securitylinkindia

Matrix Enhances Financial Services of IndiaNivesh

IndiaNivesh is one of the leading financial service conglomerates in India which is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric and progressive financial group in the country with pan India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Business challenge IndiaNivesh required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. It has been a tedious task for them to streamline and manage attendance data of all employees accurately and perform calculation of error-free salary. Integrating their existing payroll software with the time-attendance software was challenging. Offered solution Matrix offered COSEC Time-Attendance solution with web based architecture, that can help IndiaNivesh in connecting all its regional and branch offices to their head office in Mumbai. Matrix COSEC time-attendance software can get easily integrated with existing payroll software, and hence it can also help the company in automatic salary calculation. Result Real-time attendance of all employees at a centralized location. Integration with its existing payroll software. Ease of implementation using the existing infrastructure. Fraudulent time-keeping is completely eliminated. Accurate in/ out time of each employee. Live monitoring of in/ out timing. Generation of time-attendance and access control reports and charts for all branches. Improved overall productivity of the organization. Continuous operations with excellent service support. Products COSEC Door FOP: Optical fingerprint based door controller for access control and time-attendance. COSEC Door CAS: Card based door controller for access control and time-attendance. COSEC Panel: Site controller to manage multiple door controllers and advanced access control features. COSEC LE Platform: Application server platform for 1000 Users and expandable up to one million users. COSEC LE TAM: Comprehensive time-attendance and leave management module for COSEC LE platform. COSEC LE ACM: Comprehensive access control module for COSEC LE platform.  

Read More

NEC Technologies Advanced Surveillance & Traffic Management System in Gurugram and Manesar

NEC Technologies India (NECTI), a leading player in the integration of IT and network technologies, has been awarded a contract as the master system integrator for installing CCTV surveillance and traffic management systems in Gurugram City. Under the project, selected locations in Gurugram will be fitted with a variety of CCTV cameras to perform traffic enforcement and general surveillance across 115 sectors of Gurugram and Manesar. The project was awarded in March 2019 and is expected to be implemented within this year. To support the implementation of a comprehensively integrated video surveillance system, NECTI will set up IP-based outdoor security cameras across various identified locations in the city. The video surveillance system from NEC will help in enforcing traffic discipline through the use of AI-based analytics software such as automatic number plate recognition (ANPR) and red light violation detection (RLVD). The system will monitor traffic junctions and other sensitive areas to identify traffic offenders and issue alarms. Subsequent e-challans (electronic fines) can be issued to offenders who are captured flouting traffic rules with the help of these systems. In the first phase of the project, approximately 1,200 high definition (HD) and ultra high definition (UHD) cameras are expected to be deployed in over 200 traffic junctions, sending video feeds to monitoring centers 24 hours a day. The project will utilize the dedicated optical fiber backbone currently being laid out by the Gurugram Metropolitan Development Authority (GMDA) using robust ring network topology. Cameras deployed in key selected locations will be equipped with facial recognition technology featuring NeoFace Watch, NEC’s flagship facial recognition software platform, to identify persons of interest and other suspicious elements to support law enforcement efforts. Commenting on the occasion, Takayuki Inaba, Managing Director, NEC Technologies India said, “Gurugram, one of Delhi’s major satellite cities, is host to many leading brands and representatives from across the world, and is widely acknowledged as a finance and technology hub. We are honored to be awarded this project and contribute to Gurugram’s smart city ambitions. NEC aims to leverage our global expertise while bringing cutting edge technologies and established best-practices to Gurugram as a master system integrator. We are looking forward to working closely with the Gurugram Municipal Development Authority to create a better society and a safer environment for its residents.” The Gurugram Municipal Development Authority added, “The current population of Gurugram is estimated to be close to 2.5 million and is expected to grow rapidly over the next few years. We need to constantly aim and strive to work towards enhancing public welfare, and NEC’s leading position in the field of public safety is paramount behind our decision to work with them. We are hopeful that the successful implementation of this project will propel Gurugram into an attractive city to live, work and visit.” NEC brings more than 100 years of expertise in technological innovation to provide solutions for empowering people, businesses and society. Headquartered in Japan, NEC started operations in India in the 1950s, accelerating its growth through the expansion of business to global markets. NEC in India expanded its business from telecommunications to public safety, logistics, transportation, retail, finance, unified communication and IT platforms, serving across governments, businesses as well as individuals. With its Centre of Excellence for analytics platform solutions, big data, biometrics, mobile and retail, NEC in India offers innovative new services and solutions for India and global markets.

