BenchmarkJuly2019
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
TECHNOLOGICAL INNOVATION & SMART SOLUTIONS<br />
Smart Solutions: Adding Benefits<br />
Network Zone: Switch Specifications<br />
12 to Try: Video Archiving<br />
Round-Up: Technical Innovation<br />
July 2019<br />
BENCHMARK<br />
Mainstream VMS Options<br />
Benchmark assesses VMS software for mainstream applications<br />
Tested: Texecom Micro Shock-W<br />
Technology: The Benefits of GPUs
DRILL. FIX.<br />
CLIP. COVER.<br />
INSTALLATION MADE SIMPLE.<br />
The X Plus Series combines the Wisenet chipset with<br />
a magnetic modular design. The four-part design was<br />
developed to make installation as quick and easy as possible.<br />
eXperience it now at WisenetX.com
BENCHMARK<br />
BENCHMARK<br />
Technological Innovation & Smart Solutions<br />
At Benchmark, we passionately believe that the future growth and<br />
development of the security sector depends upon the creation of<br />
flexible, scalable and effective solutions. As technology delivers<br />
ever increasing levels of functionality, so the ability to integrate<br />
elements such as business intelligence and smart management create a<br />
more valued proposition for all concerned. This brings together<br />
enhanced security with truly beneficial solutions.<br />
We believe that by embracing the new and emerging technologies,<br />
and by adopting a more holistic approach to encompass the inherent<br />
flexibility they offer, credible solutions that deliver enhanced protection,<br />
security and business benefits can be realised.<br />
Through independent testing, system and technology assessments,<br />
field-based analysis, educational articles and informed debate,<br />
Benchmark provides vital information to those seeking to create best-inclass<br />
solutions. The editorial materials included in the magazine and its<br />
on-line initiatives ensure that those who offer bespoke advanced<br />
solutions have access to honest, independent and relevant reporting<br />
that aids and supports them in their work. All editorial content is<br />
exclusive to Benchmark and is based upon real-world field trials, not on<br />
theoretical documents produced by manufacturers.<br />
Benchmark delivers its content via a monthly print-based<br />
publication, as well as a number of interactive electronic initiatives. By<br />
realising the potential that new technologies offer, enhanced solutions<br />
that deliver security and business benefits can be realised.<br />
Benchmark Independent Testing<br />
Benchmark Recommended<br />
Status is awarded to<br />
products that undergo the<br />
independent testing and<br />
assessment process and are considered<br />
to deliver genuine benefits in the<br />
design and creation of innovative and<br />
smarter solutions. Products which<br />
receive Recommended status have<br />
undergone testing and have reached a<br />
high standard.<br />
Benchmark Outstanding<br />
Status is awarded to<br />
products that undergo the<br />
independent testing and<br />
assessment process and are considered<br />
to deliver invaluable benefits to those<br />
designing and installing innovative and<br />
smarter solutions. Products which<br />
receive this status have undergone<br />
application-specific testing and have<br />
reached the very highest standards.<br />
Because products and<br />
systems in the electronic<br />
security industry are varied,<br />
there are inevitable price<br />
differences. Benchmark always<br />
considers the price/performance ratio,<br />
and makes adjustments to ratings to<br />
reflect value for money. In group tests,<br />
the product which delivers the best<br />
price/performance ratio receives the<br />
award of Benchmark Best Buy.<br />
3
VISIT US AT STAND F410<br />
Inner Range’s Integriti<br />
High Security System is<br />
a complete Hardware/<br />
Software solution designed<br />
<br />
installations.<br />
Our range includes:<br />
All Software<br />
Hardware Controllers<br />
End of Line Modules<br />
Power Supplies<br />
Keypads<br />
Enclosures<br />
Communications Devices<br />
Access Control Readers<br />
Credentials<br />
WHY TAKE CHANCES?<br />
FULL END TO END DATA ENCRYPTION EXTERNALLY CERTIFIED<br />
T: +44 845 470 5000 | E: ireurope@innerrange.co.uk innerrange.co.uk
JULY 2019<br />
Contents<br />
Editor<br />
Pete Conway<br />
E-mail: pete.conway@benchmarkmagazine.com<br />
Advertisement Manager<br />
Nick Tiday<br />
Tel: 020 8295 8302<br />
E-mail: nick.tiday@benchmarkmagazine.com<br />
Production<br />
Matt Jarvis<br />
Tel: 020 8295 8300<br />
E-mail: matt.jarvis@proactivpubs.co.uk<br />
Administration<br />
Tracey Cole<br />
Tel: 020 8295 8306<br />
E-mail: tracey.cole@proactivpubs.co.uk<br />
ISSN: 1750-1040<br />
Editorial and Advertisement Office<br />
PO Box 332<br />
Dartford<br />
DA1 9FF<br />
© Pro-Activ Publications Ltd 2019<br />
All rights reserved. No part of this publication may<br />
be reproduced or transmitted in any form or by any<br />
means, electronic or mechanical, including<br />
photocopy, recording, or any information storage and<br />
retrieval system, without permission in writing from<br />
the publisher.<br />
Benchmark reserves the right to alter, abridge or<br />
edit any submissions prior to publication. The views<br />
published in Benchmark are not necessarily those of<br />
the publisher.<br />
While every care has been taken to ensure<br />
accuracy in the preparation of material included in<br />
Benchmark, the publishers cannot be held responsible<br />
for the accuracy of the information contained herein,<br />
or any consequence arising from it. In the case of all<br />
product reviews, tests and assessments, judgements<br />
have been made in the context of the equipment<br />
supplied at the time of the review. Any judgements are<br />
based upon situations relevant at the time of writing,<br />
and comments relating to cost are based upon<br />
published prices available from major distributors.<br />
Comments are based upon products and systems<br />
currently available in the UK market-place.<br />
7 Editorial<br />
The introduction of the Secure by Default<br />
specifications will impose stringent cybersecurity<br />
measures on surveillance devices.<br />
8 Test: VMS for Mainstream Sites (Part 1)<br />
Benchmark looks at VMS packages which are<br />
ideal for mainstream applications, with Hanwha<br />
Techwin’s Wisenet Wave and CathexisVision 2019<br />
from Cathexis.<br />
18 Smart Solutions<br />
Benchmark looks at how integrators and<br />
installers can enhance the smart benefits of their<br />
systems using emerging technologies.<br />
22 12 To Try: Video Archiving<br />
Benchmark looks at a dozen products and<br />
services which will be of interest to those<br />
integrators and installers delivering video<br />
archiving.<br />
28 Test: Texecom Micro Shock-W<br />
Texecom’s Premier Elite Micro Shock-W offers<br />
something different when considering the use of<br />
shock sensors.<br />
31 IFSEC 2019<br />
This year’s event will see the launch of the Secure<br />
by Default standard, introduced by the<br />
Surveillance Camera Commissioner.<br />
36 Sign up for Benchmark E-News<br />
Stay updated with the Benchmark E-News service<br />
and keep informed about tests, assessments,<br />
innovation and smart technologies.<br />
39 SiX Event<br />
For system integrators and security installers, the<br />
SiX event in Manchester represents an<br />
opportunity to find out more about new and<br />
emerging technologies.<br />
40 Smart Solutions: Building Management<br />
Benchmark looks at how the COSMO PSIM+<br />
system can add value for end users by simplifying<br />
integration with other systems.<br />
43 Network Zone<br />
A guide to understanding the specifications when<br />
selecting a switch for use in a security-based<br />
networked application.<br />
49 Innovation Focus<br />
Benchmark rounds-up a number of products,<br />
services and solutions which offer an innovative<br />
option for forward-thinking engineers.<br />
60 The Benefits of GPUs<br />
Manufacturers are increasingly offering GPUbased<br />
hardware, but what do these chipsets do?<br />
66 Benchmark Innovation Awards 2019<br />
The finalists for the 2019 awards are announced,<br />
with a look at the various products from all<br />
security disciplines.<br />
74 Benchmark Online<br />
Benchmark’s website is a valuable resource for<br />
those seeking to deliver smart solutions.<br />
8<br />
28<br />
43<br />
5
Start<br />
your free<br />
trial today!<br />
Manage, configure and control your<br />
alarm system portfolio<br />
• Scheduled Remote<br />
Maintenance<br />
• Instant Health Check<br />
• Automatic Reporting<br />
Remote Maintenance<br />
Texecom Cloud’s built-in remote maintenance and Health Check<br />
services automate and record the maintenance process, making it easy<br />
for installers to offer maintenance contracts and saving unnecessary<br />
site visits - adding recurring value to end users and saving installation<br />
companies time and money.<br />
Sales:<br />
+44 (0)1706 212524<br />
www.cloud.texe.com<br />
18-20 June 2019<br />
ExCeL, London, UK<br />
VISIT US:<br />
STAND<br />
IF2210
COMMENT<br />
Editorial Comment...<br />
The UK Surveillance Camera Commissioner<br />
has announced plans to launch a Secured<br />
by Default CCTV Requirements standard<br />
on 20 June 2109. This is in response to<br />
concerns over the cybersecurity risks inherent<br />
in video surveillance hardware, and follows a<br />
number of high profile media reports about<br />
how CCTV devices are often a weak point in<br />
terms of cyber crime for many businesses and<br />
organisations.<br />
Of course, while many of the reports<br />
insinuated that CCTV as a whole was a risk in<br />
terms of cybersecurity, the majority of cases<br />
were either related to DIY or consumer home<br />
products which had been installed and<br />
configured by members of the public, or<br />
covered OEM products made for brands which<br />
professional integrators and installers simply<br />
would not use.<br />
Despite the fact that most end users<br />
wouldn’t know the difference between the<br />
products being highlighted in the media and<br />
the professional systems they’d invested in,<br />
the various associations and organisations<br />
which claim to represent the industry didn’t<br />
respond to point out where the issues laid.<br />
The result is the Secure by Default<br />
Requirements, and despite the drivers behind<br />
this initiative, it could be a good thing for the<br />
professional security systems sector, and for<br />
integrators and installers working with<br />
professional equipment.<br />
The DIY and consumer sectors must achieve<br />
a balance between ease of use and device<br />
security. These products must appeal to<br />
people with little or no technical skills. Sold in<br />
large numbers to members of the public with<br />
poor IT acumen, the manufacturers simply<br />
cannot (or will not) invest in support for the<br />
devices. Therefore, if products are complex to<br />
set-up and use, people will simply return<br />
them, and poor reviews will damage sales.<br />
These DIY devices rely on simplicity for the<br />
use, even if that means allowing them to use<br />
the devices in an insecure mode. These are<br />
the types of devices which caused many of the<br />
issues in the first place.<br />
For integrators and installers, adhering to<br />
Secure by Default Requirements should not<br />
The concerns of end users with regard to the<br />
cybersecurity of surveillance devices has largely<br />
been driven by reported cases which carry a<br />
substantial amount of misinformation. However, the<br />
resulting proposals for a ‘Secure by Default’<br />
standard have to be applauded, if only because it<br />
ensures all manufacturers implement stringent<br />
measures which will ultimately assist system<br />
integrators and security installers.<br />
be an issue, and indeed many higher end<br />
