You are at : Search > Articles Search Results

Articles Search Results

2397 Articles and 2230 related Products found for IP

A quick overview on the current secuiry market trend

A quick overview on the current secuiry market trend

Editor / Provider: Michelle Chu | Updated: 9/17/2014 | Article type: Hot Topics

Messe Frankfurt New Era, the leading integrated media service provider in Asia, today has held a seminar to share professional experience on security trend and industry aspects with providers in Taipei, Taiwan.

As IP system entered into the security market years ago, the entire industry has experienced a series of revolutionary changes. In today's market, in terms of deploying security systems, end users have more options than usual. A quick example, other than IP surveillance systems, end users can choose to update existing analog equipment to ccHDtv, CVI, TVI, or AHD systems in order to reach high-definition recording quality. Suppliers have realized that products make fewer profits now – the market has focused on systems integration, vertical applications, and multiple services.

It is all about intelligent and integration
End users started to set their eyes on intelligent systems and software that can provide added values on their business and management. The ideal of security is no longer merely about monitoring and access control; the ideal of security today suggesting surveillance, access control, and more importantly, making use of these data collected from security devices for managing purpose.

John Shi, the General Manager of Messe Frankfurt New Era, pointed out that future trend of the security industry will be about providing more integrated systems and platforms, such as physical security information management (PSIM), incident management system, and content analysis. The highly integrated platform helps critical verticals to achieve total security awareness for better protection; futhermore, it assists making effective business decision.

Personal device steps inside 
A prosperous potential can be seen in the consuming electronic market. Niche technologies are available for the end users now, for example, biometrics technique and NFC have been used on personal smart device. Intelligent systems can not only be used for professional surveillance, access control, business management, but also smart home and personal purposes.

The suppliers in the traditional security market are facing the same challenge – whether sticking to professional security product line or stepping into consuming product market at the same time.

 

New market strategy for the distributors
In order to survive all the challenges, distributors had to come up with more flexible market strategy. First of all, expanding the product line is a must. End users are looking for one-stop shop that provides all they need conveniently and saves possible technical problems; meanwhile, distributors have to be able to provide total solution to various verticals and projects. This trend indicates that distributor has to be able to supply various products (from the surveillance to storage, for instance), systems integration, and after-sale services that tailored to different cases.

Many leading providers in the market keep expanding local offices in order to provide the most instant services and to have connected relationship to the local market. On the other hand, providers tend to cooperate with more than one manufacturer just to make sure that they can provide solutions for any budgets and considerations.

ZNV launched H.265 HD IP camera

ZNV launched H.265 HD IP camera

Editor / Provider: ZNV | Updated: 9/16/2014 | Article type: Hot Topics

How often do you have to wait for a video image to load on your screen? You don't have to accept this anymore! A major break-through has been made to overcome bandwidth and storage challenges that the security and surveillance industry has been facing for years. The industry has entered a new era with the highly-anticipated new generation of IP cameras that have inbuilt the state-of-the-art video image compression technology complying with the new H. 265 international standard.

On September 12, 2014, Shenzhen ZNV Technology launched H.265 high-definition IP camera (7200 series) at its 2014 Channel Partner Summit and New Product Launch Conference in Nanjing, China.

At the conference, Robert Zhu, executive chairman of ZNV, explained the technologies of this new IP Camera series and the benefits for customers.

"All of us like to use high-definition cameras for security monitoring, remote machine operation, or other applications, because the sharp images will help us to identify security treats or control a machine remotely. The current challenges are the cost of transmission and storage of large-sized data over the network and cloud. The new IP cameras that we are launching today overcome these challenges by using the latest data compression technology inside the cameras. For the same high-definition videos, this technology can reduce the data size by three times in dynamic scenes like a busy street and up to 10 times in static scenes like a guarded warehouse," Robert Zhu said.

