You are at : Search > Articles Search Results

Articles Search Results

2187 Articles and 235 related Products found for software

Hikvision achieves risk management framework certification from US army

Hikvision achieves risk management framework certification from US army

Editor / Provider: Hikvision | Updated: 9/19/2014 | Article type: Security 50

Hikvision, one of the world's leading suppliers of video surveillance equipment, partnered with St. Louis, MO based NexGen Integration, a full-service security company, to equip the U.S. Army with a comprehensive security system at Fort Leonard Wood, a major U.S military facility. Hikvision's products passed a rigorous battery of tests to gain Risk Management Framework (RMF) certification, proving their resilience to vulnerabilities such as malware that would put the system at risk. The system was thoroughly custom-tailored by NexGen and Hikvision in order to deliver a superior performance that surpassed the military's high standards.

The most impressive aspect of this installation is its Certificate of Networthiness, as awarded by the United States Department of Defense. “Very few products and systems, past or present, carry this elite designation and meet the requirements of the RMF (and, previously, DIACAP) certification processes,” affirmed Chris Nickelson, co-owner of NexGen. “Hikvision equipment and support stand apart from the competitors,” added Dennis Deschler, NexGen co-owner. “The equipment is now riding on the government network and if they want it, it is a component of the DoD's Global Information Grid.”

An advanced security system was imperative for Fort Leonard Wood, a key military facility in the Midwest that serves as the headquarters of the Maneuver Support Center (MANSCEN) and the U.S. Army Corp of Engineers, as well as the training center for the Military Police. To secure the facility and its perimeter, it was crucial to record and stream at 30 FPS, but limited bandwidth, remote connection requirements, network policies, and integration with existing equipment were challenging.

“They needed 30 frames per second real time, all the time. You can miss things with motion detection,” Mr. Deschler reasoned. “Someone could drive back and forth for an hour before he drives into the motion detection grid.” Boasting an extremely minimal latency with their H.264 video compression, Hikvision's 9000 series Hybrid DVRs, 6701 / 6704 encoder modules and iVMS-4200 software proved to be the winning back-end solution for ensuring real-time streaming and recording with minimal bandwidth use. The innovative technology and feature-packed embedded OS of these devices helped overcome limited data capability. This allows for a scalable, flexible seamless migration to newer technology in the future, and eliminates the constant need for OS, Driver, and ePolicy updates required with PC-based technologies.

When the Army required a VMS that could operate under the RMF requirements, Hikvision rose to the occasion. To maximize ease of use, Hikvision's standard VMS and products have many advanced features that allow them to self-configure to a network. Because network traffic is inherently increased in this process—and with some of these features conflicting with RMF requirements—Hikvision's R&D team customized the iVMS-4200 software that is used at Fort Leonard Wood to bring it into compliance. “This functionality combined with the ‘real time all the time' capability of the installation means that its benefits are indisputable,” Mr. Nickelson asserted.

Jeffrey He, president of Hikvision USA, offered insight into the success of the installation at Fort Leonard Wood. “Hikvision provides flexible solutions that allow our customers to leverage their existing technology and investment, and gives them the freedom to transition into newer technology as it accommodates their needs,” he said. “We are honored that the tailor-made VMS software, along with the other Hikvision equipment serving the facility, has attained the highest mark of security designated by the U.S. Department of Defense. Our project with NexGen is a fantastic example of the kind of benefits our technology provides to the U.S. Government and similar end-users with a complex set of needs.”

Suprema integrates with Milestone video

Suprema integrates with Milestone video

Editor / Provider: Suprema | Updated: 9/19/2014 | Article type: Security 50

Suprema, one of the leading global providers of technology in biometrics and security, announced the integration of its access control and biometric solutions with Milestone video management software (VMS).

Make it Simple
Milestone and Suprema users can now seamlessly link cameras to access control devices, track access control events in Milestone VMS and display related recorded video. This integration is bringing convenience to the security industry, because operators can quickly react to events such as “Access denied”, “Door left open” and “Door forced” with a unique access to video and access control.

Ready Now
On Milestone's side, the integration supports XProtect Enterprise (including Professional and Express) version as well as XProtect Corporate (including Expert) version. On Suprema's side, both BioStar software Basic Edition and Standard Edition are supported.