surveillance products already offer the<br />
features and functions required for such a setup.<br />
Additionally, these manufacturers also<br />
offer a wealth of support to help enforce<br />
cybersecurity.<br />
The Secure by Default Requirements will be<br />
good news if – and it’s a big if – the self<br />
certification process is carefully scrutinised<br />
for all products, especially those aimed at the<br />
DIY and consumer markets, and if they’re<br />
widely promoted, not the industry, but to end<br />
users in all sectors so they understand to look<br />
for the mark when buying a solution.<br />
If this isn’t done, then the whole exercise<br />
could be a wasted effort.<br />
The Secure by Default Requirements will be good news if – and it’s a<br />
big if – the self certification process is carefully scrutinised for all<br />
products, especially those aimed at the DIY and consumer markets.<br />
7
BENCHMARK TEST<br />
TEST: VMS for Mainstream<br />
Applications (Part 1)<br />
Cathexis: CathexisVision 2019<br />
CathexisVision 2019 is available in four variants: Lite,<br />
Core, Professional and Premium. The Lite and Core<br />
versions support 48 cameras and a single server. Core<br />
allows an increased number of connections and<br />
includes additional event management tools, plus is upgradable. The Professional version<br />
supports up to 150 cameras and unlimited servers, while the Premium package offers unlimited<br />
cameras and servers.<br />
For mainstream applications, the choice is most likely to be Lite or Core. The main difference<br />
between the two is the number of simultaneous connections (3 and 7 respectively), and Lite<br />
does not support Email- and SMS-based notifications, or Event Alarms. Both versions support<br />
VMD and ANPR, along with various event management and alarm handling functions. Events are<br />
managed by Rules which can be configured for a variety of requirements.<br />
CathexisVision 2019 is an open platform VMS. It is made up of a server package for system<br />
management and a client for connection. The Server package can be used if there isn’t a need<br />
for remote connections to the server, which may be the case in many mainstream applications.<br />
Hanwha Techwin:<br />
Wisenet Wave<br />
Wisenet Wave is an open platform<br />
VMS from Hanwha Techwin. The VMS is available in a single edition and expansions are handled<br />
by licence additions. This means that the feature-set and functionality remains the same,<br />
whether the software is used for small systems with a few cameras of for fully blown complex<br />
solutions.<br />
Wisenet Wave-based systems can support up to 50 servers in total, with a maximum of 128<br />
streams per server and up to 50 clients per server. The VMS can manage video streams in a<br />
range of formats including H.265, H.264 and MJPEG. It also supports AAC, PCM, G.726 and MP3<br />
audio formats.<br />
The software runs on Windows or Linux operating systems. It allows the use of Hanwha<br />
Techwin Wisenet devices; third party devices are supported either via integrations or by way of<br />
ONVIF protocols.<br />
Hanwha Techwin provides a list of supported devices, which offers greater detail of the<br />
functionality that is supported on specific units. The list includes devices from over 250<br />
manufacturers, with almost 4,000 devices directly supported.<br />
Other features include failover to ensure reliability in critical applications and video<br />
transcoding, offering a higher degree of flexibility when dealing with archived footage.<br />
Next Month: Part 2<br />
Benchmark will look at other mainstream VMS software options from a number of<br />
other manufacturers, including Milestone Systems and Axis Communications, to<br />
establish which packages are best suited to the needs of integrators and installers<br />
serving the general surveillance markets, and revealing which packages offer the<br />
best options.<br />
8
BENCHMARK TEST<br />
In the past the mainstream video<br />
surveillance market was very much<br />
hardware-centric when it came to recording<br />
and system management. However, with<br />
today’s evolving technological landscape, the<br />
case for open platform VMS solutions is<br />
becoming ever more compelling.<br />
The leading VMS packages often combine<br />
video management and recording, IVA<br />
implementations, as well as integrations with<br />
access control, perimeter and intruder<br />
detection, building management, business<br />
intelligence and a host of other sub-systems.<br />
In many cases, a VMS can provide an<br />
advanced and flexible security management<br />
solution which is highly cost-effective. The<br />
depth of flexibility and the ability to create<br />
truly bespoke solutions can be deployed in<br />
many different ways.<br />
There are a number of driving factors when<br />
specifying a VMS-based system for<br />
mainstream applications. The systems deliver<br />
simple installation and integration of a wide<br />
range of third party devices. Open platform<br />
VMS packages support the majority of devices<br />
from professional security manufacturers,<br />
with the market-leaders boasting thousands<br />
of supported products. This eliminates<br />
frustrations associated with single-brand<br />
hardware options.<br />
Often hardware-based recorders have<br />
limitations with regards to third party<br />
The growth in VMS deployments for video<br />
surveillance and security management has grown<br />
significantly in recent years, and for good reason.<br />
Many VMS providers take an open platform<br />
approach, ensuring third party devices can be easily<br />
supported. This enables the creation of ‘best of<br />
breed’ solutions. While often considered as an ideal<br />
solution for large and complex sites, VMS systems<br />
have increasingly won favour with integrators and<br />
installers for mainstream applications due to their<br />
highly flexible capabilities.<br />
compatibility. Many NVRs only support the<br />
manufacturer’s own cameras and codecs,<br />
along with a few models from partner<br />
companies. In some cases, future firmware<br />
upgrades don’t support new camera models,<br />
so systems cannot be upgraded as<br />
technologies advance.<br />
Not only will an open platform VMS offer a<br />
vast array of supported third party models,<br />
but because drivers have been created<br />
specifically for the individual devices, all<br />
features should be supported.<br />
Another driver for the deployment of VMS<br />
solutions is the fact that they are scalable and<br />
9
BENCHMARK TEST<br />
upgradable. As the system is software-based,<br />
new developments can be quickly<br />
implemented, ensuring end users can realise<br />
the full potential from their investment.<br />
Many integrators and installers who switch<br />
to VMS platforms find the functionality and<br />
flexibility on offer is far in excess of what is<br />
available from similar hardware solutions.<br />
Additionally, they discover the available<br />
features are also superior to those available<br />
from higher cost hardware-based options.<br />
Cathexis: CathexisVision 2019<br />
CathexisVision 2019 is available in four<br />
variants: Lite, Core, Professional and<br />
Premium. The Lite and Core versions support<br />
48 cameras and a single server. Core allows<br />
an increased number of connections and<br />
includes additional event management tools,<br />
plus is upgradable. The Professional version<br />
supports up to 150 cameras and unlimited<br />
servers, while the Premium package offers<br />
unlimited cameras and servers.<br />
For mainstream applications, the choice is<br />
most likely to be Lite or Core. The main<br />
difference between the two is the number of<br />
simultaneous connections (3 and 7<br />
respectively), and Lite does not support Emailand<br />
SMS-based notifications, or Event Alarms.<br />
Both versions support VMD and ANPR, along<br />
with various event management and alarm<br />
handling functions. Events are managed by<br />
Rules which can be configured for a variety of<br />
requirements.<br />
CathexisVision 2019 is an open platform<br />
VMS. It is made up of a server package for<br />
system management and a client for<br />
connection. The Server package can be used if<br />
there isn’t a need for remote connections to<br />
the server, which may be the case in many<br />
mainstream applications.<br />
The VMS server makes use of a single<br />
executable installation package. This is just<br />
over 350MB in size, which is pretty lean for a<br />
modern VMS.<br />
The smaller file size also means the<br />
installation process, which is very<br />
straightforward and truly is a one-click<br />
process – runs without issues. The installation<br />
time was a fraction over 1 minute 20 seconds.<br />
Once installed, the VMS runs a short<br />
‘optimisation’ program. This gives some<br />
simple set-up choices and manages some of<br />
the Microsoft services. This process takes<br />
around 20 seconds.<br />
Effectively, in just under two minutes, you<br />
have a VMS loaded and ready for<br />
configuration.<br />
CathexisVision uses a mixture of tabs,<br />
menus and contextual menus for navigation. It<br />
does take a few minutes to acclimatise<br />
yourself to the interface, and whilst the vMS is<br />
accompanied by a relatively straightforward<br />
PDF manual, it is arguably quicker and work<br />
your way through the screens, remaining<br />
aware that many of the contextual options will<br />
change depending upon the screen you’re<br />
viewing.<br />
While some VMS packages can seem<br />
overwhelming to new users, especially when<br />
they present a seemingly limitless list of<br />
options, CathexisVision at first seems almost<br />
minimal. However, the menus and<br />
configurations you’re presented with are<br />
always pertinent. We recently saw a VMS<br />
where motion detection needed to enabled,<br />
but the simple tick-box to do this wasn’t on<br />
the motion detection page. It took around 15<br />
minutes to find it. This won’t be an issue with<br />
CathexisVision 2019 as controls are logically<br />
grouped.<br />
Adding and managing devices is quick and<br />
straightforward. If you want to add a single<br />
device you can enter its config details and<br />
search for it. Additionally, by clicking the Scan<br />
button, the VMS runs an auto-discovery<br />
wizard, identifying all attached discoverable<br />
devices. The GUI doesn’t make it clear that<br />
this is an option, but it does work.<br />
There is a camera optimisation wizard<br />
which sets streams from the device, inputs,<br />
outputs and triggers. Once the cameras are<br />
configured you can select the database for<br />
archiving, along with recording parameters for<br />
events and for analytics.<br />
The menus are clean and intuitive, making<br />
the various set-up processes easy to follow. If<br />
the truth be told, the GUI lacks the stark and<br />
modern feel many VMS providers go for, but<br />
the speed of flow of the software more than<br />
makes up for the looks.<br />
The Events menu includes four tabs:<br />
General, Trigger, Action and Resources. The<br />
General menu simply requires the event name<br />
and description if required. It also allows<br />
scheduling to be applied. Where workflows<br />
are used, the event can also be allocated a<br />
priority.<br />
Triggers allows configuration of alarms,<br />
events or other conditions which initiate an<br />
automated event. Either standard or advanced<br />
triggers can be used, and the time of<br />
triggering (when or while) can be set: the<br />
difference is a trigger when an activation<br />
occurs, or while the trigger is active.<br />
Dependent upon the programmed trigger<br />
events, the options change form device to<br />
device.<br />
The Actions tab dictates the results of an<br />
event, and can include device-specific or<br />
10
Save<br />
the<br />
Date...
