securitylinkindia

MassMediaLink India LLP SecurityLink India

School Security Systems Industry US Market

School Security Systems Industry US Market Overview

With the growing number of schools in the United States with video surveillance, electronic access control and other traditional security systems, the number of potential “greenfield” projects for suppliers falls. Declining numbers of new security system installations will lead to slowing market growth over the next five years. Even so, security manufacturers are looking to implement the following new security technologies to improve school safety, which would also help reignite market growth: 1.     Facial recognition technology Many of the video surveillance systems currently used in schools are not actively monitored and also rarely lack any form of effective automated response. Adoption of facial recognition technology would allow the surveillance system to proactively search for potential threats, and alert school administrators and security staff about unrecognized individuals in the building. Unfortunately, affordable facial recognition technologies are often unable to adequately recognize the number of faces in a typical school; plus, these systems can place a large strain on a school’s information technology network. 2.     Logical and physical security identity management integration I ntegrating the school’s access control database with a higher authority logical database – for example, a student directory – would allow the access rights of former staff, and students who have been expelled or already graduated, to be removed automatically. However, access control providers may find it difficult to get permission to access student records and other sensitive data. Education administrators may also be uncomfortable with possibly creating a potential avenue of cyberattack. 3.     High-security classroom doors with multipoint looking systems Higher-grade doors would create a far more effective barrier between students and potential attackers, creating numerous safe spaces throughout the building in emergencies. It’s also true, though, that purchasing thousands of doors would be expensive. Fire regulations often dictate that key entrances and exits remain fail-safe during emergencies. Locking and unlocking doors multiple times would also disrupt teaching. 4.     Weapons checks using metal detectors or x-ray machines at school entrances Using metal detectors or x-ray machines at entrances along the school perimeter makes bringing weapons into the school much more difficult. However, schools often have multiple entrances, which means each school would require multiple detectors or x-ray machines – both of which are expensive. The school would also need to hire additional security staff to operate each machine. Securing entrances in this manner would also mean long queues would form after breaks and lunchtime, reducing the free time of students and staff. Access control intelligence service Entering its fourth full year, the IHS Markit Access Control Intelligence Service provides primary analysis of the equipment market, plus thorough investigation of key technology trends affecting the industry. Current topics of focus include mobile access, logical and physical identity management integration, adoption of biometric technology and security system convergence.

Read More

Verint®Systems New Line of Solutions for SMB Market

Verint®Systems Inc., the customer engagement company™, has announced its contact center workforce engagement offerings specifically designed for today’s small and medium-sized businesses (SMBs). Verint’s purpose-built SMB solutions provide a simple, modern approach to customer engagement, and rapid time to value. Because they are easy to implement, easy to use and easy to maintain, companies can cost-effectively heighten contact center workforce engagement, enhance service quality, optimize performance and meet compliance requirements. The new Verint SMB offerings are available in the cloud and on-premises, and include: Compliance recording: Captures, archives and retrieves interactions across channels – such as voice, including mobile, and instant message communications – and helps reduce risk to confidently meet strict compliance demands. In addition to traditional voice calls, the solution records customer interactions across unified communications platforms such as Microsoft Skype for Business and Cisco Jabber. Recording and quality management: Captures, replays and evaluates customer interactions across communications channels. Leveraging the technology, organizations can bring a focused approach to employee coaching and training. Workforce management: Simplifies forecasting and scheduling, while helping manage and reduce costs, advance workforce efficiencies and drive operational excellence. As employees expect the work environment to adapt to their personal lives, Verint solutions are helping businesses evolve with mobile apps and built-in support for flex scheduling and adherence. Workforce optimization: Combines recording, quality management and workforce management, bringing a holistic approach to ensuring the right employees with the right skills are available at the right time, supporting quality and compliance requirements, and sharing intelligence to improve workforce engagement and customer service operations. “Verint SMB offerings are changing how small and medium-sized businesses approach customer and workforce engagement,” says John Goodson, Senior Vice President and General Manager of products at Verint, “Our partners can easily integrate these offerings with other contact center solutions, providing customers maximum flexibility with low total cost of ownership.”