Turnkey Solution
“The security industry has specialist in Camera, VMS, Access Control and Biometrics. This said, our customers think security as a single requirement.” said Young S. Moon, Vice President of Suprema “This way, our goal is to provide our customers with the turnkey package they are looking for. And this package includes Cameras, Video Management, Access Control and Biometrics.”

Suprema is the first biometric based solution provider to integrate with the Milestone XProtect Access Control Module. This achievement was possible thanks to the advanced knowledge and expertise of Smartprotect, a Suprema and Milestone partner. Smartprotect has already integrated Suprema and Milestone in early 2013 and this new 2014 integration is bringing convenience to the next step.

"This is advanced security system integration. In case of events such as a fire alarm being activated or a door being left open, the system issues a local audible sound and also displays the alarm on the operator monitor. In addition, issued alarms can trigger a predefined video management of the event, such as camera zoom and video sequence recording. So later, the operator can see the video evidence before/during/after the event. We know who has triggered an event, when and where. And also how was the event managed." explained Francois Malan, Director of Smartprotect.

A quick overview on the current secuiry market trend

A quick overview on the current secuiry market trend

Editor / Provider: Michelle Chu | Updated: 9/17/2014 | Article type: Hot Topics

Messe Frankfurt New Era, the leading integrated media service provider in Asia, today has held a seminar to share professional experience on security trend and industry aspects with providers in Taipei, Taiwan.

As IP system entered into the security market years ago, the entire industry has experienced a series of revolutionary changes. In today's market, in terms of deploying security systems, end users have more options than usual. A quick example, other than IP surveillance systems, end users can choose to update existing analog equipment to ccHDtv, CVI, TVI, or AHD systems in order to reach high-definition recording quality. Suppliers have realized that products make fewer profits now – the market has focused on systems integration, vertical applications, and multiple services.

It is all about intelligent and integration
End users started to set their eyes on intelligent systems and software that can provide added values on their business and management. The ideal of security is no longer merely about monitoring and access control; the ideal of security today suggesting surveillance, access control, and more importantly, making use of these data collected from security devices for managing purpose.

John Shi, the General Manager of Messe Frankfurt New Era, pointed out that future trend of the security industry will be about providing more integrated systems and platforms, such as physical security information management (PSIM), incident management system, and content analysis. The highly integrated platform helps critical verticals to achieve total security awareness for better protection; futhermore, it assists making effective business decision.

Personal device steps inside 
A prosperous potential can be seen in the consuming electronic market. Niche technologies are available for the end users now, for example, biometrics technique and NFC have been used on personal smart device. Intelligent systems can not only be used for professional surveillance, access control, business management, but also smart home and personal purposes.

The suppliers in the traditional security market are facing the same challenge – whether sticking to professional security product line or stepping into consuming product market at the same time.

 

New market strategy for the distributors
In order to survive all the challenges, distributors had to come up with more flexible market strategy. First of all, expanding the product line is a must. End users are looking for one-stop shop that provides all they need conveniently and skips possible technical problems; meanwhile, distributors have to be able to provide total solution to various verticals and projects. This trend indicates that distributor has to be able to supply various products (from the surveillance to storage, for instance), systems integration, and after-sale services that tailored to different cases.

Many leading providers in the market keep expanding local offices in order to provide the most instant services and to have connected relationship to the local market. On the other hand, providers tend to cooperate with more than one manufacturer just to make sure that they can provide solutions to any budgets and considerations.

Milestone solution partner GuardTrax integrates officer phone app with XProtect IP VMS

Milestone solution partner GuardTrax integrates officer phone app with XProtect IP VMS

Editor / Provider: Milestone Systems | Updated: 9/16/2014 | Article type: Security 50

GuardTrax announces the completion of a game-changing integration of the GuardTrax™ officer phone app with Milestone XProtect® video management software (VMS). This solution delivers unique threat alert, identification, video verification, resolution and reporting capabilities for security guarding companies, mobile patrols and in-house units.

The relationship between GuardTrax and Milestone Systems is built on the premise that platinum-level security involves physically present and mobile security personnel and surveillance equipment - all brought together via open platform video management software. Guarding companies whose officers use the GuardTrax app integrated with Milestone XProtect video gain entry into the new era of technology-based security.

For customers, the connection to the VMS platform expands alerts with video verification and real-time situational awareness, enhancing their security investment. Installing channel partners gain new sales and integration opportunities through close collaboration with the guarding company universe, GuardTrax and Milestone.