BENCHMARK TEST<br />
system-based activity, and the final tab,<br />
Resources, enables control over devices that<br />
are related to events.<br />
The Events functionality is simple to<br />
implement and works well, with a good<br />
degree of flexibility.<br />
Management of playback is also good, with<br />
some interesting features such as motion<br />
search and activity trails. These features are<br />
configured via the motion database and use<br />
metadata. Motion search is self explanatory,<br />
while activity trails present a time-stamped<br />
heat map which can prove useful in low<br />
activity scenes.<br />
CathexisVision 2019 delivers a good degree<br />
of functionality in a lean and easy to configure<br />
VMS.<br />
Hanwha Techwin: Wisenet Wave<br />
Wisenet Wave is an open platform VMS from<br />
Hanwha Techwin. The VMS is available in a<br />
single edition and expansions are handled by<br />
licence additions. This means that the featureset<br />
and functionality remains the same,<br />
whether the software is used for small<br />
systems with a few cameras of for fully blown<br />
complex solutions.<br />
Wisenet Wave-based systems can support<br />
up to 50 servers in total, with a maximum of<br />
128 streams per server and up to 50 clients<br />
per server. The VMS can manage video<br />
streams in a range of formats including H.265,<br />
H.264 and MJPEG. It also supports AAC, PCM,<br />
G.726 and MP3 audio formats.<br />
The software runs on Windows or Linux<br />
operating systems. It allows the use of<br />
Hanwha Techwin Wisenet devices; third party<br />
devices are supported either via integrations<br />
or by way of ONVIF protocols.<br />
Hanwha Techwin provides a list of<br />
supported devices, which offers greater detail<br />
of the functionality that is supported<br />
on specific units. The list includes<br />
devices from over 250<br />
manufacturers, with almost 4,000<br />
devices directly supported.<br />
Other features include failover to<br />
ensure reliability in critical<br />
applications and video transcoding,<br />
offering a higher degree of flexibility<br />
when dealing with archived footage.<br />
Wisenet Wave uses a Rules engine<br />
to manage the relationship between<br />
triggers and actions. Triggers can<br />
come from a variety of sources<br />
including the server or connected<br />
devices.<br />
Wisenet Wave is supplied as a<br />
Server and Client bundle (these can<br />
be obtained separately). It is a very<br />
lean package, weighing in at 124MB for both<br />
elements as single executable file. As is<br />
expected from such a lean file, the installation<br />
time is very short at 35 seconds. Establishing<br />
a site merely requires a name and password<br />
to be created, so in less than a minute the<br />
VMS is up and running and ready to configure.<br />
The process of installation and basic<br />
configuration is very straightforward.<br />
Discovering devices works well, although we<br />
did find the range of support wasn’t as great<br />
as some other VMS options. Once cameras are<br />
added, the recording and alarm parameters<br />
are set up via simple menus with easy-to-use<br />
interfaces.<br />
This is also the case when managing<br />
alarms. The VMS makes use of a clean and<br />
intuitive interface and makes use of<br />
contextual menus. As such there are several<br />
ways to access important screens, dependent<br />
upon which part of the software you are<br />
using. If there was a small criticism, it would<br />
be that at times you have to hunt out where<br />
the menus are: they can be contextual or be<br />
found as pull-out side tabs.<br />
Event management can be accessed via the<br />
System Admin menu or from the camera<br />
views. If in the latter, you simply right-click in<br />
the camera view and select Camera Rules.<br />
From the main screen you can access this<br />
functionality via the server contextual menu.<br />
There is the option to Add or Delete Rules.<br />
Clicking on Add opens up a new screen which<br />
is split into two parts: the Event (the cause of<br />
the Rule being triggered) and the Action.<br />
The first step is to specify the trigger. This<br />
can be a camera event, archive back-up<br />
completion, camera disconnect, camera IP<br />
conflict, generic event, input signal from<br />
camera, licence issue, motion detection,<br />
network issue, server status event, soft trigger<br />
12
BENCHMARK<br />
...The Event of 2019<br />
5/6 November<br />
SiX<br />
19<br />
2 November 5/6<br />
Dedicated to Installers & Integrators<br />
In Association with:<br />
sixevent.co.uk<br />
ORGANISED BY Pro-Activ<br />
CONTACT: David Lewis on 0208 295 8309 (david.lewis@proactivpubs.co.uk) or Nick Tiday 0208 295 8302 (nick.tiday@benchmarkmagazine.com)
BENCHMARK TEST<br />
or storage failure. The list isn’t ordered in a<br />
logical way, so you might need to scroll to<br />
find what you’re looking for. It could be<br />
ordered in a more logical fashion using subsections,<br />
which would make navigation a bit<br />
simpler and faster, such as allowing basic<br />
filtering by event types.<br />
Conditions can be set by when the trigger<br />
occurs, starts or stops. Once the camera being<br />
used for the trigger event is selected,<br />
additional options are presented, based upon<br />
the other settings. This ensures that<br />
configurations can’t be applied to devices<br />
which don’t support them. It is a common<br />
feature, but some entry level VMS packages<br />
don’t offer this, which can lead to wasted time<br />
inputting actions that are later rejected.<br />
The weak point in the handling of events is<br />
the lack of an option for fluent use of AND/OR<br />
operations. This makes it difficult to set up<br />
smart scenarios, which many integrators and<br />
installers see as a major benefit of VMS<br />
implementations. We’d consider this function<br />
to be of more value than some of the notebased<br />
features.<br />
Wisenet Wave boasts a number of search<br />
options: timeline, preview and motion search,<br />
alongside the more standard options.<br />
Timeline searches allow a period of time to be<br />
selected. Thumbnail images are then shown,<br />
and these include identifiers for the point in<br />
the timeline where they appear.<br />
Preview searches split longer time windows<br />
into more manageable periods. They can be<br />
useful to speed up navigation when seeking<br />
specific segments of video.<br />
Wisenet Wave’s motion search function<br />
makes use of motion detection to perform any<br />
searches of archived footage. As such, the<br />
video streams to be searched must have<br />
motion detection enabled for this feature to<br />
be active. It’s not as slick as a pure metadata<br />
search, but it still works well. Because the<br />
search uses motion detection algorithms, any<br />
area in the viewed scene which contains a<br />
motion detection mask cannot be searched.<br />
Wisenet Wave does lack some refinements<br />
of other VMS packages, but it can deliver<br />
everything required for the management of<br />
video in a mainstream application.<br />
BENCHMARK VERDICT<br />
Cathexis: CathexisVision 2019<br />
CathexisVision 2019 is an ideal VMS for mainstream applications, and one which we think more<br />
integrators and installers should consider. At first it does have a strange almost minimal feel,<br />
despite offering a full range of functions and features often only found on more costly high-end<br />
products. It includes some high-end flexibility with regard to event management, and together<br />
with an ease of customisation, it as a management option which will be of interest to integrators<br />
and installers creating smarter solutions. The implementation is very installer-friendly, which<br />
aides fast configuration, and because the software is relatively lean it runs smoothly, delivering<br />
consistent performance. Because of this, CathexisVision 2019 is rated as Recommended for use<br />
in mainstream applications.<br />
Hanwha Techwin: Wisenet Wave<br />
When Wisenet Wave first appeared, it had a few rough edges which were only to be expected<br />
as it was a new implementation of a VMS, albeit one where the core code was based upon a<br />
previously established product. Hanwha Techwin has since added some refinements and<br />
generally overhauled much of the operational side of the product, and as such it is a more<br />
dependable choice than before. It is easy to work with, but it could be further improved. It would<br />
churlish to pick fault, as it has come a long way, but it still lacks some of the refinements which<br />
other longer established products have. That said, the installation and configuration process are<br />
straightforward, although we did have a few early freezes during the licensing stage. The event<br />
management options have improved, but still lack some of the more advanced features of other<br />
VMS products. Because of this, Wisenet Wave is rated as Recommended for mainstream<br />
applications, with the proviso that it is suitable for those with a need for basic alarms.<br />
14
Evolve Legacy Camera Systems<br />
Into Powerful AI Solutions<br />
Avigilon AI Appliance<br />
Engineered for high performance, capacity and resiliency, the Avigilon Artificial Intelligence<br />
Appliance (AI Appliance) features leading-edge hardware and comes in two models to<br />
support up to sixty 2 MP cameras for enterprise scalability.<br />
Video Analysis for Non-Analytic Cameras<br />
Bring the intelligence of Avigilon self-learning video analytics<br />
to any supported non-analytic camera, allowing accurate<br />
recognition of the movement of people and vehicles.<br />
GENDER: FEMALE<br />
Combine with ACC to enable Appearance Search<br />
On-board GPU supports Avigilon Appearance Search<br />
technology in Avigilon Control Center (ACC) software<br />
regardless of the network video recorder used.<br />
avigilon.com/ai-appliance | asksales@avigilon.com<br />
User interface has been simulated for illustrative purposes.<br />
© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON APPEARANCE SEARCH, AVIGILON CONTROL CENTER and ACC are trademarks of Avigilon Corporation.
A Smarter Way<br />
to Monitor Video<br />
Avigilon Control<br />
Center 7 Software<br />
Video Security, Transformed<br />
The upcoming release of Avigilon Control Center (ACC) 7, our latest and most advanced version of<br />
ACC video management software, is designed to revolutionize how users interact with and gain<br />
situational awareness from their video security systems.<br />
Focus of Attention Interface<br />
Introducing Focus of Attention — a cutting-edge user interface for live<br />
video monitoring that leverages AI and video analytics technologies<br />
to determine what information is important and should be presented<br />
to security operators.<br />
AI-Powered Analytics<br />
Using our deep learning video analytics and Unusual Motion Detection<br />
technologies, ACC 7 software is designed to provide customers with<br />
actionable information to help ensure critical events don’t go unnoticed.<br />
Dark Mode<br />
ACC 7 software introduces a new theme with colors specifically chosen to reduce eye strain<br />
and improve user experience in dark environments, such as video security control rooms.<br />
avigilon.com/acc7 | asksales@avigilon.com<br />
Images and user interfaces have been simulated for illustrative purposes.<br />
© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, and ACC are trademarks of Avigilon Corporation.
