securitylinkindia

The Proxim Advantage Video Security via Wireless

Video security requirements With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks  High capacity – up to 25 Mbps per cameras.  Reliable video communications – the network must have high availability (as much as 99.999%) and be secure.  Mobility. Water- and dust-proof (IP67-rated).  Wide operating temperature range -40° to 55°C. Video security requirements for the cameras Complex and constantly changing lighting. Complex picture composition, backlighting. Large area overview. High level of detail needed. Vibration. Clear images of rapidly moving objects and persons. When it comes to throughput or capacity requirements, these can vary a great deal based on resolution, frame rate and even the device being used to view the video streams. In this case the device is typically a large monitor in a central location. Table below gives some idea of capacity per camera requirements. From the table it can be seen that to provide an HD video stream at 720p, a common resolution, the network must support at least 2Mbps and ideally 8Mbps. When this is multiplied out it can be seen that a good security camera will require on the order 700Gb per day. Wireless video security and Proxim When looking at each of the wireless network requirements, it is clear that the Proxim Wireless Tsunami® product line delivers on all of these, and does so with features and functionality that meet and exceed the needs described here. 1 || 2 || 3 || 4 || NEXT-> || ALL

Read More

The Proxim Advantage Video Security via Wireless

Over the years there have been two distinct trends that have combined to boost the video surveillance or monitoring market evermore into the forefront of discussions. The first has been the rise in terrorism, vandalism, refugee populations crossing borders and additional global turmoil. The second trend has been the advancement in video camera technology – from analog NTSC or PAL standard definition video formats to IP based cameras supporting full frame rate (30fps) 1080p HD video. The technology behind video security has progressed significantly in the last 10 years. With these new resolutions has come advanced technology, functions that were not possible before or were only available off a server in the central monitoring station are now done routinely, often in the cameras themselves. This refers to features such as facial recognition, automatic license plate readers, automatic red light cameras and more. What all these new smart, HD video cameras need is connectivity. Most of these applications require outdoor cameras While all these applications may seem to be unique, there are a few things all of them have in common. First, these deployments and features require good to excellent video definition quality. Standard definition is no longer acceptable, and running at 10 frames per second vs. a full rate of 30fps, is not acceptable. Second, almost universally these applications will have a high percentage of cameras being deployed outdoors, where the environment is harsh, units are unguarded and connectivity is seldom available. For video security the camera needs to be placed where it can perform it’s desired function, and not where there is a convenient fiber or Ethernet cable handy. Having a fiber strand within 10 feet of the desired location of a camera is not much better than being a mile away. It still requires permits, right of way negotiations and some level of digging. Market With all of these factors combined, the wireless video surveillance market is forecasted to reach $1 Billion in 2019. These numbers do not address the latest shifts in the video security market being driven by orthogonal applications. For example, cities deploying intelligent traffic systems use wireless to connect signaling lights in intersections. In many cases the decision is made to add a camera to the deployment, using the wireless network to support both the signaling traffics as well as the video traffic. When carriers or municipalities decide to deploy public Wi-Fi or hot spots, increasingly the request is bundled with a desire for adding a video camera to the hot spots deployment.   