You are at : Search > Articles Search Results

Articles Search Results

948 Articles and 74 related Products found for detection

AirLive IVS Face Detection surveillance system for casinos

AirLive IVS Face Detection surveillance system for casinos

Editor / Provider: Sponsored by AirLive | Updated: 4/17/2014 | Article type: Commercial Markets

Casino surveillance system requires the ability to respond rapidly to incidents at low levels of lighting, which is one of the most technical-demanding requirements for surveillance systems with diverse operational requirements.

Gaming video surveillance needs to focus on the activities at the gaming tables and slot machines in order to settle disputes, prevent and detect cheating and also to protect the casino and players from dishonest employees. Evidential-level image quality is crucial for bringing the criminal to court successfully.

Casino surveillance systems from AirLive's IVS Face Detection embedded in MD-3025-IVS and BU-3026-IVS (Intelligent Video Surveillance) provide accurate video analytics that can be used to detect faces of people in the monitored area. This function automatically detects and captures a person's face and store in the storage. AirLive's analytics surveillance systems are able to set up the system alerts, take a snap shoot or record a short video when a face is detected in the frame of the image.

Besides Face Detection, AirLive IVS IP Camera has other 5 built-in IVS analytics including 5 powerful intelligence functions – Face Recognition, Object Counting, Trip Zone, E-Fence, i–Motion — for various applications in public places such as airports, stadiums, border crossings, offices, shopping mall, and buildings.

 

FLIR receives $18M production contracts for DR SKO program

FLIR receives $18M production contracts for DR SKO program

Editor / Provider: FLIR | Updated: 4/16/2014 | Article type: Security 50

FLIR Systems announced a full-rate production decision from the U.S. Department of Defense for FLIR's integrated chemical, biological, radiological, nuclear, and explosives (CBRNE) threat response system for the Dismounted Reconnaissance Sets, Kits, and Outfits (DR SKO) program. Additionally, FLIR has been awarded a $12.3 million order from the U.S. Army for low-rate initial production of DR SKO systems as well as a $5.8 million development contract from the U.S. Army for program management and logistics tasks related to the program.

The DR SKO program is a joint-service, Department of Defense initiative centered on CBRNE threat detection systems that will be utilized by the Army, Navy, Air Force, Marines, and Civil Support Teams. The FLIR DR SKO system provides an integrated set of CBRNE detection, identification, sample collection, testing, and personal safety kits that allow personnel to perform site assessment and consequence management missions. The program, originally called the Joint Nuclear Biological Chemical Reconnaissance System Increment II (JNBCRS2), has been in development since 2008.

Production under the order received is expected to be fulfilled during 2014 by FLIR's Detection segment facility in Elkridge, Maryland. Work under the development contract is expected to occur over the remainder of 2014.

"This decision and related orders solidify our position in providing CBRNE solutions and demonstrate FLIR's ability to provide advanced threat detection solutions via a distinctive commercially developed, military qualified (CDMQ) model," said Andy Teich, President and CEO of FLIR. "Receiving this conclusive production decision and these orders are a result of the work of our CBRNE detection and integration teams and is enabled by our broad suite of sensor technologies."

Pelco IP cams integrated with March Networks Command VMS

Pelco IP cams integrated with March Networks Command VMS

Editor / Provider: March Networks | Updated: 4/15/2014 | Article type: Security 50

March Networks and Pelco by Schneider Electric announced the integration of the March Networks Command video management system (VMS) with Sarix Series IP cameras, Spectra HD Dome PTZ and Sarix TI Thermal Imaging camera systems. The integration provides organizations with greater flexibility when selecting an IP video surveillance solution, and ensures faster, more cost-effective system deployment.

“We are excited by this support for our complete range of IP cameras, including our new Sarix Professional and Enhanced Ranges, by the March Networks VMS solution,” said Kristina Holmqvist, Business Development Manager EMEA at Pelco by Schneider Electric. “This integration provides the possibility for our joint customers to use our multipurpose range of cameras with March Networks' high performance solution.”

March Networks Command is a scalable, standards-based VMS designed to work seamlessly with leading security products and systems. This open approach makes it easy for customers to adopt the software solution and choose the IP edge devices that are best for their applications. Command is one of the only VMS solutions able to support complete surveillance system configuration and administration – in addition to live and archived video access – via its browser-based client interface.