SMART SOLUTIONS<br />
SMART SOLUTIONS<br />
Today’s innovative security solutions allow a breadth<br />
of additional benefits to be delivered to the end user.<br />
It is typically these advanced added value elements<br />
which can win contracts if they deliver a tangible<br />
return on investment. Via its Smart Solutions<br />
projects, Benchmark looks at the bigger picture to<br />
assess how integrators and installers can deliver<br />
added value and exceed customer’s expectations.<br />
The technological landscape is rapidly<br />
evolving, and the new and emerging<br />
technologies arriving in the industry<br />
promise much for the security sector. The<br />
possibilities offered by AI and deep learning<br />
are enormous, the flexibility of advanced<br />
networking and communications can make<br />
systems even more accessible, and the<br />
flexibility of IoT and smart solutions will add<br />
value to the next generation of solutions.<br />
There are currently a whole host of<br />
developments which will impact on the<br />
security systems sector. However, integrators<br />
and installers must realise the internet of<br />
things, smart homes, intelligent buildings,<br />
connectivity, solutions as a service, business<br />
intelligence, building automation and a hold<br />
host of other more specific trends are not the<br />
future: they are happening today, and end<br />
users are seeking such solutions. If you<br />
cannot offer a system that meets their<br />
expectations, they will look elsewhere.<br />
The growth in other sectors underlines how<br />
much traction these new approaches have in<br />
commerce and industry. Just as other<br />
solutions are bolting ‘security’ on to their<br />
offering, so the security industry must also<br />
offer other services and benefits.<br />
End users will invest in solutions that<br />
deliver business benefits; they always have<br />
and they always will. Those benefits might<br />
include security, business intelligence,<br />
communications, energy control, building<br />
automation or any host of features and<br />
functions. The security sector has the<br />
technology and the skills to deliver those<br />
solutions.<br />
While security will still be at the heart of<br />
everything our industry delivers, the<br />
technologies we use and the systems we<br />
create have the capabilities to be so much<br />
smarter, providing everyday benefits for our<br />
customers. The Smart Solutions projects are<br />
designed to highlight how these benefits can<br />
best be leveraged.<br />
18
SMART SOLUTIONS<br />
Video Search Made Smarter<br />
Increases in processing power and the use of<br />
GPUs in surveillance systems have allowed<br />
video search to move forward significantly in<br />
recent times. The use of new technologies<br />
allows intelligent searches to be carried out.<br />
These have an element of ‘self-learning’ which<br />
enables the system’s search engine to filter<br />
results based upon feedback from the<br />
operator. The intelligent algorithms are fast<br />
and accurate, thus redefining how incidents<br />
can be managed. An example of this is<br />
Avigilon Appearance Search technology.<br />
Appearance Search can be used to<br />
accurately detect the presence of people and<br />
vehicles in video footage, across multiple<br />
cameras. It allows many hours of footage to<br />
be searched, with targets identified and<br />
verified, in minutes.<br />
If a suspect is identified, Appearance<br />
Search can check across all video streams –<br />
live and recorded – searching for other<br />
incidents involving the suspect. The<br />
technology will present a series of snapshots<br />
and the operator can either accept or reject<br />
these, based on their accuracy. These results<br />
are then used to further refine the search and<br />
as the system ‘learns’ more about the<br />
suspect, so it can find appearances across<br />
wider timescales, where the suspect may be<br />
dressed differently.<br />
As a starting point, Appearance Search can<br />
either use a captured image, or filtering can<br />
be applied. Initial filters are simply selected<br />
from the menus. Options include gender, hair<br />
colour and clothing colours.<br />
The technology also incorporates<br />
characteristics of a person's face, enabling the<br />
operator to search for the same person, even<br />
if items such as their clothing change over<br />
time. Appearance Search examines footage<br />
across all selected cameras and returns the<br />
results. The process is fast.<br />
The operator is presented with a series of<br />
matches. Clicking on the thumbnail plays the<br />
related video clip, allowing an assessment to<br />
be made as to whether it is relevant. The clips<br />
are either rejected or accepted, and the<br />
system uses the accepted results to further<br />
refine the search.<br />
Fast and accurate searching allows a rapid<br />
response to incidents by users.<br />
To read all articles from this project, visit: http://benchmarkmagazine.com/smart-search<br />
Add Value with Network Audio<br />
Networked audio solutions offer a complete<br />
all-in-one system that integrates seamlessly<br />
with network-based video surveillance. No<br />
additional hardware is required above the<br />
actual audio components, which simplifies<br />
the installation and configuration processes.<br />
In addition, the systems have minimal<br />
storage requirements.<br />
Fewer components mean lower costs, so<br />
the return on investment for end users is<br />
significantly increased. With a networkbased<br />
solution, all controls are softwarebased,<br />
which is a great benefit when it<br />
comes to system maintenance.<br />
Each speaker can be directly integrated<br />
within the existing data network, and can<br />
then be managed remotely via a PC or<br />
workstation.<br />
Products can be added and removed easily<br />
and effectively. It is always preferable to<br />
seek audio components that support PoE, so<br />
only one cable is required per product to<br />
supply power to the unit and transmit sound<br />
and data.<br />
Audio solutions may make use of<br />
innovative technologies, but they are also<br />
simple and accessible. This simplicity is a<br />
great advantage to the end users and<br />
integrators alike. Indeed, for the latter, audio<br />
installations are very straightforward.<br />
If an engineer possesses the required<br />
skills to install a network camera, they will<br />
also have the skills to install an audio<br />
system alongside it. It is easy to add and<br />
remove speakers as configuration takes<br />
place centrally. For the customer, the<br />
benefits are significant.<br />
Read all articles from this project: http://benchmarkmagazine.com/smart-audio-deployments<br />
19
SMART SOLUTIONS<br />
Access Control and Rules Mapping<br />
The ACT access control<br />
solution has been designed<br />
to deliver a host of<br />
advanced features that<br />
meet and exceed end user<br />
expectations. For the<br />
integrator and installer, the<br />
manufacturer has also<br />
ensured the solutions are<br />
simple to install and<br />
maintain, regardless of an<br />
engineer’s access control<br />
experience.<br />
It was important when<br />
Rules Mapping was introduced to the ACT<br />
Enterprise software that integrators and<br />
installers could deliver the benefits to their<br />
customers without spending additional time<br />
setting the system up. It was also vital that<br />
additional skills, such as writing complex<br />
code, were not required to enjoy the<br />
flexibility on offer.<br />
As a result, Rules Mapping is a simple<br />
‘point-and-click’ method of establishing<br />
varied criteria which, when met, instigate a<br />
series of actions. It is configured via a basic<br />
drag-and-drop interface, which allows the<br />
use of triggers such as system input and<br />
output changes, access control transactions<br />
and system status conditions, as well as<br />
triggers from other integrated system such<br />
as intrusion alarm events.<br />
Rules can be established for security<br />
purposes (if an entry door is forced while<br />
specified users are not on site, instigate a<br />
lockdown in certain departments and notify<br />
the security team) through to business<br />
efficiencies (if all IT team members have left<br />
for the night, disable power to the<br />
department).<br />
Rules Mapping makes access control a<br />
more flexible solution and adds value for the<br />
customer. For integrators and installers, it<br />
enables the creation of bespoke solutions<br />
without the need to write code or carry out<br />
complex programming.<br />
Read all articles from this project: http://benchmarkmagazine.com/smart-rules-mapping<br />
Smart Analytics Tracking<br />
For video surveillance to be smart, it must<br />
make it simpler for operators to deal with<br />
alarm incidents, automatically detecting<br />
suspects using IVA, before deploying smart<br />
tracking technologies to follow them across<br />
an entire site. This can be done using VMS 3D<br />
technology.<br />
3D technology can either be manually<br />
deployed or automated via triggers. These<br />
can include integrated IVA options or other<br />
alarms, linked through system actions.<br />
The basis of 3D technology is powerful<br />
geo-referencing. This allows the system to<br />
be aware of the exact location of cameras<br />
and other devices, and to correlate the data<br />
with absolute positioning devices and smart<br />
system maps.<br />
The 3D technology makes use of<br />
geospatial referencing to deliver accurate<br />
levels of camera control, alarm handling and<br />
target tracking during an incident. There are<br />
three ways in which 3D technology can be<br />
deployed: intuitive PTZ control, manual<br />
object tracking and automated tracking over<br />
multiple devices.<br />
The most impressive function is alarmbased<br />
object tracking with handover. This<br />
responds to IVA alerts, initiating automatic<br />
control of a PTZ camera in response to an<br />
event from an overview camera. Once<br />
triggered, the PTZ camera automatically<br />
follows the alarm object, tracking it without<br />
any need for operator intervention. When<br />
the target reaches the end of the range for<br />
the tracking camera, the 3D technology<br />
automatically hands over to an adjacent<br />
linked camera, which continues tracking.<br />
To read all articles from this project, visit: http://benchmarkmagazine.com/smart-tracking<br />
20
12 TO TRY<br />
12 TO TRY: Video Archiving<br />
Benchmark looks at 12 products and systems of interest for integrators and installers<br />
who are looking to implement smart solutions which include video archiving.<br />
Milestone Systems: Husky X2<br />
The Milestone Husky X2 offers a plug-andplay<br />
experience, providing everything<br />
required for small and medium sized<br />
enterprises to implement an open platform<br />
fully functional VMS. The unit features an<br />
integral PoE switch and input/output panel,<br />
allowing cameras and alarm devices to be<br />