Read More

Oncam Unique Evolution 180 Range

Oncam has added the Evolution 180 product range to its portfolio, building upon the experience and heritage of the company’s 360-degree technology. The addition of the panoramic 180-degree camera range meets the needs of customers in a variety of markets that require a purpose-built wallmounted camera with Panoramic+ views from a single sensor. Environments that benefit from this unique view include education, hospitality, casinos, banking, retail and transportation, which demand monitoring large walkways, open spaces and corridors without blind spots. “Customer demand for a dedicated high-quality 180-degree technology was the driving force in the development of our latest product. They wanted a camera that was tailor-made for true panoramic views. Currently, 180-degree views in the market are created with a single sensor 360-degree camera in panorama mode, which isn’t an ideal approach as it doesn’t allow the use of the full width of the sensor,” said Jon Marsh, Vice President of Product, Oncam, “This is why we’ve created the Panoramic+ view, which dictated the design of the product putting more pixels on target than any other panoramic camera. This innovation further boosts the capabilities of our product portfolio and builds on the proven track record of top quality imagery from a single sensor for which Oncam is known. Furthermore, the Evolution 180 enables us to reach a greater segment of the marketplace that requires and demands full coverage from their surveillance solutions.” The Evolution 180 camera range is introduced with the Indoor model, available immediately in black or white, and a robust and attractive outdoor model, which will be available in April. The Evolution 180 range offers a 12MP sensor and a 6MP dewarped panoramic image with Oncam’s angle compensation technology which provides adaptive dewarping. It is a true day/ night camera which doesn’t require SDK dewarping as the Panoramic+ view is created natively in the camera. The solution is ONVIF Profile S compliant for added integration flexibility with the leading video management systems on the market today.

Read More

FICO Fintech 4finance Deploys AML and KYC Solution

4finance Group, Europe’s leading online and mobile consumer lender, has deployed FICO® TONBELLER® Siron® solutions for anti-money laundering (AML) and know your customer (KYC) compliance across 10 countries and 20 back-office systems in just nine months. The cloud-based FICO solutions are delivering audit-verified compliance with global and regional regulations while maintaining 4finance’s promise to issue customers a loan in 15 minutes. For these achievements, 4finance Group has won a 2017 FICO Decisions Award for Regulatory Compliance. “Working with FICO, we created an AML/ KYC framework that bolstered our compliance without compromising on speed and our promise to customers,” said Andis Grandāns, AML Officer at 4finance Group, “In fact, fewer than 0.5 percent of customers applying for their first loan feel any impact on the speed of their loan being disbursed. As proof of our success, we have already undergone a regulatory audit on our AML/ KYC processes and received a clean bill of health.” Speed to market 4finance Group is a global digital finance business that combines the discipline of a rigorous, highly regulated consumer lender with the capabilities and drive of a fast-paced, data-driven, borrower-focused fintech. It took on this project to ensure compliance with new requirements of the 4th European Union AML Directive in online consumer lending. “Our challenge was to find an AML compliance solution that was flexible in the way it could be integrated, but absolutely robust when it came to compliance capabilities,” said Grandāns, “Our speed to market and our ability to deliver funds to our customers quickly are fundamental to our business. We needed to ensure compliance in a way that did not compromise our brand promise of delivering fast funds to creditworthy people. We chose FICO TONBELLER because it offered us the fastest deployment, cloud for expansion to new markets, and the most powerful capabilities for detecting criminal activity.”