Read More

CP PLUS Secures Kumbh Mela 2019

Kumbh Mela – one of world’s largest spiritual gatherings and a mass Hindu pilgrimage of faith – is a highly revered religious event where Hindus gather to bathe in a holy river. The spectacular fair displays uniqueness of the Hindu tradition, culture and historical significance. There are four normal Kumbh Melas, which are held periodically in every three years at Allahabad (Prayagraj), Haridwar, Nashik, and Ujjain. At any given place, the Kumbh Mela is held every 12 years.   The recently held event at Prayagraj is Ardh Kumbh Mela which is held every six years at Hardwar and Prayagraj. The Allhabad Ardh Kumbh Mela, held from 15 January to 4 March 2019, is claimed to be one of the most successfully organised mega event of this calibre – especially in terms of safety and security. A massive 39 sq. km of land area was turned into a temporary city, constructed by nearly 20,000 workers, to provide shelter to millions of pilgrims, sages and ascetics. The whole area had an arrangement of 1 lakh makeshift urinals, and 40,000 LED lights were installed to brighten the ceremony.  Challenges Managing and ensuring safety and security of people in lakhs was not an easy task. Safe movement of pilgrims, monitoring of crowd and dispersals through gates at such a large scale were some key challenges, and hence the concerned authorities planned to implement several security measures considering factors like the expanse of area, number of people, vulnerable spots and methods of security arrangement. There were arrangements of four Police Lines with 40 Police Thanas, three Mahila Thanas, and 62 Police outposts. The authority also employed Jal Police with 3 units along the river stretch, and one Mounted Police Line to ensure seamless pilgrim movement by the river front and in other crucial religious spots. Monitoring that massive crowd in millions to prevent stampede and like disasters also required cutting edge security solutions such as integrated CCTV surveillance system (ICCC). Solution by CP PLUS Collaborating with the UP Police, CP PLUS installed a total of 1,135 CCTV cameras covering 268 vulnerable locations of the expansive 39 sq. kms of area. An Integrated Command and Control Centre (ICCC) was set up, which included 2 sub-command and control centres with 4 video monitoring cells and 20 video wall cubes, well-connected to installed CCTV cameras. The integrated ICCC surveillance solution by CP PLUS helped in the monitoring of crowd activities and provided round the clock surveillance of the entire expanse, preventing any unfortunate occurrences. The ICCC unit was manned by 120 monitoring operators and 30 call centre operators, making the execution of this mammoth-size project by CP PLUS a roaring success. CP PLUS meticulously combined some of the latest surveillance solutions for the event – Video analytics and real-time video analysis for crowd management. Real-time detection and alert algorithm for overcrowded spaces. Automatic number plate recognition (ANPR) system for parking sites. Vehicle detection by vehicle colour/ license plate and date time combinations. Variable message display (VMD) boards. Real-time information dissemination containing warnings, traffic advice, route guidance and emergency messages. Text and graphic based messages display. Integrated traffic management system. The impact With the given safety and security measures, Ardh Kumbh Mela Prayagraj 2019 went on for more than 20 days with reportage of zero mishap. The operators of the integrated command and control centre remotely helped authorities by making live feeds of the vulnerable areas readily available, enabling early alarm mechanism, and providing complete control on the crowd movement with the police personnel. Director General – UP Police, O.P. Singh applauded the efforts of the police personnel and CP PLUS, and said, “We employed all kinds of modern surveillance technologies to make this Kumbh Mela a huge success. Simultaneously, forces – ATS and NSG – were on duty to prevent terrorist’s acts an/ or any other criminal or unpleasant incidents in the fair. Commandos monitored the event via choppers and worked in collaboration with the surveillance provider. For us, it was crucial to maintain safety of the people at the most vulnerable spots without intervening in the fair rituals. We received tremendous support from the designated surveillance teams who enabled us in monitoring such a massive crowd as per our requirement with zero mishap count.”  

