securitylinkindia

MassMediaLink India LLP SecurityLink India

puneet_bhasin

Role of Data Protection Officer (DPO) under General Data Protection Regulation (GDPR)

After four years of preparation and debate the General Data Protection Regulation (GDPR) was finally approved by the EU Parliament on 14 April 2016. The Regulation was adopted and published on 27 April 2016 and will be enforceable on and from 25 May 2018. The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU) whilst addressing the export of personal data outside the EU. It regulates the EU citizen data in every part of the world and in every organization processing or storing an EU Citizen’s data. The EU GDPR replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. This new law will have a profound impact on the operational and control environment of the organisations, not only within EU but also within the organisations based outside the EU including India. It extends the scope of EU data protection law to all foreign companies processing data of EU residents. It provides for a harmonization of the data protection regulations throughout the EU, thereby making it easier for non-European companies to comply with these regulations. However, in some areas, the precise interpretation of the GDPR remains unclear, and businesses therefore face uncertainty in terms of their compliance obligations. To address this issue, the GDPR is supplemented by guidance issued by the Article 29 Working Party (WP29), an advisory body made up of representatives of the national Data Protection Authorities of each EU Member State. Provision for Data Protection Officer (DPO) The GDPR has a mandatory provision for the appointment of Data Protection Officer by pertinent organisations. The role of Data Protection Officer (DPO) is an important GDPR innovation and a cornerstone of the GDPR’s accountability-based compliance framework. In addition to supporting an organisation’s compliance with the GDPR, DPOs will have an essential role in acting as intermediaries between relevant stakeholders e.g., supervisory authorities, data subjects and business units within an organisation. All organisations who will be required by the GDPR to appoint a DPO should do this as soon as possible and well in advance of May 2018. With the authority to carry out their critical function, the Data Protection Officer will be of pivotal importance to an organisation’s preparations for the GDPR and meeting the accountability obligations. A DPO may be a member of staff at the appropriate level with the appropriate training, however, GDPR also provides for an option of an external DPO who will be shared by a group of organisations. It is important to note that DPOs are not personally responsible where an organisation does not comply with the provisions of GDPR. The GDPR makes it clear that it is the Controller or the Processor of the organisation who is required to ensure and to be able to demonstrate that the processing is in accordance with the GDPR. Data protection compliance is ultimately the responsibility of the Controller or the Processor. Who needs a DPO For the first time Data Controllers as well as Data Processors are required to appoint a Data Protection Officer in three situations as per Article 37(1) of the GDPR. Where the processing is carried out by a public authority or body Any organisation that is a public authority or a public body must appoint a DPO. However, the GDPR does not define the expression ‘public authority or body.” Rather, the GDPR leaves it to each EU Member State to determine which organisations are public authorities and public bodies. Where a private business performs outsourced public functions on behalf of a public authority or a public body, the WP29 recommends that such business should appoint a DPO, not merely in relation to those outsourced public functions, but also in relation to all of the other data processing activities of that business, including processing activities that are unrelated to the outsourced public functions. Where the core activities of the Controller or the Processor comprise processing operations, which require regular and systematic monitoring of data subjects on a large scale Under this provision companies whose primary activities involve processing personal data on a large scale for the purposes of behavioural advertising, online tracking, fraud prevention, detection of money laundering, administering loyalty programs, running CCTV systems, monitoring smart meters etc., will be caught by the DPO requirement. Core activities can be defined as the key operations necessary to achieve an organisation’s (Controller or Processor’s) goals. For example, a private security company which carries out surveillance of private shopping centres and/ or public spaces using CCTV would be required to appoint a DPO as surveillance is a core activity of the company. On the other hand, it would not be mandatory to appoint a DPO where an organisation undertakes activities such as payroll and IT support, as while these involve the processing of personal data, they are considered ancillary rather than core activities. Where the core activities of the Controller or the Processor consist of processing on a large scale of special categories of data or personal data relating to criminal convictions and offences Article 37(1)(b) and (c) requires that the processing of personal data be carried out on a large scale in order for the designation of a DPO to be triggered. Article 37(1)(c) addresses the processing of special categories of data pursuant to Article 9, and personal data relating to criminal convictions and offences set out in in Article 10. Qualifications Article 37(5) of the GDPR provides that a Data Protection Officer shall be designated on the basis of professional qualities, and in particular, expert knowledge of data protection law and practices, and the ability to fulfil the tasks referred to in Article 39. “It is important to note that DPOs are not personally…