Video security requirements With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks With the need and growth for video surveillance, and in particular wireless video surveillance established, what are the specific requirements for this application? What requirements must a viable video security solution provide? These requirements can be broken down into those that apply to the cameras themselves, and those that apply to the wireless network component providing the connectivity. Video security requirements for wireless networks  High capacity – up to 25 Mbps per cameras.  Reliable video communications – the network must have high availability (as much as 99.999%) and be secure.  Mobility. Water- and dust-proof (IP67-rated).  Wide operating temperature range -40° to 55°C. Video security requirements for the cameras Complex and constantly changing lighting. Complex picture composition, backlighting. Large area overview. High level of detail needed. Vibration. Clear images of rapidly moving objects and persons. When it comes to throughput or capacity requirements, these can vary a great deal based on resolution, frame rate and even the device being used to view the video streams. In this case the device is typically a large monitor in a central location. Table below gives some idea of capacity per camera requirements. From the table it can be seen that to provide an HD video stream at 720p, a common resolution, the network must support at least 2Mbps and ideally 8Mbps. When this is multiplied out it can be seen that a good security camera will require on the order 700Gb per day. Wireless video security and Proxim When looking at each of the wireless network requirements, it is clear that the Proxim Wireless Tsunami® product line delivers on all of these, and does so with features and functionality that meet and exceed the needs described here. High capacity With a typical security camera consuming up to 8 Mbps, to be effective the wireless network will likely be supporting more than one camera per network. Proxim offers a variety of Tsunami® products that support 10Mbps, 25Mbps, 50Mbps, 100Mbps, 240Mbps up to 633Mbps of useable bandwidth. Reliable video communications There are three main factors to reliable video communications: The network must have high availability (as much as 99.999%) The Tsunami® product line of outdoor wireless networking systems offer a full two year warranty. Proxim has customers who have deployed radios from ten years ago, have never been touched, and are operating today. With an field determined MTBF of well over 1 million hours for some product lines, up to over 2 million hours of MTBF for others, this equates to 1.5 to 3 seconds outage per year. The network must ensure the quality of the video stream in the face of radio frequency impairments or other traffic being carried on that wireless link In this application poor image quality is absolutely not allowed. It is no exaggeration to state that in many deployments lives are at stake, and the video system and in particular the network must be top quality. From a radio frequency performance perspective, Proxim builds into every unit it’s suite of interference mitigation technologies known as Proxim ClearConnect™ ensuring reliable wireless connectivity. While basic…