"The benefits of this breakthrough are simple. For same high-definition videos, they will require much lower bandwidth and use much less storage. This will not only make a tremendous saving in system cost for our customers, but also make high-definition video possible in the areas that the existing network infrastructure simply can't support previously," Robert added.

Key Features of ZNV's new H. 265 High-Definition IP Camera:
1. Low requirements on bandwidth for transmission of its video streams:
With the built-in new-generation video image compression and transmission technologies complying with H. 265 Standard, ZNV 7200-series IP cameras enable high-definition video surveillance data to be transmitted through low bandwidth network while keeping images clear and smooth. During the test, the new 7200-series IP cameras can transmit dynamic 1080P video images at 1.5 Mbps under H.265, instead of at 4 Mbps (almost tripled) under current H.264 standard. In static scenes that are used a lot in security guarding environment, the video stream will drop to 100Kbps to 200Kbps, which is 10 times lower than the current best cameras in the market.


2. Low requirements on storage to keep the videos:
With the same storage space, the new compression technologies enable users to store three to 10 times of videos by using the new 7200-series IP cameras rather than normal, same definition cameras. This will lead to tremendous saving in storage facilities and relevant room space and energy consumption.


3. Low requirements on light condition to record quality videos:
ZBF-7200-series IP cameras can operate at a super-low light environment. It can still record clear videos in color or black-and-white in the low light environment where human eyes cannot identify. The minimum functional light condition reaches 0.002 lux (colorful) or 0.001 lux (black-and-white). Thus, this new series of ZNV cameras can still help customers guard their properties in an extremely dark environment, while enabling a smooth transition between bright and dark environment.

Two Successful Stories:
H.265 high-definition IP cameras will bring enormous value to the customers, as described by Robert Zhu. After being introduced to the market, these IP cameras can save huge investments on network and video storage facilities.

ZNV used the new cameras in a smart city project in China. As part of this project, the police department requires that video must be stored for 12 months in order to check the recording history during police investigations. Due to the cost constraints, they only have limited storage space available which could only support 30 to 90 days video storage previously. As a result, earlier videos had to be deleted and overwritten, among which some important information were lost for criminal cases. With the H.265 technology, the police department can save up to 10 times of storage space, which translates into tens of millions of savings for the whole projects.

A school used a video surveillance system for years, but it gradually grew out-of-date and could not meet its increasing surveillance demands. This school wanted to use state-of-the-art high-definition cameras for video surveillance; however, normal high-definition cameras needed to be built on high bandwidth infrastructures, e.g. a costly fiber network. Due to insufficient network bandwidth and financial pressure, the school had not found an optimal solution until recently. By taking advantage of the low-bandwidth requirement feature of ZNV's 7200-series IP cameras, the school achieved a real-time, high-definition 1080P surveillance system under the existing network infrastructure. This saved tens of thousands of dollars and minimized the interruptions to school education programs.

Axis provides Albert Einstein Hospital with pioneering security solutions

Axis provides Albert Einstein Hospital with pioneering security solutions

Editor / Provider: AXIS | Updated: 9/15/2014 | Article type: Commercial Markets

Mission
The Albert Einstein Hospital is considered to be the most advanced hospital in the Southern Hemisphere. Its units, mainly in the Sao Paulo Metropolitan Region, employ 12,322 people (including contractors) and receive about 4,000 visitors a day. As part of its network expansion plan, another unit has been opened in Sao Paulo (Perdizes Higienopolis). This new facility also placed increased demands on safety for patients and hospital staff and on safeguarding its assets. The hospital needed stricter controls on who was entering and leaving.

Solution
The hospital administration decided to adopt a more modern method of access control in all its units. This is the first time a hospital in Latin America has implemented a system combining access control, video surveillance, fire prevention and detection, and building automation. Einstein's seven units employ 1,250 Axis cameras to control 450 access points.