Read More

The Proxim Advantage Video Security via Wireless

Video security requirements With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks  High capacity – up to 25 Mbps per cameras.  Reliable video communications – the network must have high availability (as much as 99.999%) and be secure.  Mobility. Water- and dust-proof (IP67-rated).  Wide operating temperature range -40° to 55°C. Video security requirements for the cameras Complex and constantly changing lighting. Complex picture composition, backlighting. Large area overview. High level of detail needed. Vibration. Clear images of rapidly moving objects and persons. When it comes to throughput or capacity requirements, these can vary a great deal based on resolution, frame rate and even the device being used to view the video streams. In this case the device is typically a large monitor in a central location. Table below gives some idea of capacity per camera requirements. From the table it can be seen that to provide an HD video stream at 720p, a common resolution, the network must support at least 2Mbps and ideally 8Mbps. When this is multiplied out it can be seen that a good security camera will require on the order 700Gb per day. Wireless video security and Proxim When looking at each of the wireless network requirements, it is clear that the Proxim Wireless Tsunami® product line delivers on all of these, and does so with features and functionality that meet and exceed the needs described here. 1 || 2 || 3 || 4 || NEXT-> || ALL

Read More

The Proxim Advantage Video Security via Wireless

Over the years there have been two distinct trends that have combined to boost the video surveillance or monitoring market evermore into the forefront of discussions. The first has been the rise in terrorism, vandalism, refugee populations crossing borders and additional global turmoil. The second trend has been the advancement in video camera technology – from analog NTSC or PAL standard definition video formats to IP based cameras supporting full frame rate (30fps) 1080p HD video. The technology behind video security has progressed significantly in the last 10 years. With these new resolutions has come advanced technology, functions that were not possible before or were only available off a server in the central monitoring station are now done routinely, often in the cameras themselves. This refers to features such as facial recognition, automatic license plate readers, automatic red light cameras and more. What all these new smart, HD video cameras need is connectivity. Most of these applications require outdoor cameras While all these applications may seem to be unique, there are a few things all of them have in common. First, these deployments and features require good to excellent video definition quality. Standard definition is no longer acceptable, and running at 10 frames per second vs. a full rate of 30fps, is not acceptable. Second, almost universally these applications will have a high percentage of cameras being deployed outdoors, where the environment is harsh, units are unguarded and connectivity is seldom available. For video security the camera needs to be placed where it can perform it’s desired function, and not where there is a convenient fiber or Ethernet cable handy. Having a fiber strand within 10 feet of the desired location of a camera is not much better than being a mile away. It still requires permits, right of way negotiations and some level of digging. Market With all of these factors combined, the wireless video surveillance market is forecasted to reach $1 Billion in 2019. These numbers do not address the latest shifts in the video security market being driven by orthogonal applications. For example, cities deploying intelligent traffic systems use wireless to connect signaling lights in intersections. In many cases the decision is made to add a camera to the deployment, using the wireless network to support both the signaling traffics as well as the video traffic. When carriers or municipalities decide to deploy public Wi-Fi or hot spots, increasingly the request is bundled with a desire for adding a video camera to the hot spots deployment.   Video security requirements With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks  High capacity – up to 25 Mbps per cameras.  Reliable video communications – the network must have high availability (as much as 99.999%) and be secure.  Mobility. Water- and dust-proof (IP67-rated).  Wide operating temperature range -40° to 55°C. Video security requirements for the cameras Complex and constantly changing lighting. Complex picture composition, backlighting. Large area overview. High level of detail needed. Vibration. Clear images of rapidly moving objects and persons. When it comes to throughput or capacity requirements, these can vary a great deal based on resolution, frame rate and even the device being used to view the video streams. In this case the device is typically a large monitor in a central location. Table below gives some idea of capacity per camera requirements. From the table it can be seen that to provide an HD video stream at 720p, a common resolution, the network must support at least 2Mbps and ideally 8Mbps. When this is multiplied out it can be seen that a good security camera will require on the order 700Gb per day. Wireless video security and Proxim When looking at each of the wireless network requirements, it is clear that the Proxim Wireless Tsunami® product line delivers on all of these, and does so with features and functionality that meet and exceed the needs described here. High capacity With a typical security camera consuming up to 8 Mbps, to be effective the wireless network will likely be supporting more than one camera per network. Proxim offers a variety of Tsunami® products that support 10Mbps, 25Mbps, 50Mbps, 100Mbps, 240Mbps up to 633Mbps of useable bandwidth. Reliable video communications There are three main factors to reliable video communications: The network must have high availability (as much as 99.999%) The Tsunami® product line of outdoor wireless networking systems offer a full two year warranty. Proxim has customers who have deployed radios from ten years ago, have never been touched, and are operating today. With an field determined MTBF of well over 1 million hours for some product lines, up to over 2 million hours of MTBF for others, this equates to 1.5 to 3 seconds outage per year. The network must ensure the quality of the video stream in the face of radio frequency impairments or other traffic being carried on that wireless link In this application poor image quality is absolutely not allowed. It is no exaggeration to state that in many deployments lives are at stake, and the video system and in particular the network must be top quality. From a radio frequency performance perspective, Proxim builds into every unit it’s suite of interference mitigation technologies known as Proxim ClearConnect™ ensuring reliable wireless connectivity. While basic…

