securitylinkindia

Dahua Technology Launches Thermal Monocular Camera Series to Make Outdoor Tasks Handier

Dahua Technology, a world-leading video-centric smart IoT solution and service provider, just launched its Thermal Monocular Camera Series – M Series. They are handheld cameras tailored for outdoor scenarios such as hiking, wildlife conservation, search and rescue missions, hunting, etc. M Series provides three model options (M20, M40 and M60) based on the image resolution of the cameras, while each of them includes multiple models with different lenses to meet diverse customer needs. With an industry-leading 12μm Vox sensor, the maximum resolution can reach 640×512. This innovative series could be the handiest high-quality device for thermal imaging-related tasks in the field, and here are the reasons. Reliable under tough outdoor conditions The ergonomic design of the M Series realizes the comfortable handheld experience and convenient operation. These cameras meet the IP67 standard of Ingress Protection Rating, pass the 2 meter drop test, and function under temperatures of -20° to 55°, which means they can work steadily in tough environments. Even under harsh weather, the M Series is able to capture sharp thermal images at a smooth and stable frame rate and produce clear and detailed visuals of running targets and moving vehicles. Thanks to advanced thermal imaging technology, the series can detect animals and objects in complete darkness, haze, or through glaring light. M Series’s weight ranges from 350g to 500g. Its internal lithium battery supports up to 9 hours of battery life (tested at 25°C) and a USB cable power supply. These make the Dahua Thermal Monocular Camera Series ideal for outdoor applications and easy to be recharged in the field. Advanced intelligence to meet various needs M Series offers a choice of four color palettes to meet users’ observation needs in different scenarios. ‘White Hot’ is suitable for observing active targets, ‘Iron Red’ can improve the comfort of long-term observation under night conditions, ‘Rainbow’ is convenient for users to quickly identify targets, and ‘Alarm’ helps to quickly detect the emergence of high-temperature targets. As thermal imaging cameras, the M Series also has a crucial function of automatic fire detection up to 1km (Fire size: 2mx2m). Forest management personnel can use it to conduct inspections to quickly find fires and arrange for firefighters to deal with the fire in time. ghters to deal with the fire in time. In addition, the M Series supports distance measurement. By selecting the measurement target type (e.g., wolf, rabbit, human, custom) and placing the measurement line on the top and bottom of the target, the approximate distance of the target can be obtained. For networking, the M Series is equipped with a builtin Wi-Fi hotspot module. By connecting the cameras to the smartphone via Wi-Fi hotspot, users can transmit real-time images, set up cameras, store pictures and videos, and browse history files on the DH Thermal APP. Moreover, videos and pictures can be exported and shared via a USB cable connected to a computer. Outstanding features for a better user experience With the built-in video recorder and display, Dahua Thermal Monocular Camera Series can present great views to users and take pictures and videos at any time. Apart from the Micro USB ports, the camera series also has CVBS ports for connecting to an external display screen to realize a better visual experience. In addition, the series has an SD card slot that supports a maximum of 256 GB of storage space, which can significantly expand the storage capacity of the cameras. A built-in distance sensor can detect whether the device is being used. If no one is within a certain distance for a set period, the device will automatically turn on to standby mode. The display will be turned off to preserve battery life while other functions are still online. Users can re-start operating by stepping closer to the device or pressing the power button. Dahua never stops innovating for better products, solutions and services to meet customers’ needs. The highlighted functions not only differentiate Dahua’s products from others but also attract consumers around the world.  

Read More

Cross-Border Ecommerce to Account for 38% of All Ecommerce Transactions Globally by Value in 2023, Juniper Research Study Finds