Read More

Parekh Integrated Services Adopts Matrix VMS

Parekh Integrated Services Pvt. Ltd (PISPL) is in the business of providing high-quality logistics services that give customers a competitive advantage in the Indian market. Established in 1981, PISPL is a one-stop shop logistics and supply chain service provider in India offering storage and distribution services, freight forwarding, transportation, information technology and cold chain management solutions, along with other value added services to multiple industry verticals. Challenges Parekh Integrated Services Pvt. Ltd (PISPL) has established their operation with more than 1,500 warehouses and distribution setups to cover all the major cities in India for their services. With this expansion, IT infrastructure equipment was procured, including IP video surveillance systems of different reputed brands from different vendors. Over a period, it became costly and difficult to manage different brands procured separately at different locations. Cost of operation also went up due to the technical expertise required for each individual system. PISPL was looking for a centralized solution, which can work with different reputed brands as well as give them a common control of all the video surveillance systems to reduce the technical manpower cost for different systems. Due to low bandwidth at some of the remote locations, PISPL was not able to secure video evidence at a central location. It was required for any kind of post analysis or dispute resolution. PISPL were looking for an occupancy control system in each warehouse/ storage area to manage and control the worker’s presence in sensitive areas. It was getting difficult to do it manually at each location with the increase in number of employees over the last few years. Solution offered Matrix provided video management software (VMS) as the centralized platform to monitor and manage all the cameras from a central location on a single platform, which led to reduction in operation cost. Matrix VMS supports all the camera models of major brands including ACTI, Samsung, SONY, Mobotix, Panasonic, Vivotek etc., along with ONVIF protocol. Using Matrix VMS solution, PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location. This made it easy to go through the video evidence at a central location and resolve issues in a short time. Another issue of maintaining occupancy up to a certain limit in each zone was addressed by the Matrix VMS Crowd Management feature. All the entry/ exit points were covered with a camera to count number of heads passing through the points. From central control room, using Matrix Smart Client, security can monitor the total occupancy of an area and instruct the team accordingly. Why Matrix? Matrix VMS architecture supports centralized/ decentralized monitoring and management. Matrix VMS interoperable with most of the reputed brands. Possibility of scheduled backup at central location even at lower bandwidth. People counting feature to control zone occupancy Benefits Centralized control and management. Ease of use. Secure evidence. Improve productivity.  