Built upon the three pillars of innovative imaging science, sophisticated industrial design, and advanced processing power, Sarix delivers a crisp, clear image. With the Sarix Series, Pelco by Schneider Electric offers a complete line of IP bullet, box and dome cameras for any lighting condition, application and environment. All new Sarix cameras integrate with major third-party video management systems through the Pelco API, and other third-party software and systems through the ONVIF Profile S standard, and they work seamlessly with Pelco video management systems.

The deep Command 1.7 integration with Pelco IP cameras supports a complete list of capabilities including: audio capture; H.264, M-JPEG and MPEG4 video compression; multi-encoding; presets and tours; motion, Adaptive Motion and Directional Motion detection; and robust I/O and PTZ control.

“Working with best-in-class security manufacturers like Pelco to expand the choices available to our Command VMS customers is a priority for our company,” said Net Payne, Chief Marketing Officer, March Networks. “We are pleased to announce this integration and join Pelco's Partner First community.”

Morpho MobileTrace enhances passenger screening for JetBlue Airways

Morpho MobileTrace enhances passenger screening for JetBlue Airways

Editor / Provider: Morpho(Safran) | Updated: 4/11/2014 | Article type: Security 50

Morpho (Safran), through its subsidiary Morpho Detection, has announced a contract with JetBlue Airways for 14 handheld MobileTrace explosive trace detectors (ETD).

Under terms of the contract, MobileTrace will be deployed this year to meet enhanced U.S. Transportation Security Administration (TSA) passenger screening mandates for U.S.-bound flights from select JetBlue global locations. A powerful, user-friendly handheld, MobileTrace can simultaneously detect residue from explosives and narcotics in seconds on skin, clothing, parcels, bags, cargo, vehicles and other surfaces.

“Morpho thanks JetBlue for recognizing the operational and detection capabilities of MobileTrace by selecting it to protect travelers,” said Karen Bomba, president and CEO, Morpho Detection. “MobileTrace reflects Morpho's commitment to developing solutions that give airlines and airports the capabilities and mobility needed to protect travelers while planning for expansion and future security mandates.”

“Working with Morpho Detection has helped us upgrade our screening capabilities and maintain TSA compliance without impacting the customer experience,” said Ken Maxwell, Vice President of Corporate Security, JetBlue Airways.

IndigoVision regards access control and VMS most crucial in securiy systems

IndigoVision regards access control and VMS most crucial in securiy systems

Editor / Provider: IdigoVision | Updated: 4/10/2014 | Article type: Security 50

 John Semple, Head of Product Management for IndigoVision, explains the individual and collective strengths of Access Control and Video Management Software.

Both Access Control software and Video Management Software (VMS) have become vital components in modern security systems. However, many are confused as to how exactly the two should be deployed.

It is important to get this right, as the two have very different strengths and features, and deploying the wrong one as the front end could leave end users without features that could be useful, or even vital to their security system.

In this article, we will examine the strengths of both Access Control and VMS, and how the two can be used to enhance each other and provide a better all-round security system.

The Strength of Access Control
Access Control systems are designed with immediacy in mind. Whenever someone interacts with the system, by swiping an ID card for example, the system immediately informs the operator who is requesting clearance, and what they are attempting to access.

It does this by accessing an extensive database, which can include information such as names, pass codes etc.

One striking aspect of this process is how the system relies on the person in question co-operating with it; in order to be effective, it requires the subject to willingly interact with the system. Let's take, as an example, a member of staff walking up to a door to swipe their ID card; they actively wish to be identified as they know they are.

Access Control software, even with video integration, is designed for this type of installation. Video functionality is often a basic “live video” pop up, giving visual verification along with the Access Control database information.

Unfortunately, Access Control systems are ill-equipped to deal with an intruder actively seeking to bypass the system by forcing entry through a door or gate. It is also limited when dealing with intruders bypassing controlled entry points altogether by forcing entry through a window or fence. In cases such as this, basic video display in the Access Control software provides limited information beyond the initial alarm, making it difficult to establish precisely what happened and has limited pre and post-event video analysis capabilities.