A new study from Juniper Research has found that the value of cross-border eCommerce will exceed $2.1 trillion in 2023, from $1.9 trillion in 2022. This growth of over 13% in a single year reflects the increasing success of marketplaces which offer goods across borders, as well as the rising viability of cross-border sales as an eCommerce model. The new research, Cross-border eCommerce – Emerging Opportunities, Future Challenges & Market Forecasts 2022-2026, found that as eCommerce models diversify, including models such as buy now pay later and click and collect, cross-border options must also keep pace, by agreeing local distribution and payment partnerships. The research recommends that cross-border eCommerce vendors offer localised eCommerce models, or they will lose out to options that better serve consumer appetites. Marketplace model critical to cross-border growth The research found that the marketplace model, where large vendors, such as Amazon or Wish.com, sell goods to users on behalf of cross-border vendors, will be critical to growth. This model represents an easy way to access a large audience, while ensuring that accepting payments and other logistical issues are seamlessly handled. Research co-author Nick Maynard elaborated, “The marketplace model within eCommerce takes the complexity away, meaning that cross-border merchants can provide a localised service. As such, marketplaces are an excellent way to gain immediate access to an existing user base, albeit one that can be restrictive compared with having a direct-to-consumer relationship.” Physical goods dominating cross-border eCommerce spend The research found that physical goods will account for over 97% of cross-border eCommerce spend in 2023, with digital goods making up the remainder. It identified the maturity of cross border export of physical goods as a business model as a major factor in this difference, as well as increasingly cost conscious end users. The research recommends that payments vendors support a wide range of local payment methods, in order to capitalise on this sizeable opportunity. Juniper Research provides research and analytical services to the global hitech communications sector, providing consultancy, analyst reports and industry commentary.  

Read More

NIST Requests Public Comment on Draft Guidance for 5G Cybersecurity

As wireless networks transition to 5G technology, they could enable a host of new capabilities ranging from autonomous vehicles to surgery performed at a distance – but they also will place new cybersecurity demands on industry. A new draft publication from the National Institute of Standards and Technology (NIST) is designed to help network operators navigate the demands while delivering the new features 5G is designed to provide. The publication describes a standalone 5G network that NIST’s National Cybersecurity Center of Excellence (NCCoE) is constructing, largely for the purpose of demonstrating 5G cybersecurity capabilities in different situations. The network, which the NCCoE team is constructing from off-theshelf commercial technology, is currently being deployed, and the team is seeking comments on the publication in part to ensure the finished network will allow the researchers to develop practical guidance that the wireless security community will find useful. The publication, titled 5G Cybersecurity Volume B: Approach, Architecture and Security Characteristics (NIST Special Publication 1800-33B), describes the cybersecurity capabilities that their example 5G network will enable. It also provides a risk analysis for the security capabilities that the network will demonstrate. Its authors, who characterize it as a preliminary draft, plan to develop it to include actionable guidance on using standards and recommended practices for multiple use case scenarios. “The information contained in the document highlights security features that 5G offers,” said Jeff Cichonski, a NIST Information Technology Specialist and one of the publication’s authors, “Understanding what’s available can be critical to help operators and users of 5G understand and manage their cybersecurity risk when it comes to 5G.” One advantage of 5G will be greater customization of a network to fit its purpose. A large company might want its own 5G network for communication at its headquarters building, while a hospital might want one to enable telemedicine. These different use cases might well have varied cybersecurity demands that the network can be configured to provide appropriately – by activating some available security features rather than others, for example. A potential issue, however, is the current lack of 5G standards that specify how to deploy cybersecurity protections onto the underlying components that support and operate the 5G system. One difference between 5G and previous-generation cellular networks is 5G’s use of cloud-based technology, which is similar to that used for many internet applications. 5G systems can leverage the robust security features available in cloud computing architectures to protect 5G data and communications. As these features may be unfamiliar to some in the industry, Cichonski said, the publication is designed to help clarify how the cloud-infrastructure-focused security capabilities can help secure a 5G network. “The first phase of the project will also showcase how 5G can help address known security challenges that existed in previous-generation networks,” Cichonski said, “If we identify gaps in 5G cybersecurity standards, we will let standards development organizations know what we learn. We are hoping this project will help the entire wireless security community.” The publication is intended primarily for commercial mobile network and private 5G network operators, as well as for organizations using and managing 5G-enabled technology. Once completed, the approach will offer several benefits to organizations that implement it, including reduced susceptibility of a 5G network to cyberattack, better protection of 5G communications against eavesdropping and tampering, and increased privacy protections for 5G users. To develop the draft further, the authors are requesting comments that focus on the security capabilities their example 5G solution implements. “We’d like to know if the guide accurately describes technical security capabilities and related threats and vulnerabilities,” Cichonski said, “One major goal is to assist organizations in understanding and managing the cybersecurity capabilities available in 5G and the supporting IT infrastructure, so we want the community to let us know what we can add to make the information more relevant to their organizations.”  