Read More

Arecont Vision® UltraHD Dome and Box Cameras with Tri-Mode Capability

Arecont Vision® has recently released the newest members of the feature-rich MegaDome® and MegaVideo® mega camera family. “Arecont Vision already offers our popular 4K MegaVideo® box and MegaDome indoor-outdoor dome cameras in our extensive Mega camera family. The UltraHD brings a new dimension with Tri-Mode technology,” explained Brad Donaldson, Vice President of Product Development, Arecont Vision, “The MegaDome and MegaVideo UltraHD cameras offer the user their choice of 12MP at 20fps (frames per second) for maximum resolution and image clarity, 4K at 30fps with 8MP high definition image quality for high speed requirements, or 1080p at 60fps for maximum frame rate with great image quality.” The true day/ night indoor/ outdoor MegaDome UltraHD dome camera includes a motorized remote focus/ zoom 4.4- 10mm P-Iris lens mounted in a 3-axis gimbal for rapid installation and setup. The MegaVideo UltraHD box camera includes a remote focus/ zoom connector with a range of available Arecont Vision lenses to choose from. The installer-friendly, IP66 environmental-rated and IK-10 impact-resistant housing of the MegaDome UltraHD encloses integrated IR LEDs with adjustable beam angle and LED intensity. Both the MegaDome and MegaVideo UltraHD cameras feature SDHC onboard storage card slot and mechanical IR cut filter. Wide dynamic range (WDR), NightView™ low light technology, SNAPstream™ (Smart Noise Adaptation and Processing) technology for reduced bandwidth without impacting image quality, and dual encoder H.264/MJPEG capabilities are built in as with other members of the MegaDome and MegaVideo series. Other features include privacy mask, motion detection, flexible cropping, bit rate control, multi-streaming, multicasting, forensic viewing, and non-integer scaling. The MegaDome and MegaVideo UltraHD cameras also offer full support for network protocols for enhanced security and management including SNMP, HTTPS, 802.1x, IPv4, and DHCP. Power requirements are met entirely via PoE (Power over Ethernet) or optionally via 12-24V DC. At the heart of all Arecont Vision Mega family cameras is the in-house developed Massively Parallel Image Processing (MPIP) architecture, leveraging a built-in FPGA (Field Programmable Gate Array) integrated circuit. The architecture enables Arecont Vision Mega cameras to be field upgraded with new advanced features and capabilities as they become available, while providing unmatched cybersecurity capabilities. All Arecont Vision Mega family cameras are integrated and tested with the industry’s leading VMS, video analytics, networking, storage, and other software and hardware through the company’s Technology Partner Program™ and subsidiary MegaLab™ technology center.

Read More
IMG_0437

Milind Borkar Honored with Life Time Achievement Award

Milind Borkar, Vice President – India, Middle East & Africa – Infinova Group, has recently been honoured with the ‘Life Time Achievement Award’ at Secona Sheild Awards during Secutech India 2018 at Mumbai for his excellence in surveillance and security sector in India, Middle East and Africa across multiple industries with his prowess and efficiency. Under his esteemed 16-year leadership at Infinova Group, he has set benchmarks by building up a successful team right from the grassroot level. With his fortitude and hard work, he has enriched customer profile as well as credential base of Infinova across regions. Infinova is honored with excellence and credence while successfully dealing in several major critical infrastructure projects such as city surveillance, airports, seaports, defence, metros and railway stations. One of his biggest achievement has been to close the deal for World’s 1st face recognition project at Dubai Airport, worth an order value of USD 1.2 Million, way back during 1992 with a US based FR technology company Viisage Technology, Inc. This was spun out of MIT labs in Boston. So far, the largest project of a single value handled by Mr. Borkar is USD 20 Million. Today Infinova is leading globally by scaling heights of innovation and creating integrated surveillance solutions under the honorable leadership of Mr. Borkar. At the same time, it is truly commendable that someone from Indian Nationality, like Mr. Borkar, has achieved such a great recognition in the Security Industry internationally.  