The Advantages of Video Management
This is where VMS comes into its own, with its more proactive nature allowing it to detect intruders whether they choose to engage with the surveillance system or not.

This means that VMS can provide a complete visual account of events before during and after an incident, leaving operators in no doubt as to what transpired.

Indeed, the ability to review evidence from before during and after an event is one of VMS' greatest strengths. Designed with a more forensic-based approach in mind, VMS features tools, such as thumbnails and bookmarks, to allow specific clips to be marked, searched and reviewed effortlessly. The footage can then be easily exported to the appropriate authorities.

This means that VMS can quickly establish a detailed timeline of events leading up to and following the main incident, which can provide vital information in an investigation, or key evidence in a trial. IndigoVision's Control Center even water marks video, both at the point of recording and again at the point of export, to guarantee that the video is authentic and has not been tampered with.

The superior analytics the VMS supports such as motion detection are another asset, as they offer a wider variety of logics to trigger alarms. In the case of IndigoVision's Control Center there is an additional benefit in the form of Activity Controlled Frame rate, which allows cameras to function at low frame rate and only increase to full frame rate if an analytic is triggered with no impact on video quality, while greatly reducing storage.

It is also worth noting that the VMS offers far more comprehensive surveillance, for example if a building is protected by Access Control alone and a car outside is stolen, the system will be of limited help. A strong VMS however could capture the incident and provide valuable evidence to resolve the situation.

So while Access Control performs one specific function exceptionally well, VMS is able to provide the security surveillance for a variety of areas of the property to be secured, creating a more adaptable and comprehensive surveillance system. All of these features mean that VMS is highly effective in open areas, areas of high traffic where checkpoints are not feasible, or areas with multiple points of entry, such as an airport.

Integration – The Best of Both
With this in mind, it should come as no surprise to learn that Access Control and VMS providers have been working to integrate with one another.

This allows Access Control systems to employ more video functionality such as live & playback video and PTZ control & export, while VMS can monitor Access Control events such as elevator control, card tracing and advanced door monitoring.

In most cases though, it is still best to deploy Access Control and VMS side by side, as this creates a more robust and well-rounded system. If the security system has been designed around limited entry points, with Access Control entry, and the operator only requires a basic visual verification, then Access Control software may be sufficient.

However, the more advanced analytics and forensic capabilities of VMS, combined with its versatility and wider coverage, make it better suited for monitoring larger areas with numerous entry points. Therefore in these environments, VMS should be the front-end, with an integrated Access Control plugin to allow management of events and alarms.

Open Options, Entertech Systems and Suprema team up for integrated access control solutions

Open Options, Entertech Systems and Suprema team up for integrated access control solutions

Editor / Provider: Suprema | Updated: 4/10/2014 | Article type: Security 50

Open Options, an industry leader in open platform access control solutions, and ENTERTECH SYSTEMS, the official operating partner for Suprema, Inc. in U.S., Canada, U.K., Ireland and Puerto Rico, have joined to provide an integrated and reliable solution for mass adoption of biometric access control.

As a result of this partnership, Open Options' DNA Fusion access control software now integrates with Suprema's line of biometric fingerprint detection, card, and PIN devices, including BioStation T2, BioStation, BioEntry Plus, BioEntry W, and BioLite Net via ENTERTECH SYSTEMS' BioConnect application. Instead of having to manage badge records in two different systems – DNA Fusion for access control and another for the biometric templates – BioConnect is the sync between the two systems. This advantage results in allowing customers to enroll cardholders directly in DNA Fusion with information being passed to Suprema, which avoids having to enter duplicate data in two systems, saving time and labor.

DNA Fusion Version 6 – just released in March – features the expansive integration of third-party systems through Open Options FLEX API (Application Programming Interface) which provides a mechanism for external parties such as ENTERTECH SYSTEMS to develop an interface to Fusion software.

“This partnership enables ENTERTECH SYSTEMS to fulfill our mission to overcome three major obstacles to mainstream adoption of biometrics. With our BioConnect application coupled with the strength of DNA Fusion and Suprema devices, we are taking another strong step forward in reducing the cost, complexity, and user onboarding issues that have traditionally hindered biometrics adoption,” said Rob Douglas, Chief Executive Officer of ENTERTECH SYSTEMS.