Rich Pekmezian, CEO of GuardTrax, says: "GuardTrax recognizes the significant role of the security officer in providing thorough security with physical response always at the ready. Our app is the connection between the security officer, surveillance equipment and video management. GuardTrax and Milestone see a strong partnership that is critical to provisioning today's most effective blended security solution.”

With this integration, the Milestone Mobile client and GuardTrax app are downloaded to the Android devices used by the mobile officers. GuardTrax alerts are also seen in the XProtect® Smart Client display at central operations or being shared with other security professionals. Officers can also generate incident reports from their devices while on the move.

Reinier Tuinzing, Strategic Partner Alliances Manager at Milestone Systems, says: “The industry has reached an inflection point realizing the need for more than just persons on location. Mobile security officers also need alerts with video verification to substantiate what is happening, where, and how best to respond to incidents.”

Every security incident or situation has a beginning and an end. Some incidences can be avoided while those that cannot need to be resolved quickly and properly. The GuardTrax/Milestone integrated solution provides real-time capture and consolidation of critical security threat data that can then be analyzed and acted upon to bring about optimal resolution.

In-person interviews with C-level execs in the guarding industry reveal that guard companies today must empower their officers and supervisors in a technology-forward fashion. Gone are the days of just sending an officer to a property with a notepad and flashlight. The research indicates that the GuardTrax app improves officer efficiency while lowering the cost base to provide premium guarding services. The GuardTrax/Milestone integration further aligns guarding companies with technology delivery so they are poised to realize new sales opportunities.

“Success for the channel is all about expanding business with new and innovative solutions to offer the customer. The GuardTrax/Milestone integration enables new service levels for guarding companies to be on the leading edge, and customers gain the rewards of safer environments,” says Tuinzing.

The GuardTrax/Milestone integrated solution will be demonstrated at the 2014 ASIS event to be held September 29-October 1 in Atlanta, Georgia, in Milestone's Booth 1043.

Cracking down on camera hacks

Cracking down on camera hacks

Editor / Provider: William Pao, a&s International | Updated: 9/17/2014 | Article type: Tech Corner

Recent reports on baby cam hacks raised new concerns over malicious intrusion into networked security devices. The threat is even more imminent for home and small business users who are not as well protected as their enterprise counterparts. Luckily for them, most of today's network camera manufacturers work hard to keep flaws to a minimum and equip their products with various security features.

Two recent incidents where baby cams were attacked by hackers caught the attention of vendors and users alike. One happened in Ohio just in April, when a couple was awoken late at night by strange sounds coming from the baby cam in their toddler's room, only to find that the camera had been taken control over by a hacker. A similar incident happened last year, when a Houston couple heard a man swearing through the baby cam in their infant's room and found out the Wi-Fi-connected device was hacked. In both cases, it was found that the cameras, made by the same vendor, contained security flaws that could easily be exploited.

In fact, hacking can happen to not just cameras but also practically any device on the Internet. Last year, the NAS device of a particular vendor was found to have a vulnerability potentially allowing attackers to execute arbitrary commands on the system. The vendor has since released a patch to solve this problem.

The above incidents illustrate the danger facing users of network cameras and other security devices, which may be targets for malicious intruders. That danger is even more imminent for home and SMB users who, unlike their enterprise counterparts, are not protected by firewalls or advanced perimeter defense software. What they can do to protect themselves has therefore become an urgent issue. Luckily for them, today's network camera makers work hard to minimize flaws and equip their products with various security features, which users should take advantage of to reduce the risk of these devices being hacked. “In general it is not possible to guarantee that computers and network devices do not contain flaws that may be exploited for malicious attack. However, there are measures that can be taken in order to reduce the risk considerably and eliminate the obvious flaws,” said Fred Juhlin, Senior Consultant for Solution Management at Axis Communications, whose Companion series targets home and SMB users.

Access
Unauthorized access to a system can be prevented by a simple yet effective method called password protection. Most network cameras today allow users to create their own usernames and passwords, which can be secured through various means. Zinwell, which makes power line-based home security cameras, has patented a technology that keeps passwords from being sent out to the Internet. “In that case, hackers won't be able to get passwords from the Web,” said Ben Huang, Senior Marketing Supervisor at Zinwell.

Encryption of passwords is another protection method. “The user has the option to let the system remember passwords, and if so the client protects the password with encryption,” said Juhlin.