Read More

Top 4 Cybersecurity Trends for APAC Companies in 2022

Ramesh Umashankar, CEO – International Business, iValue InfoSolutions In recent years, the Asia-Pacific (APAC) region has become increasingly attractive to cybercriminals. According to IBM X-Force Threat Intelligence Index 2022, Asia was the most attacked region in 2021, receiving 26 percent of the global attacks. India tops the list of the most attacked country in Asia. Various reports highlight a significant shift in cyberattacks from North America and Europe to Asia. The rise in cyberattacks in APAC is credited to the region’s rapid digitalization coupled with low cybersecurity awareness, training, and regulations. This regional focus marks an emerging opportunity for business leaders in the APAC to consider how they can improve their cybersecurity postures and be aware of the latest cybersecurity trends. Here are the top 4 cybersecurity trends for APAC companies in 2022: 1. A renewed focus on data privacy and security The impact of GDPR laws on data protection has inspired APAC governments to introduce cybersecurity bills on data protection. Bangladesh is well on its path to introducing the first of its kind draft cybersecurity strategy that aims at creating safer cyberspace. While India is inching toward the final approval for its Personal Data Protection (PDP) bill. But the biggest impact for companies in APAC is the widespread introduction of mandatory data breach notification laws. For instance, Singapore’s new Cybersecurity Act requires organizations from 11 key industry sectors to report any breach of critical information infrastructures to the Singapore Cyber Security Agency. Under its Personal Data Protection Commission (PDPC), organizations are to notify of any cyber incident within three days of the event. The shift from voluntary to mandatory reporting, in a time-limited setting, would require companies to focus on improving their privacy compliance and security strategies or risk paying hefty fines. iValue Recommends: Set up an incident response team and create a template data breach notification. Your team would be responsible for planning a response to a breach and notifying employees, partners, vendors, regulatory bodies, and other stakeholders. 2. Combating Ransomware-as-aService According to the 2022 Thales Data Threat Report, 1 in 5 businesses have paid or would pay a ransom for their data. Organizations in APAC are attacked 51 times per week on average. Indian companies are prime targets for ransomware, with 1 in 4 companies reporting a ransomware attack in 2021. Adding to the alarming statistics are reports that APAC organizations are more likely to pay the ransom sometimes as high as $USD 1 million. APAC’s vulnerability to ransomware, fuelled by Ransomware-as-a-Service (RaaS), is a push for leaders to devise ransomware defense plans. The aim is to prioritize building cyber resilience by implementing new technologies and providing cybersecurity training to employees. iValue recommends: The biggest element for cyberattacks is human error. Invest in training your staff in best practices of cybersecurity and maintaining basic security hygiene. Have advanced threat hunting solutions in place to weed out trojans (Trickbot, Emotet, Dridex, CobaltStrik) and ransomware infections from your network. 3. Rise in collaborative cybersecurity efforts Given that threat actors target companies with multiple locations, there is a need for an increased collaborative effort between governments, companies, vendors to strengthen the cybersecurity landscape. In light of the increasing threats and challenges, many companies and governments are working together to share information and best practices and develop new cybersecurity solutions. Through initiatives such as information sharing platforms and incident response exercises, organizations in the Asia Pacific region are working together to address cyber threats and accelerate public-private partnerships in cybersecurity. For example, Philippine bankers are learning cybersecurity best practices from the United Kingdom. According to FIT Country Director Richard Colley, the initiative aims to help forge relationships and build connections between the UK and the Philippines and work together in addressing cyber security risks. Meanwhile, Microsoft is on a mission to unite APAC governments and state agencies with the cybersecurity council. The Asia-pacific Public Sector Cyber Security Executive Council is a growing group of government leaders, policymakers, regulators, and industry stakeholders from Singapore, Indonesia, South Korea, Malaysia, Thailand, Brunei, and the Philippines. The council meets every quarter to maintain a continuous exchange of information on cyber threats and cybersecurity solutions. iValue recommends: Look for security management platforms that offer automation at scale, customized threat intelligence, and leverage AI. 4. Cybersecurity Education A dearth of cybersecurity experts and skillsets is the bane of the cybersecurity industry. Despite reskilling and up skilling efforts, organizations are finding it increasingly difficult to find and retain qualified talent. According to the 2021 World Economic Forum (WEF) report, the APAC region accounts for 66 percent or 2.045 million of the global cybersecurity talent shortage. To address the cybersecurity workforce gap, organizations, institutions, and governments are working on specialized cybersecurity training programs. For instance, The Asia Pacific University of Technology and Innovation (APU) in Malaysia offers specialized graduate courses in collaboration with industry experts, a state-of-the-art infrastructure learning space (CyberSecurity Talent Zone), a full-fledged Cyber Threats Simulation and Response Center (or Cyber Range), and a Security Operations Center (SOC) with military-grade real-time cybersecurity monitoring systems, research centers, and simulation infrastructure. Whereas, giant tech corporations like IBM and Microsoft are investing in cybersecurity hubs in APAC regions to deliver immersive training programs. iValue recommends: Cybersecurity is a necessity for every company. Organizations must recognize that investing in skilled cybersecurity professionals and building a team is essential for long-term success. Expand your team’s capabilities, skillsets, and geographies by hiring remote workers across the globe.  