Read More
video-management-software-and-third-party-system-integration

Integration of VMS with Third-party Systems to Improve Business Operations & ROI

Video management software has become an indispensable part of security and surveillance applications. With the advent of cloud-based video surveillance, the power of VMS cannot be limited to just video monitoring. The new age VMS systems with intelligent video analytics are capable of offering much more than surveillance. The cloud-based VMS systems not only fulfill comprehensive surveillance needs of the businesses, but also complement other business processes, which may directly or indirectly reflect into the business ROI. Whether it is a new VMS installation or upgradation of an existing VMS system, enterprises (considering their business processes to be more interactive, connected and integrated) prefer their on premise or remote business systems to be integrated with the cloud-based Video management software. Since every business and its processes are different, the video surveillance needs of the enterprises also vary from each other. With the availability of flexible and customized video surveillance and analytics services, enterprises find it challenging to pick suitable thirdparty systems and apps to support their preferred VMS system. Therefore, most of the enterprises are shifting towards Video Surveillance-as-a-Service with their system integrators or VMS service providers. Most of the VMS service providers and system integrators are offering an open source or vendor independent cloud-based video management software to their clients for the obvious reason of making VMS compatible with third-party systems and applications. Why do third-party systems need to be compatible with video management software The third-party systems in VMS can be defined as any of the systems, applications or devices used to support and enhance the functionality of a video management software in order to improve the security and business processes of an enterprise. There are hundreds of companies manufacturing security and surveillance devices (like IP cameras, NVRs, Audio Devices, GPS systems etc.), but all the available devices are not necessarily compatible with the video management software preferred by the companies. Therefore, it is very important for VMS service providers or system integrators to check the compatibility of the surveillance software with the available thirdparty devices required for the project. Types of third-party systems and applications for VMS solution Third-party systems for a video management software are either physical devices installed at the surveillance location and office premises or widgets/ applications embedded in a video management software to enable intelligent video analytics. These systems and applications can be classified into two major categories; one as the systems for security and surveillance, and other as the system for supporting and enhancing business processes. Let us discuss them in detail. Security and surveillance systems Most of the third party systems and applications for security and surveillance are common across industries and are necessarily required to be part of a video management software. IP cameras An IP camera is a primary and mandatory requirement of any VMS system. A cloud-based video management software should support all types of IP cameras (Wired and Wireless cameras, PTZ, 360 degree, night vision, autofocus cameras etc.) from the major players/ manufacturers of the industry. VMS systems for customized surveillance projects must support IP cameras with open standards-based application programming interface (API), which allows system integrators to program the cameras for specific applications. IP surveillance cameras for video surveillance software must support multiple video streams and video compressions (H.264, MJEPEG) to send the video data with low latency. ONVIF support of the IP cameras with VMS systems can be an added advantage for the surveillance project. Access control devices Access control devices integrated with video management software provide physical security to any place or premise secured by the system. Integration of VMS with access control devices allows users to monitor, control and analyze multiple access points in real time, track the number of times access granted by the devices and react immediately in case of any event is triggered. Video surveillance along with access control helps in intrusion management, biometric attendance management and identity management. Fire and smoke detectors Fire and smoke detectors are the devices, which essentially need to be integrated with the VMS system of an enterprise. Large sized enterprises can have a large number of smoke detectors, which in case of fire, trigger the fire alarms of the building. An integrated fire alarm system with VMS allows a user to quickly identify and view the location of the fire alert. A quick response to such an emergency can help in saving lives and business assets. Video analytics for security & surveillance Video analytics in a VMS solution are a result of the structured algorithm of the software and many times inbuilt functionality of the devices connected to the VMS system. Video analytics for security and surveillance can be motion detection to prevent unauthorized access in restricted areas, perimeter protection to protect the virtual/ physical boundary within the enterprise, object detection, face recognition, people counting etc. A well-connected video management software with other surveillance and business-related devices can allow users to have complete control over business processes with security solutions and helps in improving the customer’s experience with the enterprise. Third party systems supporting business processes Cloud-based video management software is a well-accepted solution for security and surveillance across industries. Moreover, its structure of assimilating the functionalities of other business supporting systems enhances its business management capacity, incredibly. It empowers its administrators to have an inclusive approach to managing their business processes optimally without compromising on safety and security. Let us discuss the third party systems (used in different industries) that can be integrated with a VMS solution to enhance the business processes. Retail Third party systems and applications of a retail video management software are helpful for both employees of the retail stores and the customers visiting the stores. Here are some of the important systems to be integrated with retail video management software: Point of sale (POS systems): Integration of VMS with POS of any retail store can help in checking the fraudulent activities done by shoplifters or employees in a retail store. At POS, a customer pays for the shopped products,…