Read More

On-Site Training: An Inescapable Requirement of Security Operations

Basic training within the framework of PSARA 2005 enables security personnel with just elementary knowledge and hands-on experience of manned-guarding; the induction and on the job training (OJT) take his/ her learning curve to some steps ahead. The litmus test of a security team led by a security officer and supervised by a security supervisor begins in the first shift of the day when the team is left to handle the operations at site independently because they have no PCK (previous course knowledge). The old hands with previous experience of handling the challenges pop up round the clock at the new site, while the new client generally insists on 100% change over of the security personnel and does not intend to allow them for any retention from the previous security provider. Besides, the security team who forms the frontline of the personnel in the security envelope is always the first one to either become victim/ hostage, or the rescuer in any kind of terrorist strike or emergency. The statistics show that the immediate reaction to the given incident is often characterized by the panic and/ or fear which cast a dim shadow on the security provider, and security industry as a whole.  So, how can these situations be avoided? What can aid, facilitate and/ or equip the security personnel to react in a calm, composed, measured and calibrated manner until the responsible authority arrives on the scene? The answer to both problems lies in organizing focused, site specific, realistic and regular on-site training at client site, coupled with daily morning and evening briefing by security supervisor and security officer in charge at site. To set the pace of operations, the security providers must ensure to take certain prior actions before they take over the site. They should bring about survey and security audit of the site to identify risks, threats and vulnerabilities; study the security SOPs of the client for the site, and analyze previous incidents and lessons learnt therefrom; put down the post and site instructions in writing with detailed job description (JD) for each post; and make detailed orientation/ familiarization with the peculiarities of the site. The key areas to focus during the conduct of an on-site training to orchestrate response matrix as differentiator are as follows: Drawing out absolute clarity in the roles and responsibilities (PSI) of each man on the ground. Ensuring hands on experience on the entire gamut of the security and safety equipment. Development of demonstrative ability in soft skills, and meet & greet procedures. Mastering continuous flow of info, monitoring, surveillance and reporting procedures. Hold regular mock drills of major emergency handling like fire, accidents, first aid, workplace violence, fall from heights, drowning, earthquake etc. Involve the employees and management in awareness drive on National Fire Safety Day, Women Safety Day, Child Safety Day, Road Safety Day, and demonstrate the expertise of security personnel through the role play technique. Hold day and night surprise checks and penalize the defaulters to enhance compliance of SOP. Hold sessions to analyze the root cause of past incidents and the preventive measures. The vital significance of the on-site training in running the security operations in an effective and smooth manner is indisputable and needs to be implemented by all security providers to ensure a high level quality of service. In conformity with the industry demand and to keep pace with the technological disruptions, the APS Group has custom designed a mobile training van which houses all the essential security and safety equipment, lifesaving first aid appliances, emergency rescue equipment, simulation devices, training charts, and live streaming facility of training being conducted at remote locations directly to the client’s boardroom/ workplace. This innovative and indigenous effort has hit the street with high voltage and is in great demand.  