Read More

Why do Enterprises Need a Zero Trust Model?

Satish Kumar V, CEO, EverestIMS Technologies Losing credibility is equivalent to losing your standing in the increasingly competitive market, and it will directly impact your business. Therefore, it is essential to adopt a robust security strategy to maintain its sterling reputation as a reliable and trustworthy enterprise. Enterprises that adopt a Zero Trust philosophy can confidently offer new business models and enhanced and secure user experience to their customers. Evolved business models and satisfying customer experience impact the bottom line empowering businesses to be future-ready without fear of security threats. From an enterprises standpoint a Zero Trust Network Access (ZTNA) perspective has to be embedded within the access and security layers that they adopt. What is Zero Trust? At its core, Zero Trust is about verifying every user, validating every device, and limiting access intelligently. Instead of relying on Single-Sign-on (SSO) and multi-factor authentication alone, AI/ ML helps enterprises with behaviour-based access i.e. tracking user behaviour patterns and detecting any deviation from that baseline. It enables the verify-first practice. Almost all our devices are linked. Therefore, we need to employ device management solutions with the context and policies to ensure safer access. Access to the workforce in any enterprise is based on their roles and tasks. Unfortunately, changes in roles do not always change access rights soon enough. Therefore, privileges need to change as quickly as changing roles or employees leave the enterprise. It can only be done through integrated real-time applications that cause zero delays on access-based decisions. Zero Trust Network Access (ZTNA) offers a model where trust is never implicit and enforces policies that are granular, adaptive, and context-aware. A ZTNA strategy for enterprises Enterprises committed to adopting Zero Trust must keep in mind the following key factors: Micro-segmentation: Enterprise security will use granular controls to handle user controls over networks, data usage, SaaS applications, and endpoint applications. Enforced policies everywhere: Security must be persistent and not limited to a file-access approach. It must involve uncompromising security at all times from everywhere – across different applications and file types. Greater visibility through automation: Log all behaviour, suspicious or not. Enterprises can detect potential threats while ensuring compliance through frequent audits. Benefits of ZTNA implementation Enterprises en route to digital transformation aim to be future-ready. But, as businesses grow, so do cyber threats. The ZTNA (zero trust network access) ensures controlled access to the network. And the Zero Trust advantage for network security is that it reduces surface area from cyber-attacks. This control prevents direct exposure of your applications to the internet. With the advent of ZTNA, enterprises can phase out their previous dependence on VPNs for remote access. While access to applications was through intermediaries such as VPNs before, it is a cloud service now, either self-hosted or from a third party. ZTNA technologies enable application access without going through the network. It starts with Zero Trust, even before allowing connectivity, and is purely based on identities and devices, with authorization coming first and foremost. Typically, enterprises are challenged by certain limitations i.e., they have not been able to limit the incident to one identity without compromising others or contain the incident before it turns into a data breach. The Zero Trust model offers intelligent responses with more authentication methods and controls to ward off cyber threats. Moreover, zero trust enables risk-adaptive security control and customizes enforcement based on user actions. Working from anywhere on any device has altered the way businesses operate irrevocably. It is estimated that over 50% of the workforce will continue to work remotely in the next few years. The new working model means vast amounts of data flow through various devices and out of a secure office facility. Moreover, employees log in and out between office laptops and personal devices or use a public Wi-Fi network or a shared family system. Hackers find enterprises in these circumstances an easy target. Clearly defined policies and stipulations of the devices, data access, and data encryption in a Zero Trust model alone can ensure total compliance. A word to the wise It is vital that enterprises, small, medium, or large, understand the evolving cyber landscape, risk perceptions, and the connection between them to prioritize risk mitigation based on threat analysis. With ZTNA, enterprises control data usage, with unified data security policies across the board – cloud, networks, endpoints, and SaaS applications. Therefore, the time to implement ZTNA is now.  