Read More

Protect Education from Cyberthreats

Across the world, the year 2016 turned out to be quite eventful for cybersecurity with multiple, major threats and breaches reported. It is the time to prevent cyber-threats lurking around India’s educational institutions. Broadly speaking, we understand cybersecurity as the preventive techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorised access. Over the years, cybersecurity has become a massive undertaking with the growing need to protect information and systems from major cyberthreats such as cyberterrorism, cyberwarfare and cyberespionage. Furthermore, the impact of these threats on a personal level is getting more significant as we immerse ourselves in a world that depends on all things digital. The awarenessadoption gap Among organisations in general, there has been greater awareness about the implications of cyberthreats. However, the education sector has somewhat lagged behind industry peers in the APAC region. While studies have not concluded the presence of a direct correlation between awareness and spending, only 66 percent of educational institutions (compared to 79 percent of financial institutions, for example) spent between 5% and 15% of their IT budgets on cybersecurity. Yet, as recent attacks on institutions of higher learning indicate, data on research, enrolment and student records that sit within school campuses can be of great value. As many as 76 percent of organisations in Asia-Pacific set aside at least 5 percent of their IT budgets towards cybersecurity this year, and about twothirds of them claim an increase in budget allocation from last year. Yet the education sector’s adoption levels, at 66 percent, have remained below average. Despite the less-than-adequate adoption levels, a whopping majority of the education sector reports a feeling of being well-protected. Need to adopt quickly Cybersecurity solutions, too, have become more sophisticated – with the most advanced systems integrating automation to optimise prevention. However, the adoption of these measures leaves much to be desired, and this is particularly true for the education sector. In general, adoption is predictably lower in industries and institutions that are less technologically savvy. While 73 percent of the education sector in the APAC region suffers from outmoded infrastructure, as much as 72 percent of the schools surveyed are confronted with the practice of employees downloading unauthorised documents and software. Antivirus and firewalls are no longer adequate by the new standards, yet two out of three companies rely on those methods alone. Meanwhile, two-factor authentication, anti-ransomware, and biometrics have low patronage. In spite of all the low (45 percent) adoption of sophisticated countermeasures, the confidence level among the educational institutions is as high as 86 percent. That lack of threat perception poses the kind of vulnerability that can be disastrous. Additionally, the ageing internet infrastructure and internal threats constitute the top reasons why the education sector in Asia-Pacific is still vulnerable to cyberattacks. Budget allocation to more sophisticated cybersecurity is a prominent barrier in its adoption – only 42 percent of educational institutions are seen to have adequate allocations. As the education sector burgeons in India, it is exposed to internal and external threats, leaving schools, colleges and research institutions vulnerable. Experimenting young minds who may take cyber risks at the cost of potential threats – unauthorized downloads are a critical example – pose a special threat. The education sector in India is digitizing itself, with technology driven education coming up as a separate high growth industry as well. Education technology relies on broadband and optic fibre, and these compound the already existing challenge of relative naiveté among both institutions and users. Inefficiency or insufficiency of cybersecurity measures put more at stake. The cost of a breach is substantial – arguably, higher than the risks many companies seem to take by not investing enough on cybersecurity. In India, the figure is as high as Rs.25,000 crores and is expected to rise exponentially over the next decade. Towards a strong policy The National Cyber Security Policy 2013 is a solid document of vision for the Indian environment. It is especially important in an environment where products and solutions for the education sector are available across international borders, transcending laws. In protecting youngsters from cyber ‘exposure,’ the document could also consider some cyberthreats as threats to national security. Some of these gaps are addressed in the National Association of Software and Services Companies (Nasscom) and Data Security Council of India (DSCI) launched by the Growing Cybersecurity Industry, Roadmap for India report of December 2016. In it, Nasscom identifies the lacuna in India’s cybersecurity policy and recommends 16 progressive policy measures, including tax breaks and cluster-funded cybersecurity ventures. Meanwhile, the education sector finds itself in a contradiction of sorts. On one hand, its rapid growth in India parallels the growth of IT systems to support it. On the other, the nascence of its growth has placed the sector in an especially vulnerable zone. As is the case throughout the Asian region, the Indian education sector is behind its world counterparts in grasping advanced cybersecurity systems that are available at its disposal. Despite its problems, this is a sector that does not figure on top of policy priority, in preference to finance and IT. As one of the fastest-growing migrants towards technology, and given the massive potential of the emerging technologybased education practices such as massive open online courses (MOOC), the Indian education sector must educate itself on cybersecurity quickly.         By – Anil Bhasin    Regional Vice President, India and SAARC, Palo Alto Networks    