Read More

Storage Technology: Then & Today, and the Trend

Computer storage systems have seen a massive evolution and transformation over the last 100 years or so. These changes have been dramatic in relation to the size, price and the access speed of storage. These changes have been possible due to the rapid advances in technology, which was initially slow and took years to evolve but later in the last decade it accelerated due to rapid innovations and concerted/ collaborative efforts of the industry giants. These technology advances have revolutionized the way companies, businesses and consumers use storage technologies today – from the most ubiquitous smart phone devices and personal computers all the way to businesses which now have come to rely more on cloud storage services. In this article we try to capture the evolution of storage technologies over the years and examine the fundamental technical reason that has accelerated storage evolution over the last decade. Storage evolution over the last 70 years (Relative to size, capacity and price) The table below highlights the trends in storage. Initially, the advances in technology were slow, mostly led by IBM in the 60s and 70s in the Megabyte revolution. In the 80s and 90s other companies jumped on the storage bandwagon and started the Gigabyte revolution soon to be followed by the Terabyte revolution. Today there are many physical form factors of storage devices from the traditional mechanical hard disk drives (HDD) to non-volatile memory (NVM) or solid-state devices (SSD); however, the fastest and most dynamic revolution is occurring in the cloud. Storage technology evolution over the last 100 years (Another view) There is another view of understanding the evolution of storage technology as well. The diagram below is a pictorial representation of the other view how storage technologies have evolved over the last 100 years. The fastest growing storage technology today Today, most storage systems use some or the other form of a mechanical device for storage which is otherwise known as ‘hard disk drives’ (HDD). HDDs are the dominant technology for several reasons such as very high recording density per platter, more than one platter per HDD, higher rotational speeds up to 15000 RPM for enterprise class drives, and reduced costs due to economies of scale. However, they do have inherent disadvantages for the following reasons – further recording density increase has hit the limits of the physical space, increasing the rotational speed of the platter increases the cost exponentially, and being a mechanical device it is bound to physically fail due to all the moving parts. A single HDD with a single platter at 15000 RPM can at most deliver a transfer speed of 100MB/s for sequential block reads, and for the random reads for the same configuration, transfer speed drops down to as low as 10MB/s Given the inherent limitations of mechanical storage devices and the rapid drop in prices of non-volatile memory (NVM), NVM is the next revolution in storage. It is found in almost all mobile devices and now continues to replace mechanical devices across the board. There are several reasons for this – they are now cost competitive with HDDs per terabyte of storage capacity and this price parity will continue to erode in favor of NVM in the coming years; NVM technology is far more reliable in the longer term because it has no moving parts; NVM is over 100 times faster than HDD and has similar transfer speeds for both sequential and random reads/ writes unlike HDDs; and micro-second read/ write latency compared to milli-second latency for HDDs. Companies like Intel and Samsung have now developed NVM technologies that are 3 dimensional – it means increased storage density per cubic measure of volume without any performance degradation. The first system implementations of NVM were found to be SSDs that use the serial ATA protocol or SATA. The reason behind this is very simple. They achieve a 100-fold increase in transfer speeds relative to HDD immediately, without changing the upper level small computer systems interface (SCSI) protocol. The SCSI protocol is over 4 decades old and is used by all I/O protocols such as fiber channel etc. All major operating systems also support the SCSI protocol. So for the industry’s quick gain, it was easy to replace the HDD with an NVM based SSD. The next disruption was soon born because the SCSI protocol and its associated software stack were very heavy as far as execution time was concerned. The SCSI protocol overhead directly impacted latency of reads and writes which is detrimental to high performance applications such as high frequency trading, small transactions in banking, and numerous database applications for machine learning and artificial intelligence. Thus, an industry working group was formed to address the latency problem associated with the SCSI proto col. The industry came up with a new protocol which takes advantage of the native speed of NVM. They completely eliminated the SCSI protocol to define a new protocol called NVMe (Non-Volatile-Memory Express). In this protocol, the NVM device is directly attached to the I/O PCI express bus – and hence the extension ‘e’ in NVM. This eliminates the need to have the traditional hardware and firmware that resides in a host bus adapter (HBA) along with HBA itself. The following diagram illustrates this concept. Latest NVM highlights PCIe Gen1 is 2.5gbps per lane per direction. Today’s SSDs pack Gen3x2 or Gen3x4 (8Gbps x 2 or 4 lanes = upto 32Gbps) bandwidth in a very tiny M.2 gumstick form-factor. 3-D NAND and 3D-Xpoint NAND, DRAM-bandwidth at flash-economies, very low-latency flash (20us IO read/ write) latency compared to 200us latency for enterprise flash. New form-factor coming to pack TB of capacity – ‘ruler’ form factor from Intel. NVMe enables performance scaling with the increase in capacity – traditionally denser HDD did not bring any performance improvement. NVMe over TCP enables low-cost SAN deployment compared to Infiniband, RoCE, iWarp or FC. NVMe allows dual-ported drives providing high-availability (same PCIe connector for either gen3/ gen4x4 or 2 separate gen3/ gen4x2 links); and…

Read More

How Organizations Can Revolutionize Security Strategies & Outcomes with Artificial Intelligence

Video surveillance cameras are the electronic eyes of a security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain captured events are posing any security risks or not. With some organizations using hundreds or even thousands of cameras, manual review of footage is simply impossible, leaving them potentially vulnerable to security breaches. To help organizations overcome this challenge and to optimize their security, Hikvision has embedded advanced artificial intelligence technology into their surveillance solutions whereby their cameras, control room equipment and back-end infrastructure can ‘learn’ about potential threats for themselves by recognizing people, vehicles and even behaviours. Improving all aspects of security with ‘proactive’ detection and prevention The manual interventions needed with traditional security systems require teams to frequently react to the breaches which have already taken place. Artificial intelligence, however, has changed all this by recognizing potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralize any potential threat. For example, Hikvision artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. As alerts are automated, potential threats are hardly missed or overlooked. How does Artificial Intelligence work? Artificial intelligence systems have become more intelligent over time, building database of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Hikvision’s artificial intelligence technologies use advanced algorithms based on deep learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition: It allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification: It can be used to identify vehicle number plates, and recognize different types of vehicles (including make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection: It helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence: It employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Why is Artificial Intelligence great news for businesses? Artificial Intelligence isn’t just useful for identifying security threats – although that is a key strength of the technology – it can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. In the same way, artificial intelligence can help organisations better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature i.e., people counting allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit the most, and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Hikvision: An Artificial Intelligence pioneer Hikvision has created a family of artificial intelligence products to maximise the benefits for organisations such as the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition, monitoring and counting of people, and recognition and detection of vehicles, to name a few. These features depend on artificial intelligence technology to recognise, classify and respond to security threats.  