easily and quickly connected without<br />
requiring additional equipment.<br />
The Milestone Husky X2 is supplied with a<br />
pre-loaded free version of the company’s<br />
VMS – XProtect Essential+ – reducing the<br />
deployment costs and making it easy for<br />
integrators and installers to get started.<br />
XProtect Essential+ enables users to<br />
connect up to eight cameras, as well as giving<br />
access to all the essential functionalities of<br />
the software for free.<br />
If there is a need to upgrade, it is simple to<br />
unlock any of the paid XProtect VMS versions<br />
that suit the site’s needs with a simple license<br />
upgrade.<br />
Dependent upon the applied licence, the X2<br />
can support up to 133 devices (based on<br />
cameras recording HD720p video at 25 frames<br />
per second with a throughout of 2Mbps) with<br />
a recording throughput of 566Mbps. Onboard<br />
storage can be configured up to a maximum<br />
of 20TB.<br />
To ensure a robust and reliable system, the<br />
server’s OS is housed on a separate solid<br />
state drive. The server features two GigE NIC<br />
interfaces, and the PoE+ switch supports up<br />
to 16 ports. There are also 4 inputs and 4<br />
outputs.<br />
Eagle Eye Networks: EE<br />
Contract Vault<br />
Eagle Eye Contract Vault from Eagle Eye<br />
Networks is billed as a complete cloudbased<br />
system for recording and archiving<br />
important streams of transactions,<br />
incidents and events. Businesses and<br />
organisations can use the service to<br />
capture audio and video recordings of<br />
critical events and store them in the cloud.<br />
Users have the ability to enter<br />
customised relevant information for each<br />
event, making management a simpler task,<br />
and can start or stop the recording process<br />
with a single mouse click.<br />
Video recordings can be stored over long<br />
terms in the Eagle Eye cloud data centre.<br />
By using descriptions and captured<br />
metadata, the search and retrieval process<br />
is made simpler, according to the service<br />
provider. Users can label and tag<br />
recordings for historical reference, review,<br />
or mark as evidential footage.<br />
Retention periods vary according to<br />
contract and use, but Eagle Eye claim<br />
archives can be maintained for up to 30<br />
years where appropriate.<br />
When access to video footage is<br />
required, clips can be downloaded in MP4<br />
format and shared with other users via a<br />
web browser.<br />
The service is compatible with cameras<br />
from most leading video surveillance<br />
manufacturers.<br />
22
12 TO TRY<br />
HPE: InfoSight<br />
Hewlett Packard Enterprise offers InfoSight, a<br />
cloud-based artificial intelligence<br />
management tool, to HPE ProLiant servers.<br />
Using predictive analytics capabilities based<br />
on real-world operational data, InfoSight<br />
closes performance gaps and frees up<br />
maintenance personnel.<br />
With a growth in critical security systems<br />
making use of networked resources,<br />
businesses and organisations cannot afford<br />
downtime or expending resources to solve<br />
preventable problems, especially those that<br />
impact productivity.<br />
HPE InfoSight solve these challenges by<br />
constantly monitoring infrastructure,<br />
identifying potential problems and providing<br />
insights to facilitate a fast resolution for<br />
problems. It does this via an AI-driven<br />
framework which monitors, collects and<br />
analyses data.<br />
InfoSight gathers operational intelligence<br />
by analysing millions of sensors across a<br />
globally-connected installed base, and uses<br />
behavioural data to provide insights,<br />
forecasting and recommendations, predicting<br />
and preventing problems. The result is higher<br />
efficiency and reliability, creating a smarter,<br />
easier-to-manage infrastructure.<br />
HPE claims that with InfoSight, 86 per cent<br />
of issues are automatically predicted and<br />
resolved before a problem occurs.<br />
Manything: Manything Pro<br />
Manything Pro is a cloud-based service<br />
which can be used to provide back-up<br />
storage in conjunction with local storage on<br />
an NVR. Because the Manything Pro<br />
software is installed on the camera,<br />
integrators and installers can configure the<br />
system with archiving to a local NVR for<br />
security purposes, while cloud-based<br />
footage can be used for remote access and<br />
sharing.<br />
The Manything Pro streams are drawn<br />
from the cameras’ sub-streams and so are<br />
limited to 640 x 360 pixels. The higher<br />
resolution main stream is used by the NVR<br />
for evidential quality recordings. This can<br />
be adjusted if an NVR is not being used,<br />
allowing motion events to be sent to the<br />
cloud in higher resolutions.<br />
The Manything Pro plug-in for the<br />
compatible Hikvision cameras replaces the<br />
firmware with an open platform version,<br />
adding functionality required to use the<br />
service.<br />
Wavestore: PetaBlok<br />
PetaBlok is a high-density storage solution<br />
from Wavestore which is capable of storing<br />
up to 2.04PB of data per high density unit.<br />
When coupled with Wavestore’s<br />
HyperRAID redundancy and EcoStore hard<br />
drive energy saving technology, PetaBlok<br />
delivers an efficient and robust video<br />
management and storage solution for<br />
applications which generate extremely<br />
large amounts of data.<br />
Pre-installed with Wavestore’s VMS,<br />
PetaBlok is designed to provide a simpleto-implement<br />
and cost-effective solution<br />
for the growing number of video<br />
surveillance projects which require multimegapixel<br />
images captured from a high<br />
numbers of cameras which are to be stored<br />
over long periods of time, with a<br />
requirement for fast search and video<br />
replay.<br />
Ideal for high risk projects, where it is<br />
commonplace to store recorded video for<br />
longer durations due to legal compliance,<br />
PetaBlok will also offer a highly effective<br />
option for large-scale applications such as<br />
airports and ports, city centre surveillance,<br />
utilities and other mission-critical sites<br />
where long-retention times, or the<br />
recording of many high resolution<br />
cameras, is required.<br />
These archiving solution can support<br />
multiple sites while being controlled and<br />
managed from a central control room. Up<br />
to 255 PetaBloks can be grouped together<br />
to provide over 520 PetaBytes of storage.<br />
PetaBlok is available in various sizes<br />
from 480TB (8U) to 2.04PB (16U). This<br />
enables each PetaBlok to store images<br />
captured from over 235 4K resolution<br />
cameras in real time, for a period of 120<br />
days.<br />
23
12 TO TRY<br />
Bosch: DIVAR network 5000<br />
The DIVAR network 5000 supports 32 video<br />
channels and represents a cost-effective<br />
investment in a future-proofed IP video<br />
surveillance system that can be scaled as<br />
customers’ businesses grow. Thanks to a<br />
high level of scalability, the complete video<br />
surveillance system is flexible thanks to a<br />
built-in Power over Ethernet (PoE) switch,<br />
connecting IP cameras to the video recorder<br />
with no need for separate power adaptors,<br />
making installation quick and easy. The<br />
PoE switch can supply power to a maximum<br />
of 16 cameras.<br />
Each camera is automatically allocated<br />
its IP address from the recorder to enable<br />
simple plug-and-play operation, reducing<br />
configuration time.<br />
DIVAR network recorders enable easy<br />
monitoring and configuration as well as<br />
simple playback of recorded content.<br />
Reconfiguration of local unit settings<br />
anytime from anywhere via the DIVAR<br />
Viewer app, available on smartphones (iOS<br />
and Android), and via a web browser. The<br />
app can also be used to control the pan,<br />
tilt and zoom functions.<br />
The Bosch DDNS service enables users<br />
to create a name for their recorder, free of<br />
charge, making it easy to find the recorder<br />
without an IP address when navigating via<br />
a web browser.<br />
Axis Communications: AXIS<br />
Camera Station S20 Appliance<br />
The AXIS Camera Station S20 Appliance series<br />
constitutes a series of network video<br />
recorders for reliable high definition<br />
surveillance recording and management. The<br />
appliances are effectively hardware-based<br />
servers running the Axis Camera Station VMS<br />
and are designed to minimise installation<br />
time.<br />
The S20 appliances come in two different<br />
configurations supporting 16 or 24 cameras<br />
(S2016 and S2024 respectively). Each unit<br />
features an integrated PoE switch for the full<br />
number of channels, and the units are<br />
preloaded with all necessary software,<br />
including licenses, to allow the system to be<br />
up and running.<br />
The S2016 appliance can support a total of<br />
8TB (two 4TB drives) while the S24 supports<br />
up to 12TB (three 4TB drives). The recorders<br />
can support resolutions of up to 4K UHD.<br />
Both AXIS S20 recording appliances include<br />
a three year hardware warranty.<br />
Western Digital: WD Purple<br />
Built for always-on, high-definition video<br />
surveillance systems, the WD Purple range of<br />
surveillance-specific HDDs have been<br />
designed with the specific needs of security<br />
applications in mind. The hard drives offer a<br />
supported workload rate of up to 180TB per<br />
year and can manage up to 64 video streams<br />
simultaneously.<br />
Purple drives are optimised for surveillance<br />
needs and have been engineered to cope with<br />
high write cycles as well as the higher<br />
temperatures which are typical in NVR- and<br />
DVR-based security applications.<br />
WD Purple HDDs are available in a range of<br />
capacities from 1TB to 12TB. The drives are<br />
equipped with the manufacturer’s AllFrame<br />
Technology. This is designed to enhance ATA<br />
streaming which not only improves video<br />
playback, but also reduces frame losses and<br />
enables the use of a higher number of drives<br />
in NVRs. Between 8 and 16 bays are<br />
supported dependent upon the model.<br />
WD Purple drives with capacities of up to<br />
8TB include AllFrame 4K technology, ensuring<br />
the drives can also support the use of 4K UHD<br />
cameras.<br />
The 8TB, 10TB and 12TB drives are also<br />
designed to support Deep Learning analytics<br />
in AI-capable NVRs, and feature an enhanced<br />
workload rating of up to 360TB per year, with<br />
support for up to 16 AI-enabled channels for<br />
analytics within the system.<br />
The WD Purple range carry a three year<br />
limited warranty.<br />
24
HIGH-END CAMERA<br />
X TOP PERFORMANCE LENS<br />
THE NEW FUJINON SX800. THE BEST OF BOTH.<br />
With the new SX800, Fujinon combines both in one for the first time: camera and lens. For<br />
long range surveillance at the highest level with 40x optical magnification and constantly<br />
sharp images. www.fujifilm.eu/fujinon. Fujinon. To see more is to know more.