Read More

March Networks Expands Innovative HD Analog Video Solution

March Networks® introduces its new CA2 series HD analog cameras. A complement to the company’s 8724 V Tribrid NVR and HD analog offering, the cameras enable organizations to capture sharp 1080p video over existing coaxial cable without the cost and disruption typically required to upgrade to Cat5/6. They also come with multiple mounts including an innovative drop ceiling mount that cuts installation times by 50% or more. Incorporating infrared micro-LEDs for illumination in total darkness, and wide dynamic range to eliminate shadows and saturation in bright and low-light environments, the CA2 series cameras provide high-quality image capture in all lighting conditions. In addition, the cameras are enclosed in a vandal-resistant, IP66-rated aluminum housing, making them ideal for both indoor and outdoor applications. “The CA2 cameras are the newest component of our HD analog solution, which enables organizations to capture HD analog, IP and standard analog video on a single recording platform, and to choose how many channels are dedicated to each camera type,” said Dan Cremins, March Networks’ Global Product Management Leader, “They are an attractive option for small banks, convenience stores, quick service restaurants, and other applications where the time and cost required to undertake a costly ‘rip and replace’ of existing analog cabling can be prohibitive.” Part of March Networks’ recently launched HD analog solution and cloud-based Searchlight for QSR service for quick service and fast casual restaurants, the CA2 series cameras work with the company’s 8724 V Tribrid NVR and are managed with powerful March Networks Command™ video management software. The 8724 V recorder’s innovative design uses analog power and Power-over-Ethernet (PoE) modules to support a variety of HD analog, IP and standard analog video configurations, up to a maximum of 24 channels. For example, an 8724 V recorder can be deployed to capture HD video from 8 CA2 series cameras and 16 IP cameras in one location, while a second 8724 V could capture video from 8 IP cameras and 8 CA2 series cameras at another location. All camera licensing is included regardless of the configuration, making the solution even more cost-effective. In addition, the 8724 V supports most third-party HD analog cameras and all three of the most common HD analog technologies – HD-CVI (composite video interface), HDTVI (transport video interface) and AHD (analog high definition). Uniquely, the recorder is wall-mounted to save space, and incorporates a front-lock enclosure for added security  

Read More

Dahua Technology Multi-Sensor IP Camera Line-Up

Dahua Technology, a leading video surveillance solutions provider has showcased a new line of multisensor IP cameras incorporating the latest technology advancements at ISC West 2018 in Las Vegas, Nevada, USA. Solidifying Dahua Technology’s strong commitment to its customers, they introduced three state-of-theart multi-sensor options providing better image resolution, application customization and improved total cost of ownership for the consumer (TCO). Delivering the ultimate performance in panoramic camera offerings, the panoramic multi-sensor bullet camera (DH-IPC-PF83230N-A180) houses four individual 8MP sensors with 4.5mm lenses. Providing the same coverage that would typically be provided by multiple standard cameras in the same setting, the multi-sensor minimizes maintenance, cabling and support costs, as well as installation time. The camera delivers a single stitched 180-degree panoramic view without distortion, and can display four individual HD views at the same time. These cameras are well suited for education, retail and both commercial and residential verticals where higher resolution at an affordable price is a crucial objective. The second multi-sensor camera (DH-IPC-PDBW5831N-B360) offers four individual 2MP sensors, each with a vari-focal 3-8mm motorized lens. This innovative flexible multi-sensor camera allows the four sensors to be independently positioned anywhere on the track for enhanced customization, and requires only one Ethernet and one power supply cable, thus minimizing maintenance, cabling, support costs and installation time. The IPC-PDBW5831N-B360 is an ideal solution for casinos, banks, retail spaces, and commercial/ residential areas where multiple scenes must be monitored simultaneously. The third multi-sensor camera (DH-IPC-HDBW4231FN-E2) features dual low-light 2MP sensors each with a 2.8mm lens and integrated smart IR up to 65ft (20m). This camera is perfect for a long hallway, corridor or the entrance to a building for capturing details from both directions. The camera allows the end user to minimize maintenance, cabling, and support costs, as well as installation time. This multi-sensor camera is ideal for locations where a customized solution is needed for the safety of at-risk occupants is essential such as educational, correctional, commercial and residential verticals. Most of the new multi-sensor cameras offer True Wide Dynamic Range (120 dB) (all except for PF83230), a true day/ night IR cut filter, H.265 and H.264 dual codecs, and built-in intelligent video system (IVS) analytics (all except for PF83230), all enclosed by an IP67- rated weather-resistant housing. “Dahua Technology continues to strive to identify customer challenges and develop new technology that brings these solutions to the US market. Our expanding line of multi-sensor cameras continue the Dahua Technology tradition of providing high performance, highvalue solutions the market is looking for,” said Jennifer Hackenburg, Senior Product Manager at Dahua Technology USA. Zhejiang Dahua Technology Co., Ltd. is a leading solution provider in the global video surveillance industry. In 2017, Dahua was ranked 3rd in ‘Security 50’ by a&s International. Dahua is committed to providing the highest quality solutions and products with the latest technologies to enable their end users to perform their business successfully. The company has more than 6,000 R&D engineers and technical staff working on cutting-edge technologies in camera lens, image sensor, video encoding & transmission, embedded processor, graphic processing, video analytics, software reliability, network security and other technologies.  