Read More

NIST Blockchain Technology Aims to Go Beyond the Hype

Beguiling, baffling or both – that’s blockchain. Aiming to clarify the subject for the benefit of companies and other organizations, the National Institute of Standards and Technology (NIST) has released a straightforward introduction to blockchain, which underpins Bitcoin and other digital currencies. Virtual barrels of digital ink are flowing in the media nowadays about these cryptocurrencies and the underlying blockchain technology that enables them. Much of the attention stems either from the giddy heights of value attained lately by the most well-known of these currencies, Bitcoin, or from the novelty of blockchain itself, which has been described (link is external) as the most disruptive technology since the internet. Blockchain’s proponents believe it lets individuals perform transactions safely without the costs or security risks that accompany the intermediaries that are required in conventional transactions. The NIST report’s authors hope it will be useful to businesses that want to make clear-eyed decisions about whether blockchain would be an asset to their products. “We want to help people understand how blockchains work so that they can appropriately and usefully apply them to technology problems,” said Dylan Yaga, a NIST Computer Scientist who is one of the report’s authors, “It’s an introduction to the things you should understand and think about if you want to use blockchain.” A blockchain is essentially a decentralized ledger that maintains transaction records on many computers simultaneously. Once a group, or block, of records is entered into the ledger, the block’s information is connected mathematically to other blocks, forming a chain of records. Because of this mathematical relationship, the information in a particular block cannot be altered without changing all subsequent blocks in the chain and creating a discrepancy that other record-keepers in the network would immediately notice. In this way, blockchain technology produces a dependable ledger without requiring record-keepers to know or trust one another, which eliminates the dangers that come with data being kept in a central location by a single owner. The blockchain idea has attracted enough supporters that there are now several hundred digital currencies on the market, and the companies that are investigating ways to employ blockchain number many more. Because the market is growing so rapidly, several stakeholders, customers and agencies asked NIST to create a straightforward description of blockchain so that newcomers to the marketplace could enter with the same knowledge about the technology. “Blockchain is a powerful new paradigm for business,” Yaga said, “People should use it, if it’s appropriate.” The question is when it is appropriate. As with any new tool, there can be a temptation to employ it purely for its novelty value. The report outlines some possible use cases, including banking, supply chain management and keeping track of insurance transactions. The report, Yaga said, was created partly to help IT managers make informed decisions about whether blockchain is the right tool for a given task. “In the corporate world, there’s always a push to adopt new technologies,” Yaga said, “Blockchain is today’s shiny new toy, and there’s a big push to adopt it because of that.” “We want to help people to see past the hype,” he said, “as lofty a goal as that is.” NIST has been tasked before with writing definitions of emerging concepts in information technology such as the definition of cloud computing it released in 2011. While Yaga describes the blockchain description as approachable – it’s “as high-level as I can write it,” he said – the document is longer than some other NIST definitions because the technology combines so many complex ideas. Among them are digital signatures, peer-to-peer networking and hash chains, all of which are tools common in cryptography and with which NIST has had extensive involvement. “We don’t have any axe to grind or product to sell, though,” Yaga said, “A lot of articles you’ll read online feature a disclaimer indicating that the author owns a certain amount of cryptocurrency or stock in a company. I have no vested interest in the monetary value of these networks. But we don’t pass judgment on the technology; we just want to get past the rumors.” To that end, Yaga said, the document began as a sort of FAQ addressing falsehoods the authors had come across such as the idea that there was no need for trust in the system. (“You do need trust,” he said, “just not a trusted third party, like a bank.”) It expanded to discuss the technical tools common to most blockchain-based systems and also explored related issues such as the high demands blockchain systems place on network resources. The roughly 60-page report might enlighten anyone who wants a picture of blockchain that is not skewed to any players’ interests, but Yaga said he and his co-authors hope it will give perspective to technical decision makers in particular. “A company’s IT managers need to be able to say, we understand this, and then be able to argue whether or not the company needs to use it based on that clear understanding,” he said, “Some people are saying you should use it everywhere for everything. We wrote with the perspective that you shouldn’t use it if it’s not necessary.”