Read More
India_Swiss_Flag

Securiton Safeguarding the Swiss Consulate in Mumbai

The Swiss Confederation has long been represented in the Indian metropolis of Mumbai. The first Swiss consulate opened in 1915, at a time when this important financial and business hub was still called Bombay. To bring the premises up to date, they were subjected to a complete renovation last year. The building now houses the Consulate General alongside the offices of Swiss Business Hub India and Switzerland Tourism. Security Securiton-style The Swiss Federal Office for Buildings and Logistics, which is responsible for the country’s missions around the world, works only with certified providers for its security installations. Securiton’s efficient solution also came with a compelling price tag. Securiton won the contract on the basis of its end-to-end solution, which included an intrusion alarm system, video monitoring, and integrated rescue route technology. Switzerland’s consulate general in Mumbai has everything under control thanks to Securiton’s proven IP-based SecuriSafe intrusion alarm system and IPS VideoManager video security system.

Read More
oncam

Technologies Assists in Modernization of Police Forces including in India

Keeping knowledge and information safe is more important than ever. The way the security industry works has changed significantly over the last decade. There are a number of emerging concerns like crime, theft, murder risks etc., that need to be addressed in order to remain efficient and secure. However, as the market evolves and the threat becomes more complicated, 100% security should be ensured. Identification of emerging technologies orientation of work on new technologies should be encouraged so that the police forces can be equipped with the best and are capable to resist any threat. Here are few companies which are helping police forces with different technologies: Oncam 180 degree camera product range: 180-degree camera range meets the needs of customers in a variety of markets that require a purposebuilt wall mounted camera with panoramic+ views from a single sensor. Environments that benefit from this unique view include education, hospitality, casinos, banking, retail and transportation, which demand monitoring of large walkways, open spaces and corridors without blind spots. Staqu AI powered smart glass for personal security: The smart glass is capable for both, speech and image recognition, and thus, it can be used to identify potential threats to the civil society such as criminals, intruders or terrorists, lurking around or amidst us. The smart glass has an in-built camera which captures input to trigger facial recognition. Once the face is identified from within the given databases, the smart glass projects the results on the glass screen. The entire process happens in real-time as the user simply glances over the vicinity. Even in wild scenarios, the Smart Glass by Staqu firstof-its-kind technology fuses together speech and image recognition to utilize a hybrid identification technology and uniquely identify anyone. H Robotics: H Robotics have developed smart policing robot. The ‘Robocop’ will help police handle law and order. The robot can file complaints, detects bombs and answers queries. He is named after 26/11 Indian martyr Hemant Karkare. It is designed to protect private and public areas like malls, offices, airports etc. It can also be used as an assistant in database handling, surveillance, and space security.