Result
The project was delivered under a turn-key contract and went into operation automatically at the end of the installation, launching a new concept of security for the hospital area. These investments follow the trend toward a greater control of the flow of people inside hospitals. One of the most immediate results is the greater sense of security patients and employees feel. Other impacts are being seen over the long term: crime prevention, identification of suspects, and asset preservation

User registration
Users can now only gain access once they are registered. On passing through the turnstile, Axis' high-performance cameras record an image of the user's face with highresolution imaging. After making this complete record upon entering, all user movements through access points, such as doors, turnstiles and gates, are tracked by other Axis cameras. The project includes 450 access points. The control room operator only needs to enter the user's name into the system to get all their entrance images, viewing details about their face and general appearance, and all their subsequent images—where they go, what they are carrying, if they were being accompanied, and what time they passed each checkpoint.

Discreet observation
Since hospitals have specific needs, the project underwent some adaptations. Camera position, for example, is not so apparent as to make people feel under suspicion, but the cameras still need to be visible enough to deter criminal actions. One of the project's design challenges was to carefully balance the need for camera coverage against the need to respect the patients' and visitors' privacy and feelings. In short, the system had to be very well designed so that it did not seem threatening, but was able to dissuade malicious action while maintaining full respect for privacy. “The Axis cameras surprised us in a positive way, because they provided different applications that the old analog cameras didn't offer”, said Dov Smaletz, Albert Einstein security manager. “Because they are 100% IP, they offer the resources for intelligent monitoring.”

The system has both passive and active features, and notifies control room staff when a person or a movement is captured by a camera. The system is 100% PoE (Power over Ethernet) and has roughly 36 terabytes of storage space, enough for two weeks of images, all centralized at the Morumbi unit, where a 100% RAID 5 solution vastly improves data access. Due to the quality of the cameras and ongoing maintenance services, the system ensures nearly 100% availability.

Ready for the future
Axis' integrator partner Servtec developed and installed the project and it is also responsible for future maintenance. This maintenance even can be done with the help of images from the security cameras themselves, an example of the large degree of integration of the project. “The implementation was considered complex because it's the first hospital to oversee all people entering and leaving the complex using turnstiles,” said Alexandre Gushiken, Servtec sales manager.

Milestone solution partner GuardTrax integrates officer phone app with XProtect IP VMS

Milestone solution partner GuardTrax integrates officer phone app with XProtect IP VMS

Editor / Provider: Milestone Systems | Updated: 9/16/2014 | Article type: Security 50

GuardTrax announces the completion of a game-changing integration of the GuardTrax™ officer phone app with Milestone XProtect® video management software (VMS). This solution delivers unique threat alert, identification, video verification, resolution and reporting capabilities for security guarding companies, mobile patrols and in-house units.

The relationship between GuardTrax and Milestone Systems is built on the premise that platinum-level security involves physically present and mobile security personnel and surveillance equipment - all brought together via open platform video management software. Guarding companies whose officers use the GuardTrax app integrated with Milestone XProtect video gain entry into the new era of technology-based security.

For customers, the connection to the VMS platform expands alerts with video verification and real-time situational awareness, enhancing their security investment. Installing channel partners gain new sales and integration opportunities through close collaboration with the guarding company universe, GuardTrax and Milestone.

Rich Pekmezian, CEO of GuardTrax, says: "GuardTrax recognizes the significant role of the security officer in providing thorough security with physical response always at the ready. Our app is the connection between the security officer, surveillance equipment and video management. GuardTrax and Milestone see a strong partnership that is critical to provisioning today's most effective blended security solution.”

With this integration, the Milestone Mobile client and GuardTrax app are downloaded to the Android devices used by the mobile officers. GuardTrax alerts are also seen in the XProtect® Smart Client display at central operations or being shared with other security professionals. Officers can also generate incident reports from their devices while on the move.

Reinier Tuinzing, Strategic Partner Alliances Manager at Milestone Systems, says: “The industry has reached an inflection point realizing the need for more than just persons on location. Mobile security officers also need alerts with video verification to substantiate what is happening, where, and how best to respond to incidents.”