Once a user accesses the camera, it's a good idea for the device to have multilevel access control based on the user's privilege. For example, a regular user may only view streaming video, while an administrator may access the camera's storage or control the device. In fact, most network cameras today offer this functionality. “This means users can control exactly who can see what in their system, and that their video is safe from any form of third-party manipulation,” Juhlin said.

Encryption
Many IP cams also allow encryption. The videos can be encrypted before being sent over to the network to make sure that unauthorized persons cannot view or tamper with the data. Different encryption technologies are used. One of the most commonly used is SSL/TLS, which encrypts contents with special codes that can be deciphered only by pairs of public and private keys, the latter of which are hidden in the computers of the communicating parties. As private keys can be obtained in a security breach, Bosch, whose Advantage line also targets home and SMB users, makes sure that this will never happen.

“The SSL private key of the device is stored securely on the smart card chip that is directly involved in the SSL connection setup. The private key never leaves the chip and cannot be read out even if the user has complete access to the device,” said Konrad Simon, Product Manager for IP Video at Bosch Security Systems. “This way no access is possible to the private key, even in a hostile approach someone would have achieved to read sensitive data from internal memory.”

Advanced encryption standard (AES) is a protocol that encrypts contents with 128-bit, 192-bit, or 256-bit keys, making encoded messages harder to decipher by untrusted parties. Among camera makers that use AES is Amaryllo, another home security camera maker. It uses 256-bit encryption, at the same time ensuring that video latency is less than 0.5 seconds.

Keeping Flaws to a Minimum
Vendors who are security-minded keep exploitable flaws to a minimum. One way to achieve this is checking third-party software regularly to make sure problematic software isn‘t incorporated into their products. As an example, to implement SSL encryption, many camera makers use OpenSSL, which drew huge attention in the security world in April when it was found it contained a bug called Heartbleed. If left ignored, Heartbleed could lead to the leak of sensitive data, such as usernames and passwords. One camera maker that managed to avert this disaster was Bosch. “We do not use OpenSSL as SSL implementation on our IP cameras, encoders, and decoders. The SSL implementation in our devices is not OpenSSL, nor is it related, so Heartbleed did not affect us at all,” Simon said.

Crowdsourcing, where users in a community share their collective wisdom, is another way to identify flaws and get them fixed. “We monitor discussions in the network community to quickly identify possible vulnerabilities which may impact our products. If a vulnerability is discovered, we will provide patches, firmware, risk analysis, or recommendation to our customers,” Axis's Juhlin said.

User Awareness
While camera vendors may have included a range of security features in their devices, users should also do their part by taking advantage of these features. For example, it's often the case that users simply use the camera maker's default username and password settings, which are easily obtainable. It is also important to check for notices on firmware updates or security patches, which are normally sent via e-mail. Moreover, users may consider isolating their cameras from a local network, since hackers may attack other devices in the network through the camera.

A Two-Way Street
Keeping hackers at bay requires a commitment by both vendors and users. The vendor should build their products with the concept of “security” in mind, while users should familiarize themselves with security features included in cameras and use them whenever possible. It's only through this two-way street can security camera users achieve their primary objective — keeping safe — without being harmed in the process.

Multi-channel retailing drives multi-faced retail models

Multi-channel retailing drives multi-faced retail models

Editor / Provider: Steve Chin, a&s International | Updated: 9/15/2014 | Article type: Hot Topics

More and more, retailers are looking into better and more efficient ways to reach out to their customers and enhance their shopping experience. Traditional shopping rules are being set aside for technological advancements and multi-channel retailing.

Hi, may I help you?” will probably be the first few words a customer hears when they enter a retail store. At first glance, one might think that the way people do their shopping, be it at a high-class luxury establishment or a simple grocery store, has really not changed all that much. In reality though, the retail industry is constantly looking for ways to evolve and improve both the customer's shopping experience and the security of their stores.

As Alex Johnson, Senior Director of Retail Technology at Verint Systems pointed out, “retailers now have an increased focus on improving the in-store customer shopping experience, whether it's through improved merchandising, better informed store associates, or decreased wait times and other initiatives.”

Another factor to take into account is the Internet. Nowadays, Internet access is so prevalent and so easily accessible that almost all traditional brick-and-mortar stores offer some form of online shopping. In fact, because it is so widespread and so available, it is incredibly easily to purchase anything from furniture to luxury goods to even groceries, all delivered right to your front door. The downside for retailers is that because their customers are now able to purchase products directly from their living rooms, it is becoming more difficult to have any physical interactions between them.

