, test, and demo XProtect for one year without having to purchase the software upfront. The 2019 R2 release also extends the capability of the existing audio support in the XProtect Web Client by adding support for broadcasting announcements to multiple camera-connected speakers at once, allowing personnel to use the XProtect Web Client to do mass communication when they want to warn a crowd or do promotional announcements. Also, the 2019 R2 release includes enhancements to XProtect Mobile by adding audio support to the innovative video push functionality. With the addition of supporting audio, this completes the solution and allows users to create even stronger documentation of incidents, even as they happen. With the 2019 R2 release, it is possible to manage device passwords per device or per group of devices, directly from the XProtect Management Client. This provides an easier and faster way of securing the device security system and addressing potential vulnerabilities. Milestone Systems is taking yet another step forward in ensuring the best possible end-to-end security of XProtect by removing the ability to generate self-signed certificates in the XProtect mobile server and eliminating the option to use self-signed certificates in the XProtect mobile client. This means that users can rest assured that XProtect mobile complies with the highest security standard in the industry, with support for CA-signed certificates only.  

Read More

BCDVideo Makes to CRN’s 2019 Fast Growth 150 List For Second Straight Year

BCDVideo, the global security industry provider of purpose-built video surveillance recording appliances and infrastructure, has been named to CRN’s 2019 Fast Growth list for the second consecutive year. CRN, a brand of the channel company, bestows this recognition to the top 150 fastest-growing technology solutions providers in North America. BCDVideo, which has experienced an average two-year growth rate of 49.2 percent, currently has more than 95,000 systems recording video in 75 countries and throughout all verticals. Earlier this year, BCDVideo also was named to CRN’s 2019 Solutions Provider 500 list, which is regarded as the industry standard for recognizing the highest-performing technology companies and strategic solution providers. A technology provider since 1999, BCDVideo has always delivered high-availability solutions with a purpose. Now a 10-year veteran in the surveillance market, BCDVideo is generally considered the industry leader in purpose-built video surveillance recording systems and continues to be the only video surveillance system manufacturer in the world that guarantees its calculations, bandwidth capabilities, and performance, removing the mitigation of risk away from the security integrators.  

Read More