Every security incident or situation has a beginning and an end. Some incidences can be avoided while those that cannot need to be resolved quickly and properly. The GuardTrax/Milestone integrated solution provides real-time capture and consolidation of critical security threat data that can then be analyzed and acted upon to bring about optimal resolution.

In-person interviews with C-level execs in the guarding industry reveal that guard companies today must empower their officers and supervisors in a technology-forward fashion. Gone are the days of just sending an officer to a property with a notepad and flashlight. The research indicates that the GuardTrax app improves officer efficiency while lowering the cost base to provide premium guarding services. The GuardTrax/Milestone integration further aligns guarding companies with technology delivery so they are poised to realize new sales opportunities.

“Success for the channel is all about expanding business with new and innovative solutions to offer the customer. The GuardTrax/Milestone integration enables new service levels for guarding companies to be on the leading edge, and customers gain the rewards of safer environments,” says Tuinzing.

The GuardTrax/Milestone integrated solution will be demonstrated at the 2014 ASIS event to be held September 29-October 1 in Atlanta, Georgia, in Milestone's Booth 1043.

Full content of Hotel Solutions by 8 leading brands

Full content of Hotel Solutions by 8 leading brands

Editor / Provider: Michelle Chu | Updated: 9/15/2014 | Article type: Hot Topics

The requirements from hospitality vertical are no longer merely focusing on traditional surveillance and access control deployments, despite it is widely recognized that blending in the surrounding decoration is the baseline for hotel security installation. In today's market, a unified solution that effectively assists hotel operation and staff management is much more popular and desirable.

In this article, asmag.com would like to show our readers some of the latest case studies and the must-know considerations provided by several professional global suppliers in the terms of deploying hotel solution in the up-to-date market.

 

 

Full Content of Hotel Feature 2014 
                      - 8 selected case studies and 3 solutions

 

 

 

4 hotel  security highlights provided by 5 leading suppliers

 

 

 

 

 

Cracking down on camera hacks

Cracking down on camera hacks

Editor / Provider: William Pao, a&s International | Updated: 9/17/2014 | Article type: Tech Corner

Recent reports on baby cam hacks raised new concerns over malicious intrusion into networked security devices. The threat is even more imminent for home and small business users who are not as well protected as their enterprise counterparts. Luckily for them, most of today's network camera manufacturers work hard to keep flaws to a minimum and equip their products with various security features.

Two recent incidents where baby cams were attacked by hackers caught the attention of vendors and users alike. One happened in Ohio just in April, when a couple was awoken late at night by strange sounds coming from the baby cam in their toddler's room, only to find that the camera had been taken control over by a hacker. A similar incident happened last year, when a Houston couple heard a man swearing through the baby cam in their infant's room and found out the Wi-Fi-connected device was hacked. In both cases, it was found that the cameras, made by the same vendor, contained security flaws that could easily be exploited.

In fact, hacking can happen to not just cameras but also practically any device on the Internet. Last year, the NAS device of a particular vendor was found to have a vulnerability potentially allowing attackers to execute arbitrary commands on the system. The vendor has since released a patch to solve this problem.

The above incidents illustrate the danger facing users of network cameras and other security devices, which may be targets for malicious intruders. That danger is even more imminent for home and SMB users who, unlike their enterprise counterparts, are not protected by firewalls or advanced perimeter defense software. What they can do to protect themselves has therefore become an urgent issue. Luckily for them, today's network camera makers work hard to minimize flaws and equip their products with various security features, which users should take advantage of to reduce the risk of these devices being hacked. “In general it is not possible to guarantee that computers and network devices do not contain flaws that may be exploited for malicious attack. However, there are measures that can be taken in order to reduce the risk considerably and eliminate the obvious flaws,” said Fred Juhlin, Senior Consultant for Solution Management at Axis Communications, whose Companion series targets home and SMB users.