It goes without saying, the World Wide Web has become a significant part of our lives, with the ability to look up and execute just about anything that comes to mind. In this living, evolving world, tools like social media, online advertisements, and the ability to reach out to customers on a global scale represents a gigantic leap for retailers relative to a decade or two ago. Smartphones have emphasized this point even further. “Shoppers are more and more often using connected mobile devices during their shopping journeys, and both ‘showrooming' and ‘webrooming' are opportunities for retailers,” said George Shaw, Head of R&D at RetailNEXT. What this means in essence is that from a retailer's point of view, opt-in guest Wi-Fi and mobile device detection are rapidly growing areas of interest, and are some of the foundation blocks for personalization of the in-store shopping experience. All this can also link up to a concept called omni-channel retailing, which is one of the recurring trends being observed in the current retail industry. With the need to continually connect with their customers, retailers are constantly looking for faster and better ways to offer not just a better customer shopping experience, but more efficient support and cross-platform promoting.

Omni-Channel Retailing
A big thing to take note of is the concept of omni-channel retailing. This is basically a culmination of traditional brick-and-mortar stores combined with online support and shopping through apps on smartphones and tablets. This also expands even further into support across multiple cross-platforms. By utilizing omni-channels, retailers are able to compound on the ease of accessibility that customers gain by making everything from shopping, returning items, price matching, and customer support, all available from a customer's living room sofa. Customers can also see a much simpler and efficient system when they wish to return or exchange items, as purchases made through online methods can also be honored in-store.

Expanding on this idea even further, this is also a very easy way to obtain valuable information through data mining in order to better the retail customers' experiences. For example, by utilizing in-store Wi-Fi and mobile devices, retailers can determine what areas of the store are getting the most traffic and what places are lacking. The retailer can then respond by promoting the most popular products even further through cross platforms, be it on their online stores or through mobile devices, such as a special promotion for their store prior to logging onto in-store Wi-Fi. Data mining also helps retailers determine customer buying habits, and retailers can then respond by advertising store promotions that they currently have. By utilizing omni-channel retailing, retailers are able to cross-promote across all their available systems, not just simply putting up a window poster in their brick-andmortar stores. “The Internet is having a huge impact on how people shop. I see Internet purchases being much more common these days. Offers like Living Social helps drives sales further. Big box stores like Costco are also experiencing significant sales growth, and everywhere there is much more in-store comparisonshopping being done by smartphones,” John Sullivan, President of 360iQ explained.

Delving Further Into Analytics
In line with omni-channel retailing, traditional security analytics are also a factor. No longer just a security tool utilized to prevent crime, its uses are also becoming catered towards business intelligence and retail improvements. Johnson also explained that one of the most significant advancements made recently is leveraging video infrastructure to provide incremental business intelligence to assist retailers in operating their business.

Determents to retailers are things like long queues, ill-informed associates, and mismanaged marketing for products. Brian Lane, Director of Product at 3VR, especially pointed out the queue issue. “It can make for a miserable shopping experience. So much so, that they may shop somewhere else next time.” Some ways to combat this that solutions providers are quick to emphasize are analytics like queue management software that can count the number of customers entering stores and the number that are leaving. As Lane explained in greater detail, “Software like this determines the average shopping times of each individual customer, and can properly alert staff to add more associates to the points-of-sales (POS) systems in the store.” He also added, “the software can also use people counting, in conjuction with POS systems to determine the conversion rate of customers.” Sullivan also explained another method: “surveillance cameras are not only tracking the bad guys but also keeping an eye on the good guys in order to make their shopping experiences better than ever. Video analytics can create ‘heat maps' that show the so-called ‘Golden Path,' the most popular areas of the store — and how that might change during the day, week, or year.” This leads to better product and shopping knowledge, and retailers can adapt to the various scenarios.

Another example Sullivan pointed out is a demographic analytic, normally used for forensic research on recorded video. What this basically looks to do is to narrow down a search of a subject by their age and gender. Usually, this is utilized to identify possible subjects in crime. But on the business side, this same analytic can be used in the retail environment to help retailers understand the demographics of their customers. “For example, if a store were to run an ad for a sale in the newspaper one weekend, and on social media the next, the information returned would most likely result in a younger demographic the second weekend. This analytic can be used to test this hypothesis,” Lane explained. “If the store's merchandise is aimed at a younger audience, the effectiveness of advertising can be tested to target a specific demographic.”