Read More
video-management-software-and-third-party-system-integration

Integration of VMS with Third-party Systems to Improve Business Operations & ROI

Video management software has become an indispensable part of security and surveillance applications. With the advent of cloud-based video surveillance, the power of VMS cannot be limited to just video monitoring. The new age VMS systems with intelligent video analytics are capable of offering much more than surveillance. The cloud-based VMS systems not only fulfill comprehensive surveillance needs of the businesses, but also complement other business processes, which may directly or indirectly reflect into the business ROI. Whether it is a new VMS installation or upgradation of an existing VMS system, enterprises (considering their business processes to be more interactive, connected and integrated) prefer their on premise or remote business systems to be integrated with the cloud-based Video management software. Since every business and its processes are different, the video surveillance needs of the enterprises also vary from each other. With the availability of flexible and customized video surveillance and analytics services, enterprises find it challenging to pick suitable thirdparty systems and apps to support their preferred VMS system. Therefore, most of the enterprises are shifting towards Video Surveillance-as-a-Service with their system integrators or VMS service providers. Most of the VMS service providers and system integrators are offering an open source or vendor independent cloud-based video management software to their clients for the obvious reason of making VMS compatible with third-party systems and applications. Why do third-party systems need to be compatible with video management software The third-party systems in VMS can be defined as any of the systems, applications or devices used to support and enhance the functionality of a video management software in order to improve the security and business processes of an enterprise. There are hundreds of companies manufacturing security and surveillance devices (like IP cameras, NVRs, Audio Devices, GPS systems etc.), but all the available devices are not necessarily compatible with the video management software preferred by the companies. Therefore, it is very important for VMS service providers or system integrators to check the compatibility of the surveillance software with the available thirdparty devices required for the project. Types of third-party systems and applications for VMS solution Third-party systems for a video management software are either physical devices installed at the surveillance location and office premises or widgets/ applications embedded in a video management software to enable intelligent video analytics. These systems and applications can be classified into two major categories; one as the systems for security and surveillance, and other as the system for supporting and enhancing business processes. Let us discuss them in detail. Security and surveillance systems Most of the third party systems and applications for security and surveillance are common across industries and are necessarily required to be part of a video management software. IP cameras An IP camera is a primary and mandatory requirement of any VMS system. A cloud-based video management software should support all types of IP cameras (Wired and Wireless cameras, PTZ, 360 degree, night vision, autofocus cameras etc.) from the major players/ manufacturers of the industry. VMS systems for customized surveillance projects must support IP cameras with open standards-based application programming interface (API), which allows system integrators to program the cameras for specific applications. IP surveillance cameras for video surveillance software must support multiple video streams and video compressions (H.264, MJEPEG) to send the video data with low latency. ONVIF support of the IP cameras with VMS systems can be an added advantage for the surveillance project. Access control devices Access control devices integrated with video management software provide physical security to any place or premise secured by the system. Integration of VMS with access control devices allows users to monitor, control and analyze multiple access points in real time, track the number of times access granted by the devices and react immediately in case of any event is triggered. Video surveillance along with access control helps in intrusion management, biometric attendance management and identity management. Fire and smoke detectors Fire and smoke detectors are the devices, which essentially need to be integrated with the VMS system of an enterprise. Large sized enterprises can have a large number of smoke detectors, which in case of fire, trigger the fire alarms of the building. An integrated fire alarm system with VMS allows a user to quickly identify and view the location of the fire alert. A quick response to such an emergency can help in saving lives and business assets. Video analytics for security & surveillance Video analytics in a VMS solution are a result of the structured algorithm of the software and many times inbuilt functionality of the devices connected to the VMS system. Video analytics for security and surveillance can be motion detection to prevent unauthorized access in restricted areas, perimeter protection to protect the virtual/ physical boundary within the enterprise, object detection, face recognition, people counting etc. A well-connected video management software with other surveillance and business-related devices can allow users to have complete control over business processes with security solutions and helps in improving the customer’s experience with the enterprise. Third party systems supporting business processes Cloud-based video management software is a well-accepted solution for security and surveillance across industries. Moreover, its structure of assimilating the functionalities of other business supporting systems enhances its business management capacity, incredibly. It empowers its administrators to have an inclusive approach to managing their business processes optimally without compromising on safety and security. Let us discuss the third party systems (used in different industries) that can be integrated with a VMS solution to enhance the business processes. Retail Third party systems and applications of a retail video management software are helpful for both employees of the retail stores and the customers visiting the stores. Here are some of the important systems to be integrated with retail video management software: Point of sale (POS systems): Integration of VMS with POS of any retail store can help in checking the fraudulent activities done by shoplifters or employees in a retail store. At POS, a customer pays for the shopped products,…