Read More

3 Ways Traka Makes Facility’s Fleet Management Easy

In the logistics and distribution industry, overseeing fleet management can be far from easy. When you have thousands of drivers and vehicles that transport goods, you’re bound to lose precious minutes due to misplaced keys or vehicles – and those add up to millions annually. How do you get back your lost time and maintain full visibility over your entire fleet of vehicles? Local benefits of Traka’s fleet management Shipping quickly and efficiently is the bread and butter of the logistics and distribution industry. Then it goes without saying that access to a warehouse’s vehicles and inventory should be properly safeguarded to prevent the loss or damage thereof. One clear way to avoid this is by ensuring that access is limited to only the staff with correct login credentials, but how to make that process as streamlined as possible? Here’s where Traka’s iFob comes in. The Traka iFob can be programmed to act as an electronic key for the vehicles by integrating with powerful software each time it’s received from Traka’s intelligent key cabinet. The system then determines whether or not a user is permitted to access that key. If a vehicle is faulty, an authorised user can notify the management of it when putting their key back into the cabinet. Traka’s system will prevent others from accessing the vehicle until a repair is carried out, protecting the rest of the staff from using defective vehicles. This also makes the vehicles last longer. In short, the results of a Traka fleet management solution include: Controlled access to warehouse and vehicles. Minutes saved from knowing where to get the keys at any time. 24/7 audit trail tracking key use for complete visibility over operations. Safer work environment and longer life of vehicles. Let’s think beyond the local benefits for a moment, though. What are the regional benefits of a Traka system? At the regional level, the local benefits are amplified due to Traka’s administrative control. All key tracking information and permissions are stored in each Traka key cabinet, which allows administrators to see who possess which kind of key, and when they received it. Changing access permissions takes just seconds, and has a near-instant effect across all the Traka key cabinets, making employee turnover less stressful. With Traka, the solution can track: Location of each vehicle and distance logging. Mileage, fuel levels and scheduled vehicle maintenance. Status of each vehicle in a large vehicle fleet.  And it can do it all in a streamlined system managing all facilities and warehouses. Global benefits of Traka’s fleet management Now look at all these benefits globally. By having complete visibility over operations – even across hundreds of miles – the overwhelming task of managing a large fleet is largely automated. This makes scaling the business easier because one can easily replicate this system in different locations. With their central reporting, one can say with confidence how much mileage their company uses on average each year. They can decrease the wear and tear on their vehicles by scheduling enforced maintenance alerts while increasing accountability for all employees with audit trails for each vehicle. As we mentioned before, a few minutes saved for each driver by finding their key in the same place each morning can translate across thousands of drivers, saving a company millions of dollars annually, and these are just their solutions for fleet management!  