“In addition to providing innovative access control solutions, Open Options develops strategic partnerships which we feel can lower the barriers to entry to newer and more sophisticated technologies such as biometrics. We are proud to be working with ENTERTECH SYSTEMS and Suprema as they are a market leader,” said Steve Fisher, Chief Executive Officer of Open Options.

Open Options products work together to provide a complete security solution including visitor management, photo ID, and more. The Open Options flagship access control software, DNA Fusion, is an open platform solution that interfaces seamlessly with other systems such as video, biometrics, and intercom. ENTERTECH SYSTEMS offers a variety of Suprema biometric technologies available for mainstream adoption and use in a wide array of markets, including critical infrastructure, healthcare, education, commercial and financial settings and more.

Axis to showcase new video surveillance at Counter Terror Expo

Axis to showcase new video surveillance at Counter Terror Expo

Editor / Provider: Axis Communications | Updated: 4/10/2014 | Article type: Security 50

As well as showcasing its latest network video innovations at the international security trade show, Axis will be joined by Digital Barriers, which specialises in advanced surveillance technologies to the international domestic security and defence markets.

Axis will be exhibiting at stand E45 at the event at the Olympia in London. At the Axis booth, visitors will get the chance to explore the benefits of network video solutions for any public infrastructure surveillance application, especially around the following areas:

* Efficient protection of people and property
* Reduced vandalism and crime
* Enhancement of the city's image
* Improved traffic monitoring.

Atul Rajput, regional director, northern Europe, Axis Communications, said: “The secret to success in the world of video surveillance is to create an environment where everyone can perform at their best while feeling safe and secure.

“Network video offers countless possibilities for infrastructure operators to integrate security, safety and production control in one system; a system that allows supervision of all processes, video surveillance, intrusion protection and access control to remote sites, several locations and, if needed, into one centrally-located control room and even on a smartphone!

“At the event, we hope to demonstrate to our guests that regardless of what other technologies are being used, the network camera should always be the starting point when planning and designing the surveillance and protection of critical infrastructure.”

Dave Oliver, director UK enterprise account sales at Digital Barriers, added: “We are very excited to be launching our SafeZone-edge embedded intrusion detection system at Counter Terror Expo. It combines performance, simplicity, resilience and affordability. It has been certified under the Home Office's i-LIDS scheme as a primary detection system for operational alert use in sterile zone monitoring applications. It provides a compelling new argument for Axis camera installers and operators to embed analytics at the edge of the network.”

Amongst others, Axis will be exhibiting the following products:
* AXIS P5414-E PTZ Dome Network Camera – Intelligent direct drive PTZ dome with HDTV 720p
* AXIS P8514 Network Camera - Eye-level covertly mounted HDTV camera
* AXIS P3384-VE Network Camera – Outdoor, vandal resistant HDTV fixed dome with outstanding video quality in demanding light conditions
* AXIS P1204 Network Camera – Miniature HDTV pinhole camera for discreet surveillance
* AXIS Q6045-S PTZ Dome Network Camera – Pressurised, stainless steel PTZ dome with HDTV 1080p

 

Increasing adoption of situational awareness systems in critical infrastructure

Increasing adoption of situational awareness systems in critical infrastructure

Editor / Provider: Michelle Chu, a&s international | Updated: 4/8/2014 | Article type: Infrastructure

Situational awareness has become a leading consideration in the protection of critical infrastructures, particularly for sites that want to conduct higher risk management and decrease the damage caused by potential threats. According to a market research report by MarketsandMarkets, the global security market for situational awareness systems — ranging from access control; physical security information management (PSIM) software; human-machine interface (HMI); video systems; and chemical, biological, radiological, and nuclear (CBRN) defense systems — is expected to generate revenue of US$168.3 billion by 2020, growing at an estimated CAGR of 10.1 percent from 2013 to 2020. Every critical site demands a different level of integration, mostly dependent on the possible challenges and threats.

Ranging from natural conditions to social demonstrations, critical infrastructures need to be prepared for whatever may jeopardize the security of their sites. Critical infrastructures often cover a vast area and contain hazardous substances, making them an even bigger challenge to protect. If a critical site is not properly secured, any attack could possibly lead to hazardous consequences. In order to be able to instantly respond to a threatening incident, the solution has to allow operators to deploy every subsystem in the site through the same centralized management platform. More importantly, the centralized management platform should be able to communicate with both new and legacy systems. To answer the unique requirements of the critical infrastructure sector, many situational awareness systems, particularly PSIM solutions, have been strongly promoted in this market.