High-End Luxury and Big-Box Franchise Retailing Develop with Personalized Approach
The differences are obvious when stepping into a Louis Vuitton store and when stepping into a Costco or when you walk into a Cartier store versus walking into the Wal-Mart electronics section. Right away, as soon as you enter high-end luxury retail stores, you notice a much more personal approach. Traditionally, “high-end retail has always been about differentiation, either with products, customer experiences, or both. Savvy retailers are now looking at technology to empower customizable, personalized shopping experiences, with the aim at creating a sustainable competitive advantage,” said Shaw. In short, there's always the VIP approach when it comes to high-end retail. The “everything is possible” motto comes to mind when referring to these luxury markets.

Things are a little bit different for big-box franchise retailing, as it is centered in such a competitive market. With so many different major brand names, again, one of the solutions for retailers is to make their retail stores really stand out. Provisions such as reward programs, discounts, and promotions offer customers reasons to continually shop at the same retailer. One solution being explored right now is data mining customer shopping histories and looking at the demographical differences: gender, age, and location. A way to execute this would be to have a loyalty or membership program whereas by customers signing up, they would be able to gain access to exclusive coupons or specials. In return, customers would give access to their shopping histories and shopping patterns and enable retailers a way to personalize their shopping promotions i.e. Customer A purchases bananas and apples this week and oranges and celery a week prior; there would be little point in sending promotions for t-shirts and DVDs). The whole goal is to make it a more personalized shopping experience by utilizing the customer's information from multiple channels.

Again, the idea of omni-channel retailing is applied to both high-end luxury market segments as well as the big-box retailing industry. While the target audience might be different, the end goals still remain the same: reaching out to customers and bettering the shopping experience in order to achieve better margin gains.

Roadmap to Better Retailing
One thing to keep in mind when it comes to retailing is continual technological advancements. Some key features to look out for include things like RFID technology becoming more widespread, with its use in real-time inventory management becoming one of the future key features. It will also soon be a huge data source for retailers as they control inventories and better manage its effect on cash flows and working capitals, as Shaw explained. Another important factor is mobile and even wearable tech (including products like: Google Glass, Apple's iWatch, and Samsung's Galaxy Gear), and how to take advantage of it. One achieveable method seems to be the idea of utilizing the NFC and Bluetooth features and directly “beaming” it to customers as they enter the store. It becomes important as time goes on for better and closer customer interactions and feedback, as well as the ability to properly market and promote products to the right demographics. Keep an eye out for such things like Bluetooth connectivity to in-store promotional specials, and better, even faster, and more efficient cross multi-channel retailing. This also ties into the omni-channel retailing factor, as technological advancements will only make cross-channel retailing more and more efficient.

The last thing to point out is that the human factor in shopping will never really go away. That's another reason why not everything is online, said Shaw. People still enjoy social interactions when shopping, and conversing with in-store associates and being attended to is still a big driver. In fact, when it comes to specialty products, retail sales associates are the biggest drivers of shopper loyalty and retention.

Top Retailing Conundrums Facing US Retailers
A quick glance on the Internet still reveals a few worries that retailers have to face. According to publication by Market Watch, the following are the top 10 risk factors, based on the opinions of the 100 largest US retailers.

1. General economic conditions ― This is far and away the number one reason, and quite understandable;
2. Federal, state, and local regulations;
3. Competition and consolidation;
4. Vendor concerns ― recession has hit the manufacturers just as hard;
5. Labor costs ― Rising medical costs, staffing costs, minimum wage raises;
6. Consumer trends;
7. Maintenance of IT systems ― Things like security systems, POS systems,and registers, are all expensive;
8. Privacy concerns related to security breach ― This is another big one that has made news headlines recently. Hackers breaking into online databases to steal people’s information and blackmailing them for payment.
8a. Consumer confidence and spending;
8b. Legal proceedings

Vicon names Eric Fullerton CEO and Director

Vicon names Eric Fullerton CEO and Director

Editor / Provider: Vicon | Updated: 9/15/2014 | Article type: Security 50

Vicon Industries has announced that its Board of Directors has appointed Eric Fullerton, formerly Chief Sales and Marketing Officer of Milestone Systems A/S, to succeed Kenneth M. Darby as Chief Executive Officer and as a Director of Vicon.