Access
Unauthorized access to a system can be prevented by a simple yet effective method called password protection. Most network cameras today allow users to create their own usernames and passwords, which can be secured through various means. Zinwell, which makes power line-based home security cameras, has patented a technology that keeps passwords from being sent out to the Internet. “In that case, hackers won't be able to get passwords from the Web,” said Ben Huang, Senior Marketing Supervisor at Zinwell.

Encryption of passwords is another protection method. “The user has the option to let the system remember passwords, and if so the client protects the password with encryption,” said Juhlin.

Once a user accesses the camera, it's a good idea for the device to have multilevel access control based on the user's privilege. For example, a regular user may only view streaming video, while an administrator may access the camera's storage or control the device. In fact, most network cameras today offer this functionality. “This means users can control exactly who can see what in their system, and that their video is safe from any form of third-party manipulation,” Juhlin said.

Encryption
Many IP cams also allow encryption. The videos can be encrypted before being sent over to the network to make sure that unauthorized persons cannot view or tamper with the data. Different encryption technologies are used. One of the most commonly used is SSL/TLS, which encrypts contents with special codes that can be deciphered only by pairs of public and private keys, the latter of which are hidden in the computers of the communicating parties. As private keys can be obtained in a security breach, Bosch, whose Advantage line also targets home and SMB users, makes sure that this will never happen.

“The SSL private key of the device is stored securely on the smart card chip that is directly involved in the SSL connection setup. The private key never leaves the chip and cannot be read out even if the user has complete access to the device,” said Konrad Simon, Product Manager for IP Video at Bosch Security Systems. “This way no access is possible to the private key, even in a hostile approach someone would have achieved to read sensitive data from internal memory.”

Advanced encryption standard (AES) is a protocol that encrypts contents with 128-bit, 192-bit, or 256-bit keys, making encoded messages harder to decipher by untrusted parties. Among camera makers that use AES is Amaryllo, another home security camera maker. It uses 256-bit encryption, at the same time ensuring that video latency is less than 0.5 seconds.

Keeping Flaws to a Minimum
Vendors who are security-minded keep exploitable flaws to a minimum. One way to achieve this is checking third-party software regularly to make sure problematic software isn‘t incorporated into their products. As an example, to implement SSL encryption, many camera makers use OpenSSL, which drew huge attention in the security world in April when it was found it contained a bug called Heartbleed. If left ignored, Heartbleed could lead to the leak of sensitive data, such as usernames and passwords. One camera maker that managed to avert this disaster was Bosch. “We do not use OpenSSL as SSL implementation on our IP cameras, encoders, and decoders. The SSL implementation in our devices is not OpenSSL, nor is it related, so Heartbleed did not affect us at all,” Simon said.

Crowdsourcing, where users in a community share their collective wisdom, is another way to identify flaws and get them fixed. “We monitor discussions in the network community to quickly identify possible vulnerabilities which may impact our products. If a vulnerability is discovered, we will provide patches, firmware, risk analysis, or recommendation to our customers,” Axis's Juhlin said.

User Awareness
While camera vendors may have included a range of security features in their devices, users should also do their part by taking advantage of these features. For example, it's often the case that users simply use the camera maker's default username and password settings, which are easily obtainable. It is also important to check for notices on firmware updates or security patches, which are normally sent via e-mail. Moreover, users may consider isolating their cameras from a local network, since hackers may attack other devices in the network through the camera.

A Two-Way Street
Keeping hackers at bay requires a commitment by both vendors and users. The vendor should build their products with the concept of “security” in mind, while users should familiarize themselves with security features included in cameras and use them whenever possible. It's only through this two-way street can security camera users achieve their primary objective — keeping safe — without being harmed in the process.

Vicon names Eric Fullerton CEO and Director

Vicon names Eric Fullerton CEO and Director

Editor / Provider: Vicon | Updated: 9/15/2014 | Article type: Security 50

Vicon Industries has announced that its Board of Directors has appointed Eric Fullerton, formerly Chief Sales and Marketing Officer of Milestone Systems A/S, to succeed Kenneth M. Darby as Chief Executive Officer and as a Director of Vicon.