Read More

Top Video Surveillance Trends for 2018 & Analyses

Demand for professional video surveillance cameras has been growing quickly and is forecast to continue growing in 2018. It is estimated that less than 10 million surveillance cameras were shipped globally in 2006, which grew to over 100 million in 2016, and is forecast to make over 130 million during 2018. Despite this increase in demand, the average price of cameras and other video surveillance equipment will continue to fall quickly. As a result, IHS Markit forecasts that in terms of US dollar revenues the world market for video surveillance equipment will grow at an annual rate of less than 6% in 2018. It will be challenging for vendors to continue to grow revenues and margins, but there will be opportunities for well-placed vendors. For example, both the South East Asian and Indian markets are forecast to grow at higher than average rates. There is also great potential for the next generation of products powered by technologies like deep learning and cloud computing. So, what will be the big stories during 2018? Deep learning, GDPR compliance and drone detection technologies are just some of the trends discussed in this eighth annual trends IHS white paper. The following articles are designed to provide some guidance on the top trends for 2018 in the video surveillance industry.     By Jon Cropley   The A to I of Video Surveillance Terminology The past 12 months have seen a range of new terms becoming regularly used in the video surveillance industry. We attempt to provide a brief summary of some of these. AI (artificial intelligence): Computers are able to perform specific tasks as well as, or even better than human intelligence. In the context of video surveillance, AI is used in the field of computer vision to classify visual images and patterns within them. Big data: Huge amounts of different information are  stored, organized and analyzed by computers to identify trends, patterns, and relationships. In the context of video surveillance, the data could be metadata describing hours of video surveillance footage combined with other data sources to highlight patterns relating to security or business operations. Cloud computing: Instead of using a local server to store or manage video surveillance data, use a network of internet-connected remote servers. Generally this network has the ability to provide additional resource if and when required from a larger available pool. The available resource may be clustered into a datacenter or network of datacenters. These may be private (entirely or partly owned for exclusive use by specific organization/s) or public (resource accessible to multiple separate users). Deep learning: A branch of machine learning and subset in the field of AI. Deep learning makes use of algorithms to structure high-level abstractions in data by processing multiple layers of information, emulating the workings of a human brain (a neural network). Edge computing/ storage: Performing data processing and analytics/ storage closest to the source of the data (normally, in this context, in a video surveillance camera). Face recognition: When a video surveillance system can automatically match a person’s face against a database of individuals. GPU (graphics processing unit): A programmable chip specialized for use in image processing. Due to the requirement to be able to simultaneously processing multiple large data blocks required in modern image processing, GPUs have been found to be highly suitable for deep learning/ neural network processing. H.265 (or MPEG-4 part 2): H.265 is a video compression codec standard approved by the International Telecommunications Union (ITU-T). Compared with H.264, H.265 has the potential to use 30-40% less bandwidth for a video stream of the same quality. IoT (Internet of things): IoT is not a specific device or technology – it is a conceptual framework, driven by the idea of embedding connectivity and intelligence in a wide range of devices. IHS Markit defines an IoT device as a device which has some form of embedded connectivity that allows the device to be directly connected to the internet (i.e., IP addressable), or allows the device to connect (tether) to an IP addressable device. In the context of video surveillance, this could be using video surveillance data with other sensors or sources of information.   Big Differences between the Chinese Market and the Rest of the World China is forecast to account for over 46% of global professional video surveillance equipment revenues in 2018. Despite this, the Chinese market has some unique characteristics that make it very different to other regional markets. This has led to the suggestion that there are two markets for video surveillance equipment – the Chinese market and the world market excluding China. Below are 5 ways in which the Chinese market differs from the rest of the world. Supply of equipment is more concentrated in China The two largest vendors of branded video surveillance equipment accounted for over 50% of the Chinese market in 2016. This compares to the world excluding China where the two largest vendors accounted for less than 20% of the market. Shipments of deep learning-enabled equipment are much higher in China It is forecast that three quarters of all deep learning-enabled servers for video surveillance shipped worldwide in 2018 will be shipped in China. Domestic vendors dominate supply of equipment in China Chinese vendors account for more than 80% of Chinese market revenues. There are other countries where domestic brands dominate supply (Germany, Japan and South Korea are all examples). However, in most other country markets, foreign vendors account for a much higher proportion of revenues. Shipments of HD CCTV are proportionally lower in China It is forecast that HD CCTV cameras will account for only around 10% of all cameras shipped in China in 2018. It is forecast they will account for over half of all camera shipments in the world excluding China. The market has been growing faster The Chinese market has grown at an average annual rate of 13.3% between 2012 and 2017. In comparison, the World market excluding China has grown at an average annual rate of…