Read More

The Proxim Advantage Video Security via Wireless

Wide operating temperature range Security is not just a concern in temperate climates. The Middle East with day time temperatures reaching 50°C, and other areas such as Russia or Canada going as low as -40 degrees C, the wireless network has to be able to survive these brutal temperature ranges. Tsunami® products are rated for -40 to +60 degrees C operation. For those environments that are more temperate there are version of Tsunami® that support -30 to 55°C temperature ranges. Beyond these core, fundamental requirements for any wireless network carrying mission critical video traffic Proxim offers additional support. Small form factor Video camera deployments are meant in most cases to be unobtrusive, able to blend into existing surroundings. The Tsunami® 800 series of products offer a unit that is only 4.96×8.62×2.58 in (126×219 x 65.5 mm) in dimensions, and includes an integrated antenna to limit the overall subscriber unit profile. PoE out Given that for every subscriber unit there will be a camera attached, Proxim offers a second PoE port on the subscriber units that can deliver up to 25 watts of power to third party devices such as video cameras. This feature means deploying the camera does not require additional cable runs, the camera is plugged into the Tsunami® unit for both power and connectivity. Wireless video case studies Proxim has been delivering to customers high end, carrier class Tsunami® systems for many years. Video security has always been a major application for the Tsunami® line given how it meets and exceeds the demanding feature a specification set required by the video security application. A select group of typical deployments are described here. Dubai Investment Park Spread over 2300 hectares, Dubai Investments Park required a high-speed, cost-effective network to enable video security for intrusion detection and monitoring purposes. Over 40HD closed-circuit television (CCTV) cameras, 6 fixed ALPR cameras and automatic license plate recognition were deployed. The Proxim Tsunami® MP-8200 solution was installed across the residential zone of the park aggregating live feeds to a central monitoring station. The result: The video surveillance network covers over 25% of the entire park area and required 15 days to perform the whole installation. Allentown PA As part of the city’s re-vitalization project, Allentown, PA – USA deployed security cameras to capture license plates at significant distances at night as well as monitor critical locations around the clock. The video solution they chose used high definition PTZ cameras requiring 4Mbps of continuous bandwidth per camera. The local integrator, Communication Systems Inc (CSi), installed more than 300 Sony cameras, 175 of which are connected using wireless. Tsunami® was used as the wireless network component for Allentown. The result: The citywide surveillance network helped reduce crime by 20%. Statue of Liberty When Hurricane Sandy hit the greater Metro New York area, one of the areas hardest hit was the island in the middle of the harbor with the Statue of Liberty. As part of the renovation following the devastation, the Statue surveillance and security system needed to migrate from analog CCTV to the latest in digital video technology. The Park decided to deploy 160 IP cameras with HD resolution. The cameras had the ability to operate in extreme low light, with an undistorted 200 degree FOV and operated at 6 megapixel resolution. The result: The entire park/ island is now covered with HD video surveillance using Proxim Tsunami® radios as the network backbone. Tenerife Spain tram In Tenerife Spain they have a tram used for local mass transportation. The requirement was to provide complete CCTV coverage at speeds up to 100Km/h along 80Km of winding track which goes through the city and through tunnels. Proxim Tsunami® BSUs were deployed along the track in the proper locations and multiple SU’s were deployed in each train to backhaul each camera and provide 4Mbps of continuous connectivity. The result: The Tenerife Tram surveillance solution team was able to effortlessly and quickly deploy the surveillance cameras on board the moving trams and backhaul the video traffic using Proxim’s wireless mobility solution. The resultant network cost-effectively delivered connectivity along the track and within the tram, with the entire network being managed with Proxim’s ProximVision Advanced system. Summary Video security is increasingly becoming a fact of life. Places like downtown London have 100% coverage and many cities such as New York are moving in that direction. It is clear that to protect and monitor public domains such as sidewalks, parks, transportation systems, and the like, a wireless network will be part of the solution. Of critical import in selecting the mission-critical wireless network system, are the abilities of the system to survive the harsh environment both physical and radio frequency, provide guaranteed QoS via WORP® over a secured connection, and be able to deliver high bandwidth connectivity not just to light poles but on moving platforms as well. Proxim’s FastConnect™ is the best and possibly the only cost effective QoS assured mobility solution available. For a mission critical applications such as video security, when performance matters Proxim delivers. 1 || 2 || 3 || 4 || NEXT-> || ALL  

Read More

MATRIX Latest Surveillance Campaign

The recent Matrix video surveillance ad campaign in the Times of India saw how outdated CCTV reduces security to monkey business and how Matrix smart video surveillance solutions enhance security strategy and business productivity. Along with its 3-dimensional security – proficient, persistent and preventive – Matrix offers analytics driven cognitive video surveillance. Matrix SATATYA, a family of video surveillance solutions is specifically engineered for large organizations to address their enterprise grade applications. The solution includes an enterprise video management software, network video recorders and IP cameras. Considering the need of today’s globalized organizations, the entire Matrix solution focuses on four major aspects which are preventive security, centralized control with ease of management, storage space optimization and efficient bandwidth utilization. Moreover, Matrix solutions can seamlessly integrate multiple locations to provide centralized management. Matrix provides solutions that grow with the business. Its software powered video surveillance system gives the scalability that every enterprise needs while expanding its footprints across the globe, and the best part is that all these solutions are designed and manufactured in India. Matrix community includes many progressive organizations such as Schneider, Tata Motors, Samsung, GE, Airport Authority, Indian Railways etc.

Read More