ADOPTION OF PSIM
During the last few years, adoption of PSIM solutions has dramatically increased in the critical infrastructure sector. As an emerging segment, the PSIM market is estimated to grow at a CAGR of 25.8 percent from 2013 to 2019, due to the decreasing prices and increasing awareness among end users, according to Transparency Market Research. “It can be said that by pure volume, PSIM software may still be in the innovation phase of adoption, which is around 2.5 percent of all available customers; on the other hand, there are some indicators that suggest that PSIM software adopting has moved into an early adoption phase, which is around 13.5 percent of customers,” said Joshua Phillips, Director of Marketing of Enterprise and Critical Infrastructure of Video Intelligence Solutions at Verint Systems.

PSIM solutions are being increasingly used in government applications, such as law enforcement agencies, the military, ports, airports, transit systems, civilian agencies, and corporations with critical infrastructure assets. For instance, the city of Baltimore, U.S., has used PSIM to link assets and creat interoperability between around 50 agencies for large-scale public events. While, the new World Trade Center complex in New York City, U.S., has decided to use PSIM software as part of the ground-up solution for security and building management systems, according to Darren Chalmers-Stevens, VP of EMEA at VidSys.

PSIM: TOTAL INTEGRATION PLATFORM
PSIM solutions seem to be the answer to the demand of centralized management systems, offering efficient threat-response procedures. PSIM software provides organizations with a seamless interface, integrating security systems, building management, and on-site facilities and subsystems that enable operators to deploy every device when required. Furthermore, PSIM software is able to integrate systems — such as perimeter, intrusion/motion detection, video surveillance, access control, fire alarm, mass notification systems, audio, gas detection, radio communication, Internet, IT, and building automation — both legacy and new, making them interoperable on the same interface and workable with supervisory control and data acquisition (SCADA) systems.

Pre-Programmed Course of Responses
In addition to enhancing centralized management, PSIM software can proactively protect critical sites from potential threats and minimize damage with a series of coordinated and predetermined responses. “A PSIM solution allows organizations responsible for critical infrastructure protection (CIP) to take a proactive approach to security by implementing measures supported by resilient business processes for identifying, investigating, responding to, and recovering from a range of security threats,” stated Keith Bloodworth, CEO of CNL Software. “The pre-programmed response is done by tailoring the solution to manage the standard operating procedures as dictated by the plant or facility and by building an effective network of communications with external systems, and in an emergency, this may prevent a disaster turning into a tragedy with massive impact.” Once the system is aware of danger or an abnormal event around the site, the PSIM software will send out notifications to related individuals, and suggest a series of tailored operating procedures.

As an open software platform, PSIM software is able to integrate analog and IP-based devices and systems, aggregate information from all facilities, communicate among integrated systems, and then provide real-time alarm and event verification, as well as prioritize emergency response, which can ease labor intensive operations and increase efficiency, as Chalmers-Stevens explained. For instance, if an alarm is triggered by a sensor or motion detector somewhere on the site, corresponding live surveillance images from around the location will then be automatically presented to an operator in the security center. In the mean time, the geospatial location will be sent to the PSIM system, which then identifies the incident site on a map and responds to the threat accordingly. Since the threat-response procedures are all pre-programmed, any operator on that shift would know exactly how to deal with the problem.

REMINDERS BEFORE CHOOSING PSIM SOFTWARE FOR CIP
PSIM software is used for situation management; however, it has become harder to satisfy end users' requirements from various verticals, as this software is mostly focused on security and overlooks specific demands from different sectors. For example, “In areas subject to flooding and landslides, the cost-benefit of the pluviometer [rain gauge] integration far outweighs the value many PSIM solutions provide by integrating to the standard players in the security area,” Phillips pointed out. “The critical infrastructure customer finds it more affordable to replace one or more of the existing video systems than to wait for a PSIM provider to adapt to their environment.”