In its search for a new CEO, the Board sought a candidate who could return Vicon to prominence in the video security and surveillance systems market and also integrate the businesses and operations of Vicon and IQinVision, Inc. following their recently completed merger.

“We had very specific criteria for our new CEO, and we were highly strategic about finding the right person – Eric is that person,” said Julian A. Tiedemann, a Vicon Director, “No one better understands the market intersection of video management software and HD/megapixel cameras, which he demonstrated during his 10 year tenure at Milestone Systems, the world's leading provider of open platform IP video management software. Eric has a recognized ability to set strategy, lead teams and drive growth and innovation at the highest level. He is also a natural cultural fit for Vicon. This is a great development for our company.”

Following senior positions at netVigilance, Inc., Intel and Nokia, Fullerton joined Denmark based Milestone Systems A/S in 2004. During his tenure, the company grew from start-up to more than $70M in revenue and was named a Europe Fast 500 company.

“It is a great privilege to be asked to lead Vicon at this important juncture in the company's history,” said Fullerton. “I see great opportunities ahead for us by combining IQinVision's strong brand in HD/megapixel cameras with the long history that Vicon has in video management systems. I look forward to joining this great team.”

GKB IP solution deployed to safeguard the commercial building in Cebu

GKB IP solution deployed to safeguard the commercial building in Cebu

Editor / Provider: Sponsored by GKB | Updated: 9/12/2014 | Article type: Hot Topics

Background:
The Link is a 22-story commercial building for business process outsourcing (BPO) building located in Cebu IT Park, the Philippines, built in 2013. The Link was looking for high definition surveillance system to protect its tenants including IT companies, insurance companies, and banks in the building.

Solution:
A total of 45 IP Dome cameras have been installed in The Link building, used to monitor the elevators, lobby, main exits, offices, public places, and parking lot. Each camera has an embedded a 16G Micro SD card for back-up recording in case of network failure.

GKB provided a server-and-client structure IP solution that allows The Link to set up multiple monitors, making the live monitoring function does not interfere with the recording server and system.

The operation of the entire system is managed and coordinated centrally through Viewer 11 & NVR Server, two sets of comprehensive and intelligent security platform software by GKB.

Benefit:
The entire solution has led to several benefits as a result:
* A Flexible and Cost-Effective Solution When the system was designed, the idea of expansion was thoroughly considered. New cameras can be easily added without any extra license fee making this deployment an excellent return on investment.
* Clear and Clever Monitoring and Management Cloud NVR can remotely monitor and manage cameras from any device. Log in is as simple as entering your username and password. The Link can now remotely manage IP cameras easier than ever.

 

Sponsored by: 

About GKB GKB Security Corporation is a global security solutions provider with a full range of CCTV, IP, Mobile, Video Fire Detection System and Home Automation products and support services designed to meet the needs of small and medium-sized system integrators and security installers.

VIVOTEK surveillance system provides US school district open learning environment

VIVOTEK surveillance system provides US school district open learning environment

Editor / Provider: Sponsored by VIVOTEK | Updated: 9/15/2014 | Article type: Education

The Prairie Hill School District is a gateway community on the North East state line. The District is part suburb and 100% committed to offering the finest instructional program in the area. It believes that an effective instructional program requires a school environment where student safety is top priority. To ensure the safety of its students, as well as staff, the Prairie Hill School District recently deployed VIVOTEK network surveillance cameras with Exacq video management software.

While student safety is a main concern at the Prairie Hill School District, it is also important to create a friendly and open learning environment. With this in mind, the district was looking for an advanced surveillance system that could deliver clear and accurate image detail with fewer cameras installed as inconspicuously as possible.