In its search for a new CEO, the Board sought a candidate who could return Vicon to prominence in the video security and surveillance systems market and also integrate the businesses and operations of Vicon and IQinVision, Inc. following their recently completed merger.

“We had very specific criteria for our new CEO, and we were highly strategic about finding the right person – Eric is that person,” said Julian A. Tiedemann, a Vicon Director, “No one better understands the market intersection of video management software and HD/megapixel cameras, which he demonstrated during his 10 year tenure at Milestone Systems, the world's leading provider of open platform IP video management software. Eric has a recognized ability to set strategy, lead teams and drive growth and innovation at the highest level. He is also a natural cultural fit for Vicon. This is a great development for our company.”

Following senior positions at netVigilance, Inc., Intel and Nokia, Fullerton joined Denmark based Milestone Systems A/S in 2004. During his tenure, the company grew from start-up to more than $70M in revenue and was named a Europe Fast 500 company.

“It is a great privilege to be asked to lead Vicon at this important juncture in the company's history,” said Fullerton. “I see great opportunities ahead for us by combining IQinVision's strong brand in HD/megapixel cameras with the long history that Vicon has in video management systems. I look forward to joining this great team.”

GKB IP solution deployed to safeguard the commercial building in Cebu

GKB IP solution deployed to safeguard the commercial building in Cebu

Editor / Provider: Sponsored by GKB | Updated: 9/12/2014 | Article type: Hot Topics

Background:
The Link is a 22-story commercial building for business process outsourcing (BPO) building located in Cebu IT Park, the Philippines, built in 2013. The Link was looking for high definition surveillance system to protect its tenants including IT companies, insurance companies, and banks in the building.

Solution:
A total of 45 IP Dome cameras have been installed in The Link building, used to monitor the elevators, lobby, main exits, offices, public places, and parking lot. Each camera has an embedded a 16G Micro SD card for back-up recording in case of network failure.

GKB provided a server-and-client structure IP solution that allows The Link to set up multiple monitors, making the live monitoring function does not interfere with the recording server and system.

The operation of the entire system is managed and coordinated centrally through Viewer 11 & NVR Server, two sets of comprehensive and intelligent security platform software by GKB.

Benefit:
The entire solution has led to several benefits as a result:
* A Flexible and Cost-Effective Solution When the system was designed, the idea of expansion was thoroughly considered. New cameras can be easily added without any extra license fee making this deployment an excellent return on investment.
* Clear and Clever Monitoring and Management Cloud NVR can remotely monitor and manage cameras from any device. Log in is as simple as entering your username and password. The Link can now remotely manage IP cameras easier than ever.

 

Sponsored by: 

About GKB GKB Security Corporation is a global security solutions provider with a full range of CCTV, IP, Mobile, Video Fire Detection System and Home Automation products and support services designed to meet the needs of small and medium-sized system integrators and security installers.

VIVOTEK surveillance system provides US school district open learning environment

VIVOTEK surveillance system provides US school district open learning environment

Editor / Provider: Sponsored by VIVOTEK | Updated: 9/15/2014 | Article type: Education

The Prairie Hill School District is a gateway community on the North East state line. The District is part suburb and 100% committed to offering the finest instructional program in the area. It believes that an effective instructional program requires a school environment where student safety is top priority. To ensure the safety of its students, as well as staff, the Prairie Hill School District recently deployed VIVOTEK network surveillance cameras with Exacq video management software.

While student safety is a main concern at the Prairie Hill School District, it is also important to create a friendly and open learning environment. With this in mind, the district was looking for an advanced surveillance system that could deliver clear and accurate image detail with fewer cameras installed as inconspicuously as possible.

With the recommendation from Professional System, Inc., a local provider of technology services, including surveillance system design, installation, and services, Prairie Hill School District decided to deploy the VIVOTEK network cameras because of their superior image quality, resulting in significantly fewer cameras needed and providing overall surveillance success while maintaining a friendly school atmosphere. “After comparing solutions from multiple manufacturers, it quickly became clear that VIVOTEK meets all the requirements,” said William A. Burton, President of Professional System, Inc. “With a mixture of indoor and outdoor VIVOTEK cameras, we were able to create a complete surveillance system that not only provides safety to students and staff, but also help the school to catch and record conflicts and interactions between students during school activity, which helped the school administration to control and maintain peaceful activity.”