Read More

Indian INCs Look at Investment in Security

2017 will undoubtedly be considered as the ‘Year of ransomware,’ the year when the global security landscape was forever changed by attacks like WannaCry and NotPetya. The havoc caused by these attacks reached far beyond the paltry ransom demand. Hospitals turned away patients, production lines came to a halt, nuclear radiation monitoring was disrupted, and so on. Cyber events like these were a wake-up call to the brave new world of cyberattacks and how they could reach further into the ‘real world’ than ever before. But it’s not just ransomware and the threat landscape that have changed; digital transformation initiatives like the move to the cloud and the increasing convergence of IT and operational technology (OT) have drastically changed networks and expanded responsibilities of security teams tasked with protecting them. These initiatives, for all their business benefits, have caused network complexity to skyrocket – an issue cyberattackers are all too eager to exploit. All the while, the labour force to safeguard against attacks remains stubbornly inadequate. As we head into 2018, here’s a look at the cybersecurity trends sure to emerge amid the intersection of the most capable threat landscape, the most complex networks and a worldwide – including India – skills shortage. Hybrid networks stretch attack surfaces The attack surface – the total sum of the ways an organization is susceptible to cyberattack – is like a balloon. It expands with the introduction of new attack vectors and attack targets, like extensions into virtual, cloud and operational technology environments. It contracts with the good cyber hygiene and risk reduction. The larger your attack surface, the more likely it is to pop. To control an attack surface that encompasses hybrid networks and that’s affected by a constantly evolving threat landscape, organizations will need to unify visibility and centralize management. Gaining seamless visibility across physical IT and OT networks, as well as virtual and cloud networks, will give them a holistic foundation on which to build a security program ready to address an agile threat landscape. While different technologies, processes and teams may be involved to secure various types of networks, attackers don’t pay attention to such divisions. If anything, they exploit these divisions in security management, and simply follow the path of least resistance to reach their intended target, no matter where the attack originates. In 2018, we’ll likely see attackers leverage hybrid network connectivity to infiltrate cloud and OT networks where traditional cybersecurity measures are still being fleshed out. Ongoing evolution of distributed attacks While NotPetya was originally dubbed a ransomware attack, seemingly a new iteration of WannaCry, it was pretty lousy at the ransom part. What it and WannaCry demonstrated, though, was the distributed attack model on which modern ransomware relies. It targets as many victims possible, looking for low – hanging fruit, so attacks can be carried out easily and automatically, maximizing the attacker’s ROI. Ransomware is a perfect fit for this model, in that any target can be extorted for payment. Now that the distributed attacks have proven global-reach capabilities, we’re sure to see more mass-scale attacks in 2018. The good news about the distributed attack model is that the cyber-criminals sell or share proven attack methods such as vulnerability exploits, to carry out distributed attacks. Again, this practice gives them a better ROI than developing new, native exploits or exploits for a specific target. It also means a relatively small number of vulnerabilities exploits are being used and reused. If vulnerability management programs can take a threat – centric approach and focus on this subset of vulnerabilities, they’ll have a greater impact on their organization’s security than if they targeted only CVSS critical vulnerabilities. Security goes automated out of necessity As mentioned earlier, networks are growing increasingly complex, meaning that IT security teams must contend with growing amounts of data that needs to be contextualized, analyzed and acted upon. At the same time, the industry is suffering from a worrying talent shortage, which means that there are fewer skilled workers available to manage these issues. This is creating an environment where attack vectors abound, increasing the organization’s risk of attack. As a result, in 2018 we expect to see a surge in the adoption of automated solutions, particularly for integrated analytical workflows. These can deliver actionable intelligence to security practitioners of what to focus on – such as vulnerabilities posing an imminent threat – what tools are at their disposal to take action, and tracking the workflow to ensure tasks are carried out to completion. The scales tip to the Cloud At present, most firms are in a transition phase, with networks made up of a hybrid of physical, virtual and multi-cloud environments. 2018 is set to be the tipping point, as corporate networks become predominantly or entirely virtual or cloud-based. Organizations will need to be sure they understand and can support the shared responsibility model of the cloud, in that the cloud service provider is responsible for security of the cloud while the organization is responsible for security in the cloud. The assumption that cloud networks are inherently secure needs to be overcome, and security teams need to have the means to understand how traffic moves into, out of and within cloud networks to put the proper security controls in place. The importance of automation, as mentioned above, becomes even more important in cloud-networks. The elasticity of clouds makes their security management too much to handle via manual processes. If organizations are aiming for a complete move to the cloud, they need to ensure that security programs are poised to support the approach. Increased attacks on operational technology The convergence of IT and OT networks presents several advantages in terms of productivity, ease of management and cost-effectiveness. But it has also introduced new cyber risks to critical infrastructure organizations such as utilities, energy producers and manufacturers that could have very real impacts on uptime, human safety and the environment. Because of the havoc that can be caused, OT networks have become an attractive…