With the recommendation from Professional System, Inc., a local provider of technology services, including surveillance system design, installation, and services, Prairie Hill School District decided to deploy the VIVOTEK network cameras because of their superior image quality, resulting in significantly fewer cameras needed and providing overall surveillance success while maintaining a friendly school atmosphere. “After comparing solutions from multiple manufacturers, it quickly became clear that VIVOTEK meets all the requirements,” said William A. Burton, President of Professional System, Inc. “With a mixture of indoor and outdoor VIVOTEK cameras, we were able to create a complete surveillance system that not only provides safety to students and staff, but also help the school to catch and record conflicts and interactions between students during school activity, which helped the school administration to control and maintain peaceful activity.”

A total of 196 VIVOTEK cameras ranging from 1 to 3 Megapixel resolution were installed throughout 8 campuses by Professional System Inc. in three installation phases to serve different surveillance needs. In phase one, a total of 74 VIVOTEK cameras were installed in interior and exterior areas throughout the main 3-story building for general surveillance, including 41 units of FE8171V, an outdoor vandal-proof fisheye camera with 360° field of view. FE8171Vs were mostly installed in the hallways and library because of their wide angle field of view which significantly reduce the amount of cameras needed for complete coverage. “One of the security concerns was monitoring incidents during break times when there were large amount of students moving between classes. Using a VIVOTEK FE8171V wide angle camera, we were able to capture a panoramic image that normally requires 2-3 IP cameras,” said William. “This installation not only resulted in significant savings to the school district, but also provided an open and friendly learning environment due to the discreet form factor of the camera housings.”

During the 2nd installation phase, 60 VIVOTEK cameras were installed mostly on the exteriors of the remaining 7 campuses, including multiple units of SD8314E, an outdoor pan tilt camera with 18X optical zoom to monitor parking lots and other outdoor activities. With the 18X optical zoom capability, an administrator can easily zoom into a particular area of interest to record important data, for example, license plate details. After the completion of installing all the outdoor cameras, Professional System plans to kick off the final installation phase in August 2014 to install additional 62 VIVOTEK cameras in the interior areas throughout 7 campuses.

The security team at the Prairie Hill School District seamlessly manages and monitors the recorded high definition video captured by VIVOTEK cameras using Exacq management software in the security office, with the surveillance video also being accessible by selected administrators, including the school Principal. The combination of VIVOTEK's cameras with Exacq management software has proven to be a reliable enterprise surveillance system. “We were impressed with how well VIVOTEK's cameras work with the Exacq software,” said William. “With the user-friendly features from Exacq and superior image quality from VIVOTEK cameras, we delivered the most ideal solution for our customer.”

With student and staff safety a key priority at the Prairie Hill School District, the new VIVOTEK surveillance system offers the ability to keep everyone safe while maintaining an open educational atmosphere. “The VIVOTEK surveillance cameras help the school to catch and record conflicts and interactions between students during school activity; this is a very important piece to help the school to control and maintain peaceful activity,” said Julia Veazey, Director of Technology at the Prairie Hill School District. “We are very happy with the result and look forward to deploying more VIVOTEK cameras later this year to further enhance the level of security across the board.”

4 hotel security highlights provided by 5 leading suppliers

4 hotel security highlights provided by 5 leading suppliers

Editor / Provider: Michelle Chu | Updated: 9/12/2014 | Article type: Hot Topics

Hotel security deployment has become even prominent than ever as a strong growth has seen in the international tourism industry over the past decades. It is projected that in 2030, international tourist arrivals worldwide will reach the gate of 1,800 millions, compared to around 500 millions arrivals back in 1995, according to Statista.

The requirements from hospitality vertical are no longer merely focusing on traditional surveillance and access control deployments, despite it is widely recognized that blending in the surrounding decoration is the baseline for hotel security installation. In today's market, a unified solution that effectively assists hotel operation and staff management is much more popular and desirable.

In this article, asmag.com would like to show our readers some of the latest and the must-know considerations provided by several professional global suppliers in the terms of deploying hotel solution in the up-to-date market:

1. Guests' comfort and safety always come first
In the hospitality security market, guests' requirements have to be the highest consideration. Despite the fact that the most important thing for video surveillance is capturing clear monitoring pictures possibly needed, in a hotel, the foremost function of surveillance systems should be providing guests peace-in-mind feeling.