12 TO TRY<br />
Dell: IoT Solutions for<br />
Surveillance<br />
Dell Technologies’ Edge and IoT Solutions<br />
Division offers new solutions and bundles<br />
to simplify deployment of secure, scalable<br />
solutions for edge computing and IoT use<br />
cases. The solutions combine tools from<br />
Dell’s portfolio with technology from Intel<br />
and partners in the Dell Technologies IoT<br />
Solutions Partner Program. This will drive<br />
workloads for computer vision – enabled by<br />
imaging sensors – and machine intelligence<br />
from sensors and control systems.<br />
Cameras provide information-rich data<br />
about the status of sites, but the sheer<br />
volumes of video data create too much<br />
information for operators to cost-effectively<br />
monitor for real-time decision making<br />
purposes. Applying analytics, such as AI, to<br />
these data streams automates actionable<br />
insights.<br />
Events driven by video data and analysed<br />
along with telemetry from other systems<br />
results in even more powerful insights. The<br />
rapid evolution of the IoT market and the<br />
fast pace of innovation means many<br />
customers require IT grade infrastructure.<br />
Surveillance is the first use-case to which<br />
Dell Technologies has applied computer<br />
vision, so customers can monitor events<br />
and automate decision-making.<br />
The IoT Solution for Surveillance is<br />
specifically built to transform and simplify<br />
how surveillance technology is delivered.<br />
Available as a package, the engineered,<br />
pre-integrated solution will provide a<br />
consistent foundation from edge to<br />
distributed core to cloud. It will also be<br />
ready to run on day one with customer data<br />
to speed the return on investment.<br />
Seagate: SkyHawk HDDs<br />
Seagate offers the SkyHawk range of HDDs<br />
which have been design for around-the-clock<br />
workloads in surveillance applications. The<br />
range includes hard drives of varying<br />
capacities up to 14TB, with drives specifically<br />
designed for DVR- and NVR-based surveillance<br />
systems.<br />
SkyHawk surveillance drives are equipped<br />
with ImagePerfect technology. This firmware<br />
allows for higher image integrity and supports<br />
archiving from up to 64 HD video streams. The<br />
algorithm reduces data errors, allows images<br />
to be stored without pixilation and prevents<br />
frame loss when working with multiple stream<br />
recordings.<br />
Secure Logiq: HPS-2U-H<br />
Server<br />
The HPS-2U-H servers boast the same<br />
form factor, storage options and<br />
resilience features of the M series servers<br />
from Secure Logiq, but include an<br />
upgraded Xeon Silver Octa-core<br />
processor and 24GB of 6 channel memory<br />
as well as 10GbE networking for high<br />
throughput applications.<br />
This server range has been designed<br />
for higher camera counts and basic video<br />
analytics applications (such as ANPR), as<br />
well as for projects with multiple client<br />
positions and mobile device transcoding.<br />
With a throughput of 1,500Mbps and a<br />
maximum storage capacity of 120TB, the<br />
server offers RAID 5 with spare storage,<br />
dual 10 Gigabit ethernet NICs, redundant<br />
PSUs and the option of GPUs to enable<br />
suitability with some of the leading VMS<br />
options.<br />
The server makes use of the Windows<br />
Server 2016 64-bit OS (other options are<br />
available). The OS and application<br />
software are stored on solid state drives<br />
to offer enhanced reliability.<br />
Johnson Controls: ExacqVision<br />
S-Series<br />
The ExacqVision S-Series offers additional<br />
video and audio storage capacity to the range<br />
of ExacqVision video appliances available<br />
from Johnson Controls. The storage units are<br />
available in 2U and 4U variants.<br />
The storage units offer a high level of data<br />
recoverability with back-up from exacqVision<br />
recorders to S-Series storage, and feature an<br />
instant search facility, speeding up<br />
investigations. The units allow the<br />
optimisation of network loads, as scheduled<br />
or continuous archiving can be selected<br />
dependent upon the infrastructure. To assist<br />
when storing critical video and audio, userdefined<br />
archiving rules can be set including<br />
retention times.<br />
Each S-Series storage unit can be used to<br />
consolidate archives from multiple video<br />
recorders, and optional dual 10Gbps network<br />
interfaces allow faster archiving.<br />
The storage units can support capacities of<br />
up to 240TB.<br />
26
ADVERTISEMENT FEATURE<br />
Image Capture and Big<br />
Data management<br />
Historically, security-related video surveillance<br />
has relied upon the capture of video streams<br />
to allow reactive post-event analysis. To<br />
enhance retention periods, camera counts were<br />
kept to a minimum, and strategies to maximise<br />
storage included reduced frame rates, limited<br />
resolutions or increased compression, and timebased<br />
recoding. The latter approach meant stored<br />
footage would be encoded after a certain period,<br />
reducing quality and frame rate, thus freeing up<br />
more space.<br />
This approach was used for many years, as it was<br />
the most cost-effective option. Invariably, users<br />
would be aware an incident had occurred within a<br />
short time span, and as archived footage grew<br />
older, the likelihood of it being required diminished.<br />
While these strategies do enhance video<br />
retention times, they also introduce a level of<br />
compromise which, given today’s demands on<br />
video-based solutions, are not acceptable.<br />
With numerous advances in processing in recent<br />
years, the potential for captured video streams has<br />
grown exponentially. Where once the capture of<br />
suspicious activity was the sole purpose of video<br />
surveillance, today’s systems are delivering realtime<br />
data about the ongoing status of sites,<br />
business operations and procedures, and a host of<br />
other variables. The big data captured by video<br />
surveillance, or through other systems which are<br />
linked to video solutions, is invaluable to<br />
businesses and organisations, for a host of reasons<br />
along with site protection and security.<br />
It is these additional uses of the data which<br />
often add value and benefits for customers,<br />
allowing the return on investment in their solutions<br />
to be a tangible and measurable element. In order<br />
to capture this valuable additional data, the trend<br />
is towards the implementation of a greater number<br />
of cameras, the retention of real-time streams even<br />
when there is no security-related activity, and the<br />
expansion of real-time processing and analytics<br />
deployments.<br />
Traditional constraints relating to video<br />
infrastructure have been removed, and customers<br />
expect to receive smart benefits from modern<br />
implementations. As advanced surveillance<br />
systems collect, process and analyse increased<br />
amounts of data including video, audio, metadata<br />
and geolocation information, the solutions require<br />
ever higher capacities in terms of computational<br />
processing, storage and networking resources.<br />
What was once considered ‘sufficient’ in terms of<br />
video surveillance infrastructures can no longer<br />
cope with today’s demands.<br />
According to research carried out by NVIDIA, 30<br />
billion images per second (100 trillion images per<br />
hour) will be captured by surveillance cameras<br />
across the globe by 2020. With the pursuit of smart<br />
cities and intelligent buildings, much of this data<br />
will also be processed and filtered using AI and<br />
machine learning technologies. This represents a<br />
sea-change in terms of how data is stored,<br />
managed and utilised. Legacy video surveillance<br />
infrastructure simply will not cope with the load.<br />
To address the future growth, HPE OEM<br />
Solutions has created Edgeline Converged Edge<br />
Systems, a purpose-built platform for converging<br />
data acquisition, control and analytics at the edge,<br />
delivering remote management for businesses and<br />
organisations. The platform ensures solutions can<br />
connect to extended networks, capture and analyse<br />
critical data from a wide range of sources, and take<br />
appropriate actions when events or incidents<br />
demand it. Because the data is processed at the<br />
edge, management of information is fast, efficient<br />
and less prone to problems which may occur across<br />
the wider system infrastructure.<br />
The compact, energy-efficient, ruggedised<br />
platforms can support virtually all edge-based<br />
video processing use cases. Customisable, the<br />
platform supports a variety of chassis types, server<br />
arrays, GPUs, CPU cores, memory and storage.<br />
By combining HPE Edgeline Converged Edge<br />
Systems with the use of robust and resilient HPE<br />
ProLiant Gen10 servers for essential centralised<br />
storage and processing, it is possible to create a<br />
secure and resilient platform that delivers the<br />
performance and reliability expected from<br />
advanced solutions, both now and in the future.<br />
As demands for the storage, processing and<br />
management of constantly expanding volumes of<br />
data increase, and as the need for real-time<br />
business intelligence and data mining becomes<br />
more prevalent for businesses and organisations, it<br />
makes sense to utilise the secure and flexible<br />
options offered by edge-based systems.<br />
Build surveillance systems<br />
that keep security threats in<br />
sight with the latest Edge<br />
technology from HPE OEM<br />
Solutions. Find out more at<br />
http://www.hpe.com/<br />
solutions/oem-cctv<br />
27
BENCHMARK TEST<br />
A More Flexible Shock?<br />
Texecom – Premier Elite Micro Shock-W<br />
When Texecom launched the Premier Elite Micro<br />
Contact-W, the miniature form factor and the device’s low<br />
profile offered a wireless contact which could be virtually<br />
hidden in most window and door frames. This made it<br />
suitable for many applications and allowed its use as a<br />
trigger in smart systems too. The range is now completed by<br />
the Premier Elite Micro Shock-W, which allows a high level<br />
of flexibility when mounting shock sensors.<br />
28<br />
TEXECOM: MICRO<br />
SHOCK-W<br />
www.benchmarkmagazine.com<br />
Traditionally, magnetic<br />
contacts and shock<br />
sensors are a staple in<br />
intruder alarm applications,<br />
offering protection for<br />
doors and windows at a<br />
site. While essential when<br />
delivering security to a<br />
building, it’s hard to get<br />
too excited by the<br />
products. In many<br />
installations, shocks and<br />
contacts can be<br />
problematic. They<br />
create issues with<br />
wiring, and even the<br />
advent of wireless<br />
devices doesn’t get<br />
rid of the problem<br />
that few end users<br />
want large detectors<br />
on every window or<br />
door.<br />
Where the Premier Elite Micro Shock-W<br />
makes this problem a thing of the past is its<br />
diminutive size. Sharing the same proportions<br />
as the Premier Elite Micro Contact-W, it can be<br />
easily concealed in uPVC window and door<br />
frames. Even where this is not possible, it is<br />
small enough to be used discreetly in a wide<br />
range of applications.<br />
While best practice is for every external<br />
door and window which could feasibly bear<br />
the brunt of a physical attack to be protected<br />
with a shock sensor, this rarely happens.<br />
However, with the Micro Shock-W, problems<br />
such as the need to run numerous cables, and<br />
users objecting to large sensors fitted in plain<br />
sight are eliminated.<br />
Additionally, because of the diminutive size<br />
of the device, it can be used for a wider range<br />
of applications, including a host of triggering<br />