Read More

Arecont Vision AV NVR™ for Small to Medium Sized Projects

Arecont Vision® announces the availability of the AV NVR™ all-in-one network video recorder series. “Customers have increasingly requested that Arecont Vision provide them with a NVR platform for their small to mid-sized project requirements,” said Brad Donaldson, Vice President of Product Development, Arecont Vision, “The new AV NVR will address those specific needs, while our ongoing integration with the industry’s leading hardware and software providers will continue for customer projects of all sizes.”     The AV NVR offers the choice of 8 or 16 channel models (one channel = one camera sensor), each with built in PoE network switch, customer-replaceable hard drives, and Arecont Vision GUI interface. Smart plug-and-play technology simplifies setup with both auto discover and auto configuration. Camera licenses are included for a complete all-in-one solution. A free mobile app is available for remote viewing and playback. A power status utility and instant playback capability round out the AV NVR series capabilities. Both the AV NVR AV800 and AV1600 models offer H.264, H.265, and MJPEG compression. Arecont Vision SNAPstream™ (Smart Noise Adaptation and Processing) technology reduces bandwidth without impacting image quality. The 8 channel AV800 model offers up to 10MP resolution recording per sensor, including 4K resolution and 40MP panoramic cameras. The AV1600 offers 16 channels and up to 5MP resolution recording per sensor. For maximum video recording reliability, WD Purple Surveillance Hard Drives from Western Digital are included in with-drive configurations. No-drive configurations are available for customers wishing to install their own hard disk drives within Arecont Vision recommendations. The AV1600 could be configured up to 16 channels in the same manner, using a variety of Arecont Vision camera choices. Designed for use with Arecont Vision-brand single and multi-sensor cameras, ONVIF type S cameras are also supported.  