“For guests, the hotel rooms as well as the public areas of the hotel are used for their purposes and comfort. But for the hotel staff, it is seen as their workplace, which also brings a different aspect of video surveillance into mind,” according to AXIS Communications. “A video surveillance system will contribute to the guest safeguarding since it can help hotel security management to detect incidents and intrusion and act upon it as well as preventing it from happening.”

The luxury boutique hotel, La Suite West, located in London has deployed a discret surveillance system consisting of Axis network cameras that blend in with hotel decor.

2. IP gets an upper hand for its flexibility, remote monitoring, high-quality image, and cost-efficiency
Undeniably, compared to analog system, network systems is more flexible and, generally, cost-efficient when system expansion is in need. “We are definitely seeing a trend of more hotels adopting IP cameras as opposed to analog, due to the ease of integrating IP cameras with current security or control systems, and the cost saving achieved by using less cabling,” according to SONY Electronics Asia Pacific.


Not to mention the high image quality delivered by IP systems which makes it easier to spot details such as suspects' facial features. More importantly, network recording can be forwarded to related authorities conveniently as emergent incident taking place. Network systems also imply that remote monitoring via smart devices has become a real possibility.


Dahua Technology has also provided an alternative option for end user who desires for HD image resolution without immigrating from analog to IP systems. “HDCVI provides full HD and 720p image resolution based on the exsisting cabling, while it's cheaper than IP solution at the same time, so it is very natural for HDCVI to gain the favor from owners who run places with analog surveillance systems,” as Sancha Xia, Overseas Sales at Dahua Technology indicated. Earlier this year, Dahua has provided in-house HDCVI solution to 5-star hotel in Shanghai better securing the hotel and guests.

3. Extreme light and low-light condition make image unrecognizable – WDR & 3D DNR
For the end users in hotel vertical, it is inevitable to deal with surveillance under extreme light or low light condition. The entrance is one of the most important locations to watch over carefully 24/7. However, the surveillance could be challenging at the entrance and areas with varying light condition making people and incident too hard to recognize.


“Wide dynamic range (WDR) technology is a network camera feature that handles a wide range of lighting conditions in a scene…WDR enables objects to be visible in both bright and dark areas by applying various techniques,” as AXIS Communications suggests.


On the other hand, noise reduction is a necessary technique when it comes to hotel surveillance systems adoption. Under low-light or no-light condition, increased noise in the monitoring picture may lead to misjudgment, taking image noise as a true motion. “IP cameras provided by LILIN are equipped with 3D digital noise reduction (3D DNR), and, at the same time, incorporate spatial noise reduction. The entire image processed with 3D DNR technology is clear and noise-free,” according to Merit LILIN. One of the most established chained hotel in Beijing deployed LILIN's video security systems with advanced technologies such as WDR and 3D DNR to reach total situational awareness.

4. Security systems as added value for hospitality – branding and operation management
Due to the increasing terrorism incidents in the past decade, security has become a main concern for the tourists and business trip travelers as many are aware of possible security threats during trips. Therefore, a high-level and stringent security system can often drive hotel revenues and boost occupancy, as Pavel Petrov, Solution Consultant of Business Developement of EMEA at Bosch Security Systems convinced. “Therefore, more and more hotels worldwide do opt for voluntary certification procedures, marketing themselves as safe hotels. On the other hand, a major security breach can have devastating effects on hotel's brand, which is usually its most important asset.”


Moreover, security systems deployed in hotel can be further used as part of the hotel management. For example, not only biometrics access systems can be installed in guest rooms and staff offices, it can also be used for time attendance management. Surveillance monitoring, other than its security purpose, can be used as food and beverage management and staff training material in order to improve hotel services.

 

 

Full Content of Hotel Feature 2014 
                     - 8 selected case studies and 3 solutions

 

 

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page