tasks in smart intruder systems.<br />
Specification<br />
The Premier Elite Micro Shock-W is a<br />
miniature low profile wireless shock sensor<br />
which has been designed to meet Grade 2<br />
EN50131-2-8 requirements; the standard<br />
includes specifications for shock sensor<br />
sensitivity, which the Micro Shock-W meets.<br />
The shock detector makes use of Texecom’s<br />
established and proven Ricochet mesh-based<br />
network, and so forms a part of a self-healing<br />
wireless environment which is both robust<br />
and consistent in coverage. Long-term tests<br />
by Benchmark on the Ricochet wireless<br />
platform have proved it to be stable in a wide<br />
range of conditions.<br />
Measuring 57 x 27.5 x 8.2mm, the size of<br />
the device also makes it ideal for monitoring<br />
secure safes and cabinets, storage units and<br />
drawers, both for security and automation<br />
triggering. It is powered by a single coin-cell<br />
CR2450 battery and has a claimed battery life<br />
of up to three years.<br />
The Micro Shock-W is available in three<br />
finishes: white, brown and anthracite. This<br />
means it can be used with white, wood effect<br />
and aluminium finish door and window frames<br />
with little to no visible impact.<br />
Using advanced accelerometer technology<br />
rather than piezoelectric sensing, the 868Mhz<br />
device features five sensitivity settings,<br />
allowing accurate performance regardless of<br />
the substrate it is installed on. Set-up is<br />
simple, making use of a single button.<br />
The detector is tamper protected, and is<br />
compatible with Premier Elite and Premier<br />
control panels and Ricochet expansion packs.<br />
The sensor features a single push button and<br />
a multi-coloured LED to simplify set-up. It is
BENCHMARK TEST<br />
supplied with a battery, an adhesive mounting<br />
pad with fixing screws, and an instruction<br />
leaflet.<br />
Installation<br />
The installation of the Premier Elite Micro<br />
Shock-W is quick and straightforward, very<br />
much like the installation of most Ricochetenabled<br />
peripherals. The backplate of the<br />
shock sensor simply unclips using a small<br />
screwdriver to open the physical latch, and<br />
can be attached to the mounting substrate<br />
using the provided adhesive pad.<br />
While the pad will be suitable for use in<br />
ungraded systems, we’d still advise using the<br />
supplied screws (which are required for a<br />
Grade 2 system) as well. If the shock sensor is<br />
in a hard to access position, it’s quite easy to<br />
pull it free from the substrate when opening<br />
for battery changes if the screws haven’t been<br />
used!<br />
As with all Ricochet devices, Learning the<br />
shock sensor onto the alarm system is also a<br />
simple process. To quickly access the<br />
Ricochet learn menu, simply press the Omit<br />
key while in engineer mode. With the control<br />
panel in Ricochet Learn mode and an empty<br />
zone selected, the button on the front of the<br />
shock sensor needs to be pressed for three<br />
seconds. The sensor’s LED will turn from pink<br />
to green once the device has been learned.<br />
If there is a need to relearn the sensor, the<br />
battery will need to be removed and<br />
reinserted to force the device into learn mode<br />
again.<br />
It is worth noting that if you mount the<br />
backplate and then take the shock sensor<br />
closer to the keypad to initiate the learning<br />
process, the LED will show as orange as the<br />
device will be in tamper mode. Once fitted to<br />
the backplate, the status will show correctly.<br />
There is a wireless range test which can be<br />
carried out using the shock sensor while the<br />
alarm panel is in commission mode. This can<br />
only be done during the first hour the sensor<br />
is powered up. By pressing the button on the<br />
detector for three seconds, the LED will flash<br />
pink, turning green when the wireless link is<br />
confirmed.<br />
With the Premier Elite Micro Shock-W<br />
learned and mounted, the final step is to set<br />
the sensitivity. This process needs to be<br />
completed within 10 minutes of the device<br />
being learned onto the system.<br />
The process is straightforward. By pressing<br />
the button twice, the shock sensor goes into<br />
sensitivity mode and defaults to Level 2,<br />
which is ideal for detection on framed glazed<br />
windows. Each press of the button steps the<br />
sensitivity level up one. Level 1 is the least<br />
sensitive (for use on wood), and Level 5 is<br />
most sensitive (for concrete substrates). The<br />
levels are indicated by the speed of the LED<br />
pulsing. Once the desired sensitivity setting is<br />
reached, the button is held down for three<br />
seconds. An impact test can now be carried<br />
out, and if further adjustments are required,<br />
the process is simply repeated.<br />
Performance<br />
For the test we added 10 Premier Elite Micro<br />
Shock-W devices to a variety of substrates,<br />
with each set up accordingly with regard to<br />
sensitivity. The detectors were installed in<br />
three buildings with distances of up to 80<br />
metres from the panel, and all showed strong<br />
and consistent wireless links directly to the<br />
control panel.<br />
Shock sensors are either going to detect<br />
impacts or not, and when configured properly<br />
with regard to the mounting substrate and the<br />
type of impact expected, they worked well.<br />
Catch performance was consistent, and only<br />
one unit required a tweak after the initial setup.<br />
There were no false alarms during the test<br />
period, and only one nuisance alarm when<br />
maintenance was carried out near a sensor set<br />
as a separate zone which is permanently<br />
armed (and we forgot to disable it). Indeed,<br />
throughout the test the sensors performed as<br />
expected.<br />
The Micro Shock-W devices ignored a host<br />
of innocuous vibrations and general everyday<br />
conditions.<br />
Verdict<br />
Texecom’s Premier Elite Micro Shock-W<br />
sensors are reliable and stable devices which<br />
will be popular<br />
with integrators<br />
and installers<br />
seeking a<br />
discreet low<br />
profile option for<br />
windows and<br />
doors. Their<br />
diminutive size<br />
makes them ideal<br />
for a wide range of<br />
applications,<br />
including the<br />
protection of other<br />
assets.<br />
Performance was<br />
consistent, and as<br />
such, the shock<br />
sensors achieve<br />
Benchmark<br />
Recommended<br />
status.<br />
29
ADVERTISEMENT FEATURE<br />
For more information contact:<br />
Axis Communications (UK)<br />
Ltd.1 Capability Green,<br />
Luton, Bedfordshire, LU1 3LU<br />
Phone: +44 (0) 1582 283760<br />
www.axis.com<br />
30<br />
AXIS P32 Series – a success story born<br />
from a creative corporate culture<br />
An open and dynamic work environment where<br />
employees are given free rein to create new<br />
ground-breaking products, services and<br />
solutions resulted in a new approach to camera<br />
R&D.<br />
Innovation in all its forms is central to Axis's<br />
activities, as well as vital to its continued growth<br />
and profitable development. The culture of<br />
innovation is closely linked to Axis’ philosophy of<br />
listening to its employees, having faith in their<br />
activities and giving them freedom and<br />
independence. A successful example of this<br />
engaging corporate culture is the development of<br />
the network cameras in the AXIS P32 Series.<br />
The brief was simple: design an advanced highquality<br />
camera but still make it affordable. Axis found<br />
that it could not meet the demanding technical<br />
requirements by designing a camera in the traditional<br />
way. The development team was therefore given free<br />
rein to produce different prototypes within certain<br />
given frameworks. The group had fixed requirements<br />
on quality and functionality, as well as a time limit.<br />
Initially, a prototype was used for a completely<br />
different type of camera model, and then further<br />
developed, which was a new approach.<br />
‘We wanted to learn and benefit from products<br />
with a different design logic,’ said Michael Chen,<br />
Global Product Manager at Axis Communications.<br />
‘Amongst other things, we thought about what<br />
makes the camera impact-resistant and waterresistant.<br />
Then we wondered if it would be possible<br />
to separate these two things.’<br />
Michael Chen was involved in developing the<br />
AXIS P32 Series, then as the supervising<br />
mechanical engineer for the team. In the water and<br />
climate laboratories, thorough testing was carried<br />
out in which the cameras were exposed to snow,<br />
rain and wind.<br />
‘We were allowed plenty of time to test, test and<br />
test again the development of our products to<br />
ensure we had the best possible solution,’ added<br />
Chen.<br />
Cooperation took place with colleagues within<br />
their own department, but also with<br />
representatives from the quality, production, test<br />
and design departments.<br />
‘We saw a lot of collaboration, both within the<br />
group and with other departments, to come up<br />
with the most innovative ideas.’<br />
The result was a camera that contained less<br />
metal and was lighter when compared to<br />
equivalent cameras. AXIS P32 features advanced<br />
functions such as optimised IR, Lightfinder<br />
technology (cameras are extremely light sensitive<br />
and can capture colour images in the dark) and<br />
Axis Zipstream technology, which compresses<br />
video data, reducing bandwidth and storage<br />
requirements. In addition, WDR has been made<br />
possible, allowing the camera to reproduce sharp<br />
images even if there are variations in the light<br />
conditions in a single image.<br />
Axis's corporate culture is characterised by an<br />
entrepreneurial spirit, transparency and diligence,<br />
and is vital for maintaining innovation and<br />
dynamism.<br />
All employees are involved, engaged and take<br />
responsibility for what they do. The employees are<br />
allowed a great deal of freedom under<br />
responsibility, which helps to promote innovation<br />
and creativity.<br />
‘We don't limit anybody, if you want to show<br />
ambition then you get the opportunity,’ stated<br />
Michael Chen.<br />
The common core values form the basis of the<br />
corporate culture. Amongst other things, they<br />
mean being open to colleagues' ideas and<br />
customer needs, working together to achieve<br />
Axis's objectives, and being at the forefront and<br />
creating the best products and solutions.<br />
‘At Axis, there is freedom to talk to whomever<br />
you want to, whenever you want; everyone's door<br />
is always open,’ adds Chen. ‘Everyone wants to<br />
help out. It's what makes Axis such an enjoyable<br />
and healthy workplace where people want to stay<br />
for a long time.’<br />
Amongst Axis's other major advantages is the<br />
independence and how people are allowed to be<br />
curious and think freely without limitations.<br />
‘A developer will not be hampered by limitations<br />
but will instead have the opportunity to see the<br />
big picture. Engineers have free rein when it comes<br />
to their work in order to understand the challenges<br />
faced by customers, to understand the<br />
environments in which the camera will be used<br />
and to develop solutions that are relevant.’<br />
The culture of innovation contributes to<br />
increased profitability for Axis, with satisfied<br />
employees who stay a long time. Staff turnover is<br />
low at 6.5 per cent, while the company is growing<br />
rapidly.<br />
‘There is a long-term approach in this way of<br />
working. It's fun, the experience helps people to<br />
grow, and grow together with their colleagues.<br />
And the result will be successful products and<br />
solutions for a smarter and safer world,’ Chen<br />
concludes.