Despite the fact that PSIM software can provide critical infrastructures with a totally integrated platform, there are still some challenges that PSIM vendors have to contend with. One problem is reaching a consensus on total integration between all the departments in an organization, especially the IT and security teams. Since different departments have different security concerns, some might be nervous about sharing access to a database and servers on a centralized platform for example, according to Chalmers-Stevens.

In addition, critical infrastructure is a competitive sector in the security market, especially since required solutions and security management platforms can be provided by not only PSIM companies but many other VMS companies as well. A PSIM solution can be far above most end users' budgets — critical infrastructures usually have a higher budget for hardware, but software products are not always given the same consideration, according to Bloodworth. In order to deploy similar integration and management systems, end users must sometimes make compromises, opting for other affordable solutions and products that offer them acceptable and alike functionality.

FINAL WORDS
Even though past obstacles remain as issue, PSIM software manufacturers continue to pay attention to the education of end users in critical infrastructures every year. PSIM software, as an example here, demonstrates how important it is for critical infrastructures to improve their total security via situational awareness systems and the benefits they can get from the systems. It could be expected that, in addition to PSIM solutions, the adoption of situational awareness systems will peak significantly in the coming years.

Critical infrastructure aspires for comprehensive protection

Critical infrastructure aspires for comprehensive protection

Editor / Provider: Michelle Chu, a&s International | Updated: 4/8/2014 | Article type: Infrastructure

The critical infrastructure sector has been regarded as one of the most important sectors in terms of national security around the world since it is highly vulnerable to terrorist threats. There were about 2,500 attacks on critical infrastructures around the world that can be linked to terrorist organizations from 1996 to 2006, according to a report by Electric Power Research Institute. To prevent possible disastrous consequences, governments usually adopt various high-tech security products that come with better risk management systems and also higher prices. It is forecast that the global infrastructure market will grow from US$63.7 billion in 2013 to $105.9 billion in 2018, at a CAGR of 10.7 percent, by MarketsandMarkets. North America will remain as the market with the most revenue, whereas the markets in Latin America, the Middle East, and Africa are expected to experience greater market traction.

MAJOR SECURITY THREATS TO CRITICAL INFRASTRUCTURES
Critical infrastructures have always been one of the most prominent security focuses of national security. Critical infrastructures refer to several essential and fundamental facilities, interdependent systems, and assets that support a country's politics, economy, transportation, security, energy, health, education, communication, etc. — to put it simply, it has a huge impact on the public's daily activities. For instance, if any power plant is damaged, it can jeopardize a country's security and lead to unimaginable public consequences and inconveniences, as it can take several weeks to months for total site functionality to be restored.

Critical infrastructures are mainly threatened by terrorism, vandalism, intrusion, and espionage, and are often considered a major target of anti-government actions. These critical sites should also be protected from industrial accidents and natural disasters which will instantly endanger the public once they occur. If a dam, for instance, is sabotaged, the damage may cause insufficient water resources, flood control failure, agriculture irrigation failure, and even disable electricity from being generated around that area, or worse, across the country. If a power grid is attacked, the damage may lead to chemical leaks and cause further destruction.

An example of this is the power grid attack in California last April, which has recently been disclosed as an act of domestic terrorism, in which 17 transformers were fired at by unknown snipers for 19 minutes. The attackers had cut the fiber optic telecommunication cables in an underground vault near the site before entering the site and shooting at the oil-filled cooling systems of the transformers, causing massive oil leaks and the transformers to overheat. Fortunately, the damage was controlled; however, it still took 27 days for the facility and the damaged transformers to be repaired — each transformer can cost millions of dollars to build, according to a report by The Wall Street Journal.

KEY CHALLENGES IN CRITICAL INFRASTRUCTURE PROTECTION
A power grid is usually set up with multiple buildings, assets, and facilities, spread over a vast geographical area. Critical infrastructures generally invest in various technologies over time, resulting in the wide adoption of legacy and new devices, according to Darren Chalmers-Stevens, VP of EMEA at VidSys. Regarding overall size, number of buildings, and vast system deployments, managing a power grid in an organized manner is the primary challenge of protecting critical infrastructures. In order to efficiently and conveniently manage the entire energy station across multiple locations, it is crucial for critical infrastructures to centralize operations and increase situational awareness on both physical and logical threats through greater system integration.