A total of 196 VIVOTEK cameras ranging from 1 to 3 Megapixel resolution were installed throughout 8 campuses by Professional System Inc. in three installation phases to serve different surveillance needs. In phase one, a total of 74 VIVOTEK cameras were installed in interior and exterior areas throughout the main 3-story building for general surveillance, including 41 units of FE8171V, an outdoor vandal-proof fisheye camera with 360° field of view. FE8171Vs were mostly installed in the hallways and library because of their wide angle field of view which significantly reduce the amount of cameras needed for complete coverage. “One of the security concerns was monitoring incidents during break times when there were large amount of students moving between classes. Using a VIVOTEK FE8171V wide angle camera, we were able to capture a panoramic image that normally requires 2-3 IP cameras,” said William. “This installation not only resulted in significant savings to the school district, but also provided an open and friendly learning environment due to the discreet form factor of the camera housings.”

During the 2nd installation phase, 60 VIVOTEK cameras were installed mostly on the exteriors of the remaining 7 campuses, including multiple units of SD8314E, an outdoor pan tilt camera with 18X optical zoom to monitor parking lots and other outdoor activities. With the 18X optical zoom capability, an administrator can easily zoom into a particular area of interest to record important data, for example, license plate details. After the completion of installing all the outdoor cameras, Professional System plans to kick off the final installation phase in August 2014 to install additional 62 VIVOTEK cameras in the interior areas throughout 7 campuses.

The security team at the Prairie Hill School District seamlessly manages and monitors the recorded high definition video captured by VIVOTEK cameras using Exacq management software in the security office, with the surveillance video also being accessible by selected administrators, including the school Principal. The combination of VIVOTEK's cameras with Exacq management software has proven to be a reliable enterprise surveillance system. “We were impressed with how well VIVOTEK's cameras work with the Exacq software,” said William. “With the user-friendly features from Exacq and superior image quality from VIVOTEK cameras, we delivered the most ideal solution for our customer.”

With student and staff safety a key priority at the Prairie Hill School District, the new VIVOTEK surveillance system offers the ability to keep everyone safe while maintaining an open educational atmosphere. “The VIVOTEK surveillance cameras help the school to catch and record conflicts and interactions between students during school activity; this is a very important piece to help the school to control and maintain peaceful activity,” said Julia Veazey, Director of Technology at the Prairie Hill School District. “We are very happy with the result and look forward to deploying more VIVOTEK cameras later this year to further enhance the level of security across the board.”

Napco Security System software becomes Control4-certified

Napco Security System software becomes Control4-certified

Editor / Provider: Napco | Updated: 9/12/2014 | Article type: Security 50

Napco Security has announced that Napco Security System software has recently been Control4-certified. The new integration with the Control4 platform enables Control4 Dealers to quickly and easily integrate security within their projects and offer state of the art protection of homes and businesses.

The Napco Gemini Security Series is also the first security panel line to integrate with Control4's Simple Device Discovery Protocol (SDDP). With SDDP, the Control4 system can automatically find and add SDDP-enabled devices to the platform, dramatically reducing complexity and the installation time for Control4 dealers. Napco's Gemini Security System Alarm Panel is "automation-ready" and can be integrated to Control4 via Ethernet.

Napco's new system software allows Control4-supported devices to be managed based on activities detected by any NAPCO Gemini Security System Alarm Panel (GEM-P816 to GEM-X255) including 8 to 255 zone models, and supporting classic and contemporary Stay/Away Keypad functions. Control4 users can monitor, manage and control alarm panel activities such as arming while home or away with Contol4's 4Sight service providing Anywhere Access to its end users; disarming a burglar alarm or a fire alarm; or creating other alerts such as a specific zone opening and/or closing and execute actions such as lighting scenes.

"We are excited about the release of the NAPCO security panel driver. This release demonstrates our growing partnerships in building the connected home ecosystem with industry leading manufactures," says Paul Williams, VP of Security & Communications Products / Support Services. "This release also highlights our partner program and the ability for manufacturers to utilize our SDKs to create drivers that allow their products and solutions to be integrated in to the Control4 solution." Jorge Hevia, SVP Sales & Marketing for Napco said, "We're pleased to integrate Napco's security technology with the Control4 platform and enhance the consumer's smart connected home experience while expanding our availability within the custom integration market."

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page