IFSEC 2019<br />
IFSEC 2019 Surveillance<br />
Camera Day<br />
As part of the National Surveillance<br />
Camera Strategy for England and Wales,<br />
the Surveillance Camera Commissioner<br />
has announced the first Surveillance Camera<br />
Day on 20 June 2019.<br />
The purpose of the Surveillance Camera Day<br />
is to raise public awareness about the<br />
provision and operation of surveillance<br />
cameras and to enhance public debate<br />
surrounding the technology. In doing so, it is<br />
hoped the event will encourage conversations<br />
that will help inform policy-makers and<br />
service providers regarding societally<br />
acceptable surveillance practices and<br />
legitimacy for surveillance camera systems<br />
that are delivered in line with society’s needs.<br />
In recent times there have been media<br />
debates over the legitimacy with regard to<br />
some security practices, often based upon<br />
misinformation or a lack of understanding<br />
about video surveillance is deployed. As a<br />
result of the open day, it is hoped that the<br />
public will be given access to transparent and<br />
accurate information to help them better<br />
understand the benefits and positive aspects<br />
of the use of video surveillance with regard to<br />
security, safety and more efficient<br />
communities and services.<br />
There will be a number of different<br />
elements to the Surveillance Camera Day. The<br />
Commissioner is encouraging surveillance<br />
control centres to open their doors, allowing<br />
the public can see, first hand, how they<br />
operate. To complement the ‘doors open’<br />
initiative, a number of surveillance camera<br />
operators will be publishing a surveillance<br />
camera factsheet, setting out basic facts<br />
about their systems, including what it is<br />
designed to do, how it is used and the number<br />
of cameras involved.<br />
The Commissioner will also be launching a<br />
‘Secure by Default’ standard for<br />
manufacturers at the IFSEC International<br />
Conference in London. Where manufacturers<br />
meet the new standard, it will ensure that the<br />
default settings of a product are the most<br />
secure settings possible. This means they are<br />
much less likely to be vulnerable to cyber<br />
attacks. The standard will involve self<br />
certification.<br />
IFSEC International is Europe's leading security<br />
event and a global stage committed to promoting<br />
the future of integrated security. It is designed to<br />
offer a response to the world’s evolving threats,<br />
inviting every vertical of the security industry to<br />
forge a global agenda. This year the exhibition is<br />
hosting the launch of the first Surveillance Camera<br />
Day, along with the introduction of the Secure by<br />
Default basic requirement standard to enhance<br />
cybsersecurity.<br />
Tony Porter, Surveillance Camera<br />
Commissioner, stated, ‘Surveillance Camera<br />
Day is a world first. The UK is sometimes<br />
referred to as the most surveilled country on<br />
the planet. I want to start a conversation<br />
about how surveillance cameras are used,<br />
why they’re used and who is using them.<br />
Cameras keep people safe, but new and<br />
emerging technology can lead to<br />
infringements of civil liberties. Engagement is<br />
a key strand of the national strategy and I<br />
want people who use cameras to shine a light<br />
on what they do, how they’re using cameras<br />
to protect communities, not spy on them.’<br />
31
ADVERTISEMENT FEATURE<br />
Installers to master video system<br />
cybersecurity - more powerful<br />
tech options at IFSEC<br />
A line-up of 2019’s most important advances in video<br />
technology - including powerful and dynamic privacy masking,<br />
a range of exciting new cameras and smarter deep learning<br />
analytics - will be showcased by IDIS at IFSEC 2019.<br />
One of the top priorities - for installers and<br />
end-users - is an issue that’s been<br />
prominent in the news lately:<br />
cybersecurity.<br />
IDIS, which is Korea’s largest video<br />
technology manufacturer, is telling visitors to<br />
its stand (IF1110) that network security, and<br />
the threat of cyber-loopholes, should be taken<br />
very seriously indeed by video surveillance<br />
users.<br />
To inform those involved in level decisionmaking<br />
across the sector, the company has<br />
now produced a cybersecurity advisory video,<br />
which is available via the IDIS website and<br />
YouTube channel. The video explains the<br />
urgent need to strengthen the resilience of<br />
traditional surveillance network processes.<br />
The IDIS team will be reinforcing this<br />
message at IFSEC 2019.<br />
According to the company, end users should<br />
plan for three specific risks: data access<br />
loopholes, data transmission weaknesses, and<br />
threats against the integrity of recorded footage.<br />
IDIS has put effort into addressing these risks<br />
at every stage, from R&D through to<br />
installation. states James Min, Managing<br />
Director, IDIS Europe.<br />
‘We have developed a rich, layered and<br />
comprehensive set of technologies and features<br />
to ensure maximum protection for end users.’<br />
For example, IDIS DirectIP, the cornerstone of<br />
the IDIS Total Solution, closes up widespread<br />
vulnerabilities and serves as a proprietary<br />
mutual authentication system for all IDIS IP<br />
products. DirectIP speeds up implementations<br />
and streamlines cybersecurity by eliminating<br />
the need for engineers to manage multiple IP<br />
addresses and associated passwords during<br />
implementation.<br />
It not only speeds up installation but<br />
mitigates against human error and the common<br />
malpractice of saving passwords in vulnerable<br />
spreadsheets.<br />
Supporting integrators and installers who want<br />
to ensure cybersecurity but don’t have in-depth,<br />
specialist knowledge of routing or networking,<br />
IDIS’s For Every Network (FEN) peer-to-peer<br />
technology lets engineers deploy and configure<br />
secure, multi-site surveillance solutions that<br />
deliver centralised monitoring and control.<br />
IDIS is also highlighting the cybersecurity<br />
essentials for transmission and recording,<br />
together with its own patented and proprietary<br />
technologies which prevent activities such as<br />
snooping, modification and destruction of data.<br />
There’s also a timely reminder about the<br />
continuing importance of video recording<br />
integrity. With its advanced Chained Fingerprint<br />
technology, IDIS authenticates footage so that<br />
it can be submitted to the police and courts as<br />
admissible evidence.<br />
‘We’ve focused on cybersecurity in our<br />
training programmes too, covering devices and<br />
networks,’ states James Min. ‘We’re giving<br />
integrators and installers the tools and<br />
knowledge they need to protect their customers<br />
from video cybersecurity loopholes.’<br />
Privacy masking made easy<br />
As usual, IDIS has also been working hard on<br />
technology innovations that make a difference.<br />
For example, one advance will make life easier<br />
for end users when it comes to submitting video<br />
evidence or requests for footage in compliance<br />
with the General Data Protection Regulation<br />
(GDPR).<br />
The company will launch IDIS Dynamic Privacy<br />
Masking (IDPM) during IFSEC which makes the<br />
blurring and masking of people, vehicles and<br />
sensitive areas much faster and easier.<br />
Importantly, IDPM will be available totally costfree<br />
as a direct download from the IDIS website.<br />
This means that for integrators and installers<br />
who use IDIS platforms, there is no need to rely<br />
on expensive third-party suppliers to do this job,<br />
or to use slow, cumbersome techniques to do it<br />
32
ADVERTISEMENT FEATURE<br />
yourself. Instead, the user simply selects any<br />
faces or objects that need to be masked and<br />
IDPM will handle the task dynamically,<br />
throughout the clip, even if the subjects move<br />
around. IDPM applies the masks without<br />
changing or altering the integrity and<br />
authenticity of the video, meaning masking can<br />
also easily be removed if necessary.<br />
New cameras for speedy set-up<br />
and top performance<br />
It goes without saying that IDIS has also spent<br />
the last year innovating with its award-winning<br />
camera line-up. The selection of models being<br />
introduced at IFSEC includes an easy-to-install 2<br />
Megapixel micro-dome (86pi x 58), designed for<br />
speedy set-up and rapid deployment. It features<br />
in-built IR illumination with a range of 15 metres<br />
and, with no cable whip (pigtail), it offers neater<br />
and quicker installation. The 2MP micro-dome’s<br />
neat appearance makes it ideal for locations<br />
where aesthetics are important, such as highend<br />
retail stores.<br />
The IDIS Light Master PTZ features a powerful<br />
36x optical zoom and an Auto-IRIS with Hall<br />
Sensor for optimum image quality. Integrators<br />
and installers can choose between PoE or low<br />
power 24V AC PSUs. In operation, the camera<br />
benefits from highly accurate auto-return<br />
positioning that ensures the home positioning<br />
index is never lost, even if the camera has been<br />
forced to change angle.<br />
A new range of 5 Megapixel IP cameras will<br />
also be revealed, meeting demand from endusers<br />
for a wider range of high definition options.<br />
The range includes a choice of fixed- and<br />
motorised-focus domes for indoor and outdoor<br />
use, and outdoor motorised bullet-type cameras.<br />
Powerful deep learning analytics<br />
now easy to add<br />
Also launching at the show, IDIS’s DV-2116 ‘AI in<br />
the Box’ will make deep learning analytics more<br />
affordable for small to mid-sized applications,<br />
enhancing security and control room efficiency.<br />
The plug-and-play IDLA-ready appliance<br />
comes embedded with an NVDIA GTX1060 GPU<br />
chipset, allowing the analysis of up to 16<br />
channels simultaneously. Users benefit from<br />
powerful intelligent search functions, tracking<br />
by colour, object and number, plus the soon to<br />
be available Re-ID, which makes it easy to<br />
locate specific individuals within selected time<br />
and location parameters.<br />
The introduction of ‘AI in the Box’ makes<br />
deep learning analytics now easier to adopt<br />
through plug-and-play installation via IDIS<br />
Solutions Suite video management software<br />
(VMS). This allows installation without costly<br />
disruption, and the 97 per cent accuracy proven<br />
in independent testing will minimise false<br />
alarms, significantly improving detection and<br />
monitoring performance.<br />
Visitors to the IDIS stand will also learn about<br />
end-to-end solutions for retail, education and<br />
commercial applications, the flagship plug-andplay<br />
offering DirectIP, and IDIS’s choice of video<br />
VMS including the totally cost-free IDIS Center<br />
and the award-winning modular and scalable<br />
IDIS Solution Suite. Together these advances<br />
offer end-users, integrators, installers,<br />
consultants and distributors new levels of<br />
system-building flexibility, along with significant<br />
cost advantages and enhanced security.<br />
‘Once again IDIS will be at IFSEC showcasing<br />
the most innovative video technology,’ states<br />
James Min, Managing Director, IDIS Europe. ‘For<br />
end-users we’ll be demonstrating how IDIS can<br />
lower the total cost of ownership, and for<br />
integrators and installers we’ll explain how the<br />
implementation of IDIS technology can improve<br />
profitability.’<br />
Don’t miss the IDIS party,<br />
Wednesday 19 June<br />
For a chance to catch-up with industry<br />
contacts – and win a fantastic European break<br />
for two – end users, integrators and installers<br />
are encouraged to come to the IDIS Happy Hour<br />
Party on Wednesday 19 June at 15:00 on stand<br />
IF1110. You might go home a winner when you<br />
try your luck on the ‘lights out’ and ‘buzz wire’<br />
games – and see if your speed, agility and<br />
accuracy match IDIS’ deep learning analytics!<br />
James Min,<br />
Managing Director,<br />
IDIS Europe<br />
For more information about<br />
IDIS’s video solutions, visit<br />
www.idisglobal.com, email<br />
uksales@idisglobal.com or<br />
call +44 (0)203 657 5678.<br />
For up to date news and<br />
information about IDIS’s<br />
technology launches and<br />
activities throughout IFSEC,<br />
follow @IDISglobal on<br />
Twitter.<br />
33
ADVERTISEMENT FEATURE<br />
What’s new with Inner Range?<br />
Come and find Inner Range at<br />
Stand IF1030 or visit<br />
innerrange.co.uk<br />
Access control manufacturer Inner Range<br />
will showcase a host of product<br />
upgrades and enhancements at IFSEC<br />
International 2019, including new apps,<br />
integrations, partitioned systems and an<br />
evidence vault with cryptographic<br />
fingerprinting.<br />
Powerful and budget-friendly<br />
Inception<br />
Inner Range’s award-winning entry-level<br />
access control system, Inception, now has its<br />
own dedicated Sky Command App to control<br />
access remotely. This allows interactive<br />
control and live status of areas, inputs, doors<br />
and outputs, as well as simple or multimode<br />
area arming options. Push notifications can be<br