Read More

3xLOGIC, Inc Updated infinias 6.3 Access Control Platform

3xLOGIC, Inc., has recently announced its newest version of the company’s access control solution, infinias 6.3. infinias 6.3 brings a number of powerful, new features: Advanced mobile credential: Alert some or all credential holders to sensitive information quickly and easily. New responsive user interface: Designed to deliver a superior user experience on all devices and platforms. Infinias CLOUD’s elevator control: Configuring for elevator control has never been easier for any number of elevator banks and cabs, and with support for up to 64 floors per bank/ cab. Integrated wireless locks: Integrated with Allegion’s Engage NDE series wireless locks. Location services: Administrators can configure how close a user must be to a door to gain access, to ensure phone (credential) is present. The next generation of mobile credential is one of the most exciting features of this new release. 3xLOGIC’s mobile credential adds push notification, location services, multi-factor authentication (MFA) and upgrades to the default door page. of any events of significance such as school opening delays or lockdowns. Notifications can be sent ad hoc to a single person or group, or can use the industry-leading infinias Rules Engine for preconfigured notifications based on events. For example, receive a notification when a door is forced between 6pm and 6am. Location services add two new capabilities – when a user brings up the app, the three nearest doors are shown automatically on the home page making the app more convenient, and administrators can also configure how close a user has to be to a door to gain access to ensure the phone is present. Privileges can now be configured to require MFA and if so, a user will have to either already have or establish an unlock passcode/ biometric/ gesture/ pin, thus adding ‘something you are’ or ‘something you know’ authentication forms to the existing ‘something you have’ (the credential) for increased security. “Unlike other offerings that require expensive proprietary readers, 3xLOGIC’s mobile credential application is agnostic to any reader on the infinias server and can even work in a reader-less environment, because the application communicates directly to the server to trigger logic,” said Wayne Jared, 3xLOGIC VP of Engineering.

Read More

Vidsys Intelligent GSOC Joint Solution

Vidsys, the global leader in Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software, has showcased its joint solution Intelligent Global Security Operations Center (GSOC) with Micro Focus at ISC West in Las Vegas, NV. Public and private sector organizations worldwide face an increasing array of challenges when it comes to security including escalating threats, the risk of oversight and false alarms, data overload, and the demand for a faster response to any threats they may face. To address these challenges, Micro Focus and Vidsys have jointly developed a solution – the Intelligent GSOC – that can accelerate effective decisions and actions by enabling the following: Real-time processing of data that is diverse in format (e.g., video, image, audio, text, logs, transactions) and in origin (e.g., CCTV corporate databases, email, sensor, social media, broadcast media). Automated analysis to identify issues or potential threats. Streamlined workflow for alerts and responses. Open standards connectivity to 3rd party systems for easy integration. The real-world applications for the GSOC are far-reaching including event security, smart transportation, critical infrastructure, and many other security and mission-critical operations where it is essential for organizations to make decisions, quickly and effectively. “The combination of Micro Focus’ AI (Artificial Intelligence) powered analytics platform, IDOL, with Vidsys’ CSIM platform enables our customers to simplify situation management and improve situational awareness,” said James I. Chong, CEO of Vidsys, “This integrated joint solution from two global enterprise software companies takes customers and partners to the next level of intelligent security and risk management, and we’re excited to launch this offering at ISC West with Micro Focus.” “Partnering with Vidsys allows us to help our customers combat a wide variety of threats by accelerating converged security innovation,” said Ken Muir, Vice President and General Manager of IDOL, Micro Focus, “We look forward to providing organizations with automated 3600 real-time analytical insights needed to help address present and future challenges.”