Read More

Hikvision: Deep Learning in Smart Retail Solution

In this ever-expanding era of artificial intelligence (AI), Deep Learning will soon become the foundational technology for the security industry. Technologies that ‘learn’ will become more common and more powerful. This trend will strengthen critical security efforts in every sphere. Hikvision introduces three camera models equipped with deep learning algorithms in the smart retail industry. With the growing popularity of shopping online, the retail sector has felt the disruptive impact of Internet e-commerce more than most industries. Some have reacted to online competition by closing physical stores, but others are attempting to overcome challenges through technological transformation. Traditional retail lacks intelligent tools for accurate data collection and visualization, making it unable to provide a basis for business decision-making at the shop. People counting There is an old saying in the trade industry – ‘Small profits but quick turnover;’ and footfall is a ‘KPI’ – key profit indicator – that helps make that turnover. Compared to e-commerce, traditional offline retail stores lack the capabilities to accurately calculate customer flow. Hikvision’s dual-lens people-counting camera provides accurate customer counting and generates customer flow trends to evaluate performance and strategic initiatives. Although in a real-world scenario, shadows or other objects may easily cause miscounts, but the dual-lens people-counting camera, equipped with two cameras and powered by a deep learning algorithm, easily overcomes such interferences and delivers highly accurate data. A key advantage of deep learning algorithms over surveillance cameras’ vision algorithms is that deep learning can be continuously trained and improved with better and more data-sets. This means the longer it works, smarter it gets. Featuring binocular stereo vision, 3D people detection, and height filtering technologies, the dual-lens people-counting camera is able to accurately distinguish human beings from non-human objects, and movements in the background. By analyzing customer flow data, store management can optimise the allocation of the workforce to ensure better customer service and reach higher profits. Store managers can schedule staff strategically for peak and off-peak hours. Furthermore, they can also develop strategic marketing activities to attract customers by analyzing the data of incoming rates (entering vs. passing by). Heat mapping When customers enter the store, retailers are concerned to know about what merchandise customers are interested in. Before that, what’s more important is how to get the route they walk through and where they stop. With Hikvision’s Heat Mapping function, retailers can determine the amount of time shoppers spend in specific areas of a store, identify hot spots and dead zones, and measure the number of people who actually shop for specific products, rather than just casually walk by. Heat mapping is used to monitor and measure the size of target traffic in a region. It is a graphical representation of data represented by colors, and it is usually used to analyze the visit times and dwell times of customers in a specified area. The heat mapping function is often used in shopping malls, supermarkets, museums etc., that can find customers’ preferences over time through heat maps, offering insight how to best place items and design the store layout. As a representative product, Hikvision’s fisheye cameras, equipped with heat mapping function, not only capture a panoramic high-definition image but also learn about heat conditions in different regions within a store. In spacious areas, fewer cameras means reduced installation and labour fees. Hikvision’s  fisheye cameras are ideal for these areas, maximising monitoring views and image quality insurance. Queue detection What do you do if you always have to queue for a long time while shopping? Keep waiting, or give up shopping and avoid that store in the future. In the retail industry, waiting time is one of the most important factors affecting the customer experience. Hikvision’s Queue Detection function can help retailers manage checkout lines. When too many customers enter a queue, it can notify management to open a new checkout line. More specifically, Hikvision’ queue detection cameras can monitor the queuing situation in real-time. Firstly, cameras count the number of people in each queue and then track the dwell time of each customer. Once it is found that the number of people in a queue is too many, or the average dwell time of customers is too long, an alarm is triggered to prompt a response. Store management is reminded to open checkout windows to reduce waiting times, improving transaction efficiency and the entire shopping experience. Hikvision smart retail solution is designed to help retailers bring offline stores into a digital world, allowing data to support management and operations. It promotes retailers’ technological transformation in response to increased industry competition through the use of innovative retail technology. Ashish P. Dhakan – MD & CEO, Prama Hikvision    

Read More
Two-Wire Video Intercom securityLink india

Hikvision Launches Two-Wire Video Intercom

Hikvision, the world’s leading supplier of innovative video surveillance products and solutions, has launched a new two-wire design video intercom. With a healthy list of features, this video intercom system provides the latest in residential security with high-definition imaging and convenient installation for the consumer market. Hikvision’s advanced two-wire video intercom includes both indoor and outdoor video intercom stations along with a distributor. When replacing outdated or non-functioning equipment, this hi-tech visual communication system uses existing wiring for simple, speedy, and economic installation. This advanced design features vivid video synchronization signals and exceeds power and audio transmission expectations. Whether replacing an aging system or simply installing a new one, Hikvision’s two-wire video intercom brings harmony and high video quality to consumer contexts. Users will enjoy in-home security with the latest features such as: 2 MP fisheye cameras with excellent night imaging and self-adapting IR light supplement. Noise suppression & echo cancellation for optimum voice audio. The mobile Hik-Connect App to  identify visitors and even unlock doors when away from home. “Hikvision is continuously looking for innovative ways to develop our products and solutions for better user experience. Apart from the professional video surveillance industry, Hikvision has also been committed to providing more services and technologies for end-users in community and home security,” said Keen Yao, VP of Hikvision’s International Business Centre.  

Read More