Read More

City of Victoria Chooses Veeam to Drive Business Resiliency and Ensure Data Protection

Veeam® Software, the provider of backup, recovery and data management solutions that deliver Modern Data Protection, recently announced it has been chosen by City of Victoria to build its city’s business resiliency and increase its security posture by providing unmatched modern data protection, backup and disaster recovery. To support the city’s thriving economy and vibrant arts and culture scene, City of Victoria knew business resiliency and cybersecurity had to be main priorities, which meant making sure data is always protected and accessible. Located at the southern tip of Vancouver Island and serving as the capital city of British Columbia, Victoria is a modern, forward-thinking city known for its convenient city services. From water distribution, garbage collection and emergency assistance to recreational classes, transportation planning and landuse development, these city services are foundational to the city’s strong and successful community. With numerous IT systems supporting city services, ensuring reliability and accessibility for all 94,400 residents is one of the city’s highest priorities. So, when City of Victoria’s legacy backup solutions failed to match the agility and efficiency of Microsoft Azure Stack hyperconverged infrastructure (HCI) which is what all systems run on, the IT team knew it had to look for a solution that would dovetail with that simplicity. “Our goal is to always have 100% confidence that data remains protected and city services are always available, so when looking for new solutions, Veeam Backup & Replication™ stood out to us,” Mike Palmer, CIO for the City of Victoria said, “At the time, ransomware was just beginning to surface as a threat, and Veeam had the added benefit of helping increase our ransomware protection. Business resiliency and cybersecurity are two of the city’s biggest priorities, so having a reliable solution like Veeam means there’s no second guessing.” With Veeam Backup & Replication, City of Victoria can build business resiliency by simplifying backup and disaster recovery and increase its security posture by boosting ransomware protection – preventing, detecting and restoring data should a ransomware attack take place. Today, ransomware is worse than ever and the attacks against all industries are only increasing. With the threat of new ransomware models continuing to be a leading concern facing business leaders, a solution that protects all data against accidental deletion, security threats and retention-policy gaps was a huge factor in decision making. Veeam also provides total access, control and protection of city data with Veeam Backup for Microsoft Office 365. Now, City of Victoria can back up 25 TB across 130 Microsoft Hyper-V and VMware vSphere VMs in Azure Stack HCI on-premises and send backup copies to tape, so data is air gapped regardless of it being stored on-premises or in the cloud. Veeam gives City of Victoria’s IT team the ability to go further back than 90 days for SharePoint and 30 days for Exchange items, which is critical for legal and regulatory requirements and helps to meet compliance requirements with efficient search and recover features. This ease-of-use helps the city make sure data is always protected and accessible – saving at least 10 hours in troubleshooting time each week.  

Read More

Security and safety in large venues: how smart video can help

Keeping visitors safe is the top priority for any large venue. However, with expansive areas to cover, and sometimes millions of visitors a year to look after, manual patrols and security video management are the major challenges these places are facing. To address them, leading auditoriums, arenas and stadiums around the world are deploying smart video solutions that can automate routine security checks and trigger alerts in real time in the event of an accident or other incident, helping security staff respond faster and more effectively. Security and safety challenges at large venues At large venues and sports stadiums, large numbers of visitors increase the likelihood of crowding, accidents, and fire safety risks. For these reasons, the security staff has to constantly keep an eye on all areas of the site. However, the sheer scale of these kinds of sites makes this very difficult, or even impossible, to use traditional manual approaches and patrols to protect the entire complex. The better way: An automated, large-scale, smart video solution One way for auditoriums, arenas and stadiums to protect staff and large crowds of visitors is to deploy smart video solutions. These keep track of large areas in high definition and generate automated alerts in the event of accidents and emergencies, helping security teams to assist visitors far more quickly. The leading smart video solutions also provide ‘tags’ in video footage that allow security teams to search for, and find, footage of incidents much more quickly, which help to deliver further time savings. Outside large venues, smart video solutions with license-plate recognition (ANPR) capabilities can be deployed to control vehicle access and to help large numbers of visitors to park more quickly. This supports better security and safety outcomes, while also improving the visitor experience, especially during popular events. Excellent results at Zayed Sport City Zayed Sport City, which is the number one sports destination in United Arab Emirates (UAE), is a great example of how smart video can improve the safety of sports fans and visitors. The venue, which welcomes 1.7 million visiting sports fans each year, has deployed a Hikvision solution that incorporates more than 600 smart video cameras with different functions and types, deployed across the entire site. This includes coverage of the Zayed Sport City stadium, ice rink, bowling center, tennis center and a range of other sports facilities. With the Hikvision solution, many routine security tasks can be handled automatically, reducing the risk of missed incidents, speeding up responses, and reducing staff workloads and costs. “The Hikvision system’s AI features are very valuable in investigating incidents, and it reduces the time required by our staff significantly.” said Khalid Al Mutawa, Director of Operations for Abu Dhabi Entertainment Company, the company that manages and operates Zayed Sport City, “Streamlining our processes with this system has allowed us to become much more efficient in ensuring both safety and customer experience throughout the complex. The automated security alerts and the HD Video helps us to respond quickly and work with peace of mind.”  