Read More

NETGEAR launched Tri-Band Wi-Fi 6 Router

NETGEAR has recently launched the Tri-Band Wi-Fi 6 routers – Nighthawk AX4 & AX8 in Bengaluru. Today households are dealing with an increasing number of connected devices and an increasing demand for greater bandwidth from streaming video, audio and online gaming. These smart home devices from IP cameras, voice assistants, smart thermostats and appliances etc., depend on a constant connection to the cloud. These devices just increase the complexity of a network as they compete for bandwidth, pushing wireless home networks beyond the technical threshold for the current generation of Wi-Fi. NETGEAR has solved this modern-day dilemma with the introduction of a full suite of ultra-fast Wi-Fi 6 routers. Speaking at the launch, Marthesh Nagendra, Country Manager – India & SAARC, NETGEAR said, “With the increasing number of Wi-Fi devices in our home network, it is has become critical for NETGEAR to provide a solution where each device gets the Wi-Fi bandwidth it needs so that you can get the quality connected experience that you deserve. The NETGEAR AX Nighthawk delivers super fast Wi-Fi with better coverage, and more importantly, has the power and capacity to handle dozens of devices in the typical congested smart home.”  

Read More

IDIS New Super Fisheye 5Mp IR Compact

IDIS has launched the DirectIP Super Fisheye 5MP Compact camera (DC-Y6513RX), further extending its popular Super Fisheye range. IDIS fisheye cameras are some of IDIS’s best-selling models thanks to their exceptional, dual-side de-warping and smart UX Controls, allowing for smooth and intuitive panning, tracking, and zooming with award-winning ease and accuracy. The introduction of the DC-Y6513RX reflects IDIS’s continued commitment to market responsive innovation and meets installer and end-user requests for a more compact 360° camera that can capture high-definition images in all lighting conditions without blind spots. It also lets customers benefit from heat mapping without the hassle and cost of additional appliances or analytics software. A broad, high-specification camera in a compact form, the new Super Fisheye 5MP builds on the success of earlier IDIS’s Super Fisheye cameras, including the award-winning 12MP DC-Y3C14WRX. It meets industry demands for clear and accurate image capture, long-term performance and reliability, exceptional de-warping, and a low total cost of ownership. “The new Super Fisheye 5MP Compact is a great new choice for wide area surveillance and is already contributing to successful project wins for our integration partners in retail applications, eating-out sectors, education, healthcare and other environments where customers benefit from cost-effective and simple to use analytics. “Its high performance 360° capability means it can replace multiple fixed-lens cameras and provide complete and clear image capture in a variety of lighting conditions. For our integrator partners, IDIS’s value proposition, fast and seamless installations and performance guarantees have the potential to increase margins, while end-users benefit from savings in terms of lower upfront equipment and installation costs, with reduced maintenance expense and video storage burden,” said James Min, Managing Director, IDIS Europe. Features IDIS Smart UX Controls for very high accuracy and ease-of-use, with intuitive ‘rubber-band’ style control to deliver a new level of operator experience. Super smooth de-warping on the camera as well as on desktop applications and mobile devices for added convenience and out-of-hours monitoring. Quick controls allowing operators to use the CTRL button with a combination of left, right, and wheel mouse clicks for easier and faster investigations. Full protection against video loss thanks to built-in IDIS smart failover guaranteeing continued recording in the event of network instability, overload or failure. IDIS intelligent codec that delivers H.264/ H.265 dual codec performance and significant bandwidth and storage savings, while eliminating the need to upgrade hardware. Quick and simple installation with DirectIP NVRs and true plug-and-play functionality. Reduced potential for cybersecurity loopholes with one-click configuration eliminating the need to manage individual passwords for multiple devices. Heat-mapping to more easily identify hot-spots, dead zones and bottlenecks in retail and eating-out sectors. Intelligent video and event trigger functions including motion detection, active tampering and trip zones. “The IDIS Super Fisheye 5MP Compact camera also scores highly on essential features including built-in LEDs for IR operation in full darkness (up to 15m), 8 zone privacy masking, true wide dynamic range, ONVIF support, built-in speakers and microphone allowing 2-way communications, and industry leading 5-year free warranty. All these factors come together to deliver a lower cost of ownership to our customers,” continued James Min. IDIS offers an end-to-end, single sourced video offering that delivers unrivalled plug-and-play simplicity, combined with highest-quality performance, compatibility and a low total cost of ownership, and features industry-leading warranties.  

Read More