MULTI-LAYERED PERIMETER DETECTION AT THE FRONT LINE
Risk management of critical infrastructures could be a great challenge to a site operating manager, due to complex deployment of disparate systems, devices, and facilities within a vast area. Critical infrastructures tend to favor multi-layered perimeter systems, which are able to comprehensively prevent various threats, like vandalism, trespassing, terrorist acts, and etc.

It is forecast that the global market size for electronic perimeter security sensors and video in electrical utilities and oil refineries will top $160 million in 2014, despite the economic slowdown in 2011 and 2012. This strong growth is resulting from the trend of using remote video and networked sensors in order to remotely configure and conduct devices from a distant location, according to a report by IMS Research, an IHS company.

For energy grids, any security threat or attack might lead to catastrophic results, which is exactly why managers are prone to using multi-layered perimeter detection systems.

A nuclear site is the perfect candidate for a multi-layered perimeter system. “A common architecture for nuclear power stations and other high security sites is an initial layer of a volumetric-tall sensor (4m to 6m high) with very high possibility of detecion; once an alert is generated, the intruder has to penetrate a fence which would delay the intruder for a few minutes to move on, even if the intruder is well equipped,” suggested by Hagai Katz, Senior VP of Marketing and Business Development at Magal Security Systems.

"Behind the layer, there is typically a clear space of about 10-meters wide; it is an area always kept clear, facilitating ease of verification, be it by cameras or another detection layer, such as microwave sensors, buried volumetric cables, or even IR detectors. And finally there is a second fence for further delay, which may be equipped with a smart fence mounted sensor.”

Integration of Video Surveillance and Intrusion Systems
In perimeter security, it is crucial to properly integrate video surveillance with intrusion systems. If individuals or vehicles intend to breach a critical site, the intruder will trigger the perimeter sensors. The system will then immediately send out a security notification to the command center with a corresponding image from the camera at the particular site so operators will know how to respond.

“Without integration between video surveillance and intrusion systems, it would be difficult to maintain a high level of awareness when a sensor detects a break-in — it would be time consuming for a security operator to find the appropriate video footage of an event,” Joshua Phillips, Director of Marketing of Enterprise and Critical Infrastructure of Video Intelligence Solutions at Verint Systems stated.

There could be up to hundreds of surveillance cameras installed at the site of an energy grid to make sure that the entire area is completely covered. As the front line of a critical infrastructure site, a perimeter system especially requires constant monitoring with surveillance devices, in order to have the site comprehensively controlled.

However, for the security guard and operator, it is almost impossible to continuously concentrate on watching every camera during their shift, not to mention identifying the correct on-site camera and location right when the security alarm goes off. Adopting video analytics not only helps the operator to prevent an intrusion or attack, more importantly, it makes sure that the guards and operators will not miss any suspicious actions. “Upon motion detection or other abnormalities detected, security operators can get a geospatial location on the targeted suspect and immediately dispatch a response,” Phillips mentioned. Physical motion detection can help security operators spot threats effectively even in harsh external conditions and weather.

A TOTAL INTEGRATION PLATFORM
A common goal, when it comes to critical infrastructure protection, is the ability for security guards and operators to identify and respond to threats in the shortest time possible. In order to immediately and efficiently react to possible threats on site for large-scale operations, it is crucial to have a central management system with an open platform to allow for integration between different security measures and subsystems.

Besides, security systems like video surveillance, access control, and perimeter security, a total management integration platform should be able to connect effortlessly with other major systems. These systems include IT, fire and smoke detection, alarm, extinguishing, telephone, radio communication, and building automation that might be in the critical sites. These systems should be easily integrated through a single platform, regardless if they are new or legacy products and devices.

This total integration platform can make sure that any operator is able to manage all systems on site whenever a natural disaster, unexpected incident, or attack occurs. “The integration of video surveillance, access control, intrusion alarm, and fire detection is an ongoing and growing phenomenon which requires a tailor-made approach on behalf of the vendors and integrators, as some of the systems, such as access control, are quite old, but still operable,” said Aluisio Figueiredo, COO of Intelligent Security Systems.

Providing a safety and security solution that integrates different systems into a single, multi-modal, administrative solution is not just about merging equipment, devices, and systems — it is about putting into place a solution to support clearly defined working routines whilst ensuring rapid, compliant, and efficient response to emergency situations along with the mandatory, post-incident reporting analysis, according to Siemens Building Technologies.