Read More

National Police Force in EMEA expands longterm contract to broaden use of Cellebrite’s Digital Intelligence Solution Suite

Cellebrite, a global company in Digital Intelligence (DI) solutions for the public and private sectors, recently announced that a national police force in EMEA has expanded its long-term partnership with Cellebrite, resulting in one of the largest Cellebrite Premium Enterprise deployments to date. The USD 2 million agreement will enable the police force to deploy solutions from Cellebrite’s industry-leading DI offering across its operations, establishing Cellebrite UFED Ultimate as the premier collection and review solution for examiners in the lab and investigators in the field across the police force and extending Cellebrite Premium capabilities to all UFED end points. Arthur Veinstein, Cellebrite’s General Manager, International Business, commented, “We are thrilled to have a longterm customer choosing to continue modernizing its investigative efforts through increased adoption of Cellebrite’s DI solutions. Adoption of our solutions at the national level will enhance collaboration among the police force’s examiners and investigators, resulting in more efficient and effective investigations.”  

Read More

Amg Systems Selected by Ck Communications to help Digitise Cardiff’s Traffic Monitoring and Cctv Network

When CK Communications was asked to upgrade all of Cardiff’s traffic control rooms from analogue to IP, they called on video transmission and networking experts AMG Systems to help move video and data to more than 30 separate monitoring locations across the city. Cardiff-based CK Communications has a 22-year history and offers a unique service integrating CCTV, RPS, VMS, fibre, security and electrical services from design stages through to installation and commissioning. The company’s projects include city centres, council-owned buildings, data centres, motorways and tunnels and it works closely with the main roads agencies in South Wales to provide support on their current and future projects. When CK won the contract to upgrade all traffic control rooms in Cardiff from analogue to IP, it faced a significant task. These monitoring stations include four main and no less than 27 remotely sited control desks across the city. The control rooms and desks are required for the use of police, urban traffic control (which has responsibility for traffic signals across Cardiff), a Silver Command post for major events including monitoring large-scale football and rugby match days, tunnel service buildings, bus depots and more. According to Ian Jones, the existing Cardiff traffic monitoring network was very much in need of an upgrade. He describes it as formerly ‘an analogue beast.’ “It meant there was lots of video switching, and video matrixes dotted all over the place,” Ian said, “Our first task was to get all of those camera images from the analogue world on to an IP solution. The products to be used were Pelco, but then we had to send 500 images around the city from a variety of locations to different control rooms. So that’s where AMG came in.” AMG Systems is the leading UK-based manufacturer of environmentally robust fibre, analogue, IP/ Ethernet, wireless and hybrid communication transmission solutions. Ian worked with Sara Fisher, AMG’s Sales and Marketing Director, to design the system which would work best on the existing customer-owned fibre network in place across Cardiff. “That involved utilising lots of Layer 2 switches, as well as fibre switches which are dotted across the city now,” he said, “A significant factor in the installation was that the existing Pelco equipment was only able to unicast a certain number of images; they prefer to use multicast. So AMG provided switches for multicasting (including IGMP and IGMP snooping) and other specific jobs. “Those AMG switches help to send data – including video and audio – to all of the various control rooms and control desks across the city.” CK has also moved Cardiff’s analogue cameras to IP, which has involved using AMG transmission equipment at the edge of the network, integrating into switches CK has built into the nodes. The AMG equipment in use in Cardiff includes AMG 5900 hybrid units, which are able to transmit analogue video, data, audio and Ethernet, a variety of edge-of-network managed and unmanaged switches, 10Gb/s managed switches, both standard and modular, and hybrid (analogue over IP) wireless links. Ian is himself an experienced highways engineer and has been responsible at CK for projects in Cardiff for more than a decade. His first exposure to AMG’s products came about when working on upgrading camera sites on the M25 motorway.  