Read More

Pelco™ Demonstrating SolutionBased Approach

Pelco™ by Schneider Electric has recently announced a new initiative to deliver fully-integrated, scalable solutions incorporating predictive and automation capabilities. The solutions-led approach helps end users better leverage technology to solve specific application problems, improve their organizations’ effectiveness and respond to a wide range of challenges using Pelco’s VideoXpert™ video management system software. “Today’s world is being driven by the convergence of data from multiple management systems to form a single operational picture of a city, a road network or a facility,” said Robert Beliles, Pelco Chief Marketing Officer, “By focusing on end user problems in all functional areas, not just security, we can offer tailored solutions that provide cities and enterprises a more complete view, enabling them to be more effective and responsive to the needs of their citizens, employees and customers.” New traffic management applications keeps people and vehicles moving Traffic operation managers and engineers often rely on a patchwork of video cameras and third-party platforms to help keep traffic moving and pedestrians safe. A slowdown at one intersection often has a ripple effect, effectively backing up traffic along main thoroughfares and increasing commute times exponentially. The combination of Pelco’s VideoXpert video management system with the wide range of Pelco cameras and video analytics helps cities deploy sophisticated traffic management solutions in a fraction of time with a lower total cost of ownership. Using this solution, traffic engineers can respond appropriately to congestion – whether that means adjusting signal timing or dispatching emergency services. They can also begin to predict pedestrian and traffic patterns to improve traffic flow. By leveraging Pelco’s city surveillance expertise and integration of video and analytics with various communication tools and emergency response platforms, law enforcement officials are able to protect against and rapidly respond to criminal activity, traffic incidents and a variety of other threats. This same approach can be applied to numerous vertical markets supported by Pelco today. VideoXpert enhancements: Aligned with customer wants and needs Pelco is also introducing enhancements to its popular, award-winning VideoXpert (VX) video management system platform, which supports the company’s move toward tailoring solutions to meet the needs of its customers. Included in the VX Pro 2.0 and VX Enterprise 2.2 software releases are advances in detection technology, IT management, cybersecurity, automation, and operational efficiency. Additionally, customers will find a few ‘throwback features’ such as motion pixel search to identify and alert operators to motion within specific camera field of view areas and full de-warping capabilities on the VX Portal web view without having to administer all the client software.

Read More

Vanderbilt ACT365 Vanderbilt ACT365

The Vanderbilt ACT365 cloud-based access control and video management solution was received with open arms during ISC West 2018 in Las Vegas, by partners and customers alike, and was also recognized with a 2018 Most Valuable Product (MVP) Award from Security Sales and Integration Magazine. The MVP Awards recognize products that make a substantial impact on integrators and were judged on innovation, functionality, competitive advantages, benefits to the installer or monitoring provider, and benefits to the end user. All 54 entries were judged by a panel of experienced integrators and industry consultants. “Now in its fourth year, SSI’s Most Valuable Products Awards has solidified its standing as not only one of the most credible programs of its kind for the electronic security industry but also the greatest value for entrants,” says SSI Editor-in-Chief/ Associate Publisher Scott Goldfine, “It’s overwhelming for security integrators to keep up with the thousands of products introduced annually. SSI’s MVP Awards provides integrators the valuable service of distinguishing particularly. noteworthy new products, and salutes the manufacturers responsible for them. Both factions benefit by having entries evaluated by independent security integrators and industry consultants. Congratulations to this year’s finalists and winners – you’ve earned it!” ACT365 offers end users 24/7/365 protection for businesses through the software-as-a-service (SaaS) model that eliminates the need for SMBs to invest in and maintain a dedicated IT department or application software. Integrators can assume this role of deploying and managing the infrastructure through the cloud-based solution, resulting in continued recurring monthly revenue (RMR) and continued coverage.  

Read More