CONCLUSION
Security deployment in a critical site is never an easy task, as there are many obstacles and concerns, such as environment, budget, and consensus among every department, which will affect the final security procurement in a critical infrastructure. Despite the challenges, the security market in the critical infrastructure sector is still full of opportunities for providers due to its importance in national security and safety.

MOBOTIX presents first thermographic camera M15D-Thermal

MOBOTIX presents first thermographic camera M15D-Thermal

Editor / Provider: MOBOTIX | Updated: 4/7/2014 | Article type: Security 50

At 2014 Light+Building in Frankfurt, MOBOTIX presents its first thermographic camera M15D-Thermal, demonstrates its current camera platform with 5-megapixel technology and introduces new software developments as well as solutions in the area of building technology.

Other product highlights include, for example, the new, intuitive MxMultiViewer video management software, the T25 IP Video Door Station and the MxDisplay video remote station.

The new modules of the thermographic camera measure the thermal radiation of objects and persons and therefore work even in complete darkness. In connection with the MOBOTIX MxActivitySensor motion detection software, it is possible to detect movements in the image reliably also at night. Only changes in location trigger a signal, while objects moving in place do not. Also at daytime, thermal modules provide an advantage, because they also capture objects moving in the shadows, in twilight or behind bushes. The advantages of an M15-Dual camera with a thermal module and daylight sensor originate from the combination of both images: images taken by day or also in the twilight produce high-resolution 5-megapixel images, while movements at night are detected reliably. The MOBOTIX thermal modules have been certified as weatherproof according to IP65. Like daylight modules, they are available in different focal lengths.

Intuitive Video Management Software: MxMultiViewer
The MxMultiViewer video management software is a completely new development for PC, Mac and Linux systems that focuses on ensuring simple and intuitive use. Full screen display at a single mouse click, support for several screens and a transparent view of events and alarm messages are just some of the many advantages of the new software. Particularly outstanding is the automatic configuration of the extensive MxMultiViewer. All MOBOTIX components in a network are detected and pre-installed automatically. Thus, a complete network of cameras and door intercoms can be brought into use in just a few minutes, without a browser or additional software - free of charge, of course, from MOBOTIX.

Modular System for Building Technology: T25 IP Video Door Station
The T25 IP Video Door Station from MOBOTIX is a modular system for door communication and access control. The system supports the VoIP/SIP video telephony standard and can be upgraded or modified at any time. The camera module featuring innovative MOBOTIX 5-megapixel technology records all events taking place in front of the building or gate. Thanks to the special hemispheric technology, it provides a view without blind spots from wall to wall and from floor to ceiling. The T25 allows for all events in front of the door to be recorded with sound. It also provides for intercom communication and remote opening function - accessible anywhere in the world, for example using a PC or the MOBOTIX App. An integrated message function makes it possible to leave and listen to messages directly at the door. Further features include keyless entry via a PIN code, RFID transponder or, conveniently while away from home, via the MOBOTIX App. In combination with other installed MOBOTIX cameras and system accessories, the T25 can be expanded into a multifunctional comprehensive system.

Sees Everything: MxDisplay Video Remote Station
The MxDisplay is the fixed remote station for the IP video door intercom and stands out, in particular, for its intuitive and easy use. With only a few swipes, the user can call up, for example, an overview of the cameras in the building and the most recent video messages from the door intercom or generate a new access transponder for a guest. No matter which menu the user is in, a tap on the key icon immediately displays the live image of the door intercom. Keeping the button pressed a while longer will open the door. If necessary, this can be secured further using a PIN or transponder. The MxDisplay can be integrated flush with the wall and is available in black or white.

Another advantage of the MxDisplay is that it can be operated wirelessly. It can also be used as a base station for other displays in the building. Smartphones and computers can be used to log into the display via the network or integrated Wi-Fi in order to use all the functions in the same manner. A ringing at the doorbell is then forwarded to the smartphone or the workstation. Thanks to the Wi-Fi Access Point function, the MxDisplay creates Internet access for these smartphones and computers, which makes it unnecessary to set up an additional Wi-Fi system in the building.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page