Read More

Hikvision HeatPro Thermal Camera: A Preventive Tool for Fire Safety

Fire is a massive safety concern, especially in large areas with combustible ‘elements’ such as charging units, waste and battery storage areas. Often these areas are unmanned at all times, and traditional monitoring methods do not always see a fire in time. The speed at which a fire can take hold is frightening, and so the earlier a warning is given, the better the outcome. Thermal technology is coming down in price and is being used increasingly to detect abnormal heat rises, effectively offering a fire prevention solution, rather than a fire reaction one. A serious problem smoulders According to the U.S. Fire Administration (USFA) the US suffers an annual average of 1.3 million fires resulting in 3,190 civilian deaths, 16,225 civilian injuries, $14.7 billion in direct property loss. It is a great concern to industry too, especially in large buildings with combustible or electronic con tents, like warehouses, fulfillment centers, dispatch centers, and datacenters. Even battery charging stations are higher risk, with Lithium-ion batteries being a particular concern. Existing methods of detection can prove useful, but have limitations with regard to verification and warning time. Smoke detectors will give an alarm when they detect smoke in the air. However, this is only after the fire has already started. The same applies to air sampling devices, which tests the particulates in the air, although these can usually detect smoke before a smoke detector. Optical cameras are also used, but they can only give a warning when flames are visible – in other words, when the fire has already started. Monitoring temperature before flame Thermal imagery can give warnings at an earlier stage of a fire. Because this technology monitors the temperature, rather than the output of a fire (smoke, flame etc.), it can flag a potential issue before it happens. If thermal sensors detect abnormal temperatures, operators can investigate further and take action to avert the fire itself. Cameras can be positioned at certain points around a site to monitor it all, or used to focus on particular risk points, like a waste dump, or an electric charging station. Solution designers use thermal technology successfully in a number of scenarios, including recycling centers, forests, and warehouses.  Verification avoids false alarms Many fire systems use different types of sensor in combination, and thermal technology adds extra value by verifying other alerts. For example, it can double-check the temperature of an area where a smoke alarm has sounded. Thermal cameras can also provide support for those checking the alert location. With the use of a bi-spectrum camera, operators in the control center can see if the person checking the alert is in the same place as that alert, reducing the chance of error and missing a potential fire risk. The technology also comes in useful for planning and risk assessment. It can show potential ‘hot spots’ in a building by monitoring it over time. These can then form part of risk mitigation – to pay particular attention to those areas for fire prevention activities and evacuation plans, for example. When there are people in an area, preventing fire becomes even more important. Injuries can be averted, even lives saved, if they get the proper warning in time to act – whether to put out a fire or evacuate. Thermal camera ranges (e.g., Hikvision’s HeatPro series) have models linked directly to sirens or strobe lights. These can give a general warning in the area of the camera, as well as an alert to the system operator. Installation design flexibility Lower cost thermal cameras, like HeatPro, can also provide great flexibility in building a bespoke system for a site. A number of different detection distance options in the cameras provide different fields of view. This means that installers can find the right combination to meet the needs of the space they need to protect. Hikvision also has a Thermal Design Tool – software to guide installers on the best way to place the cameras in an area. Franck Carette, Product Manager Europe Security & Safety Thermal Products at Hikvision, said, “The fact the thermal technology has come down in price means that it’s now a much more sensible fire prevention option from an economic perspective. With the introduction of our latest model, this makes even more sense, since this has a much larger field of view. This means installers need to put in fewer cameras to cover the same area as before.” The maxim ‘prevention is better than cure’ resonates well in the world of fire safety. Fires cause massive damage, and can even be responsible for grave injury or death. However, if a fire risk can be identified early enough, a fire can be successfully managed, or avoided altogether. Thermal technology can provide that extra bit of time that makes the difference between containment and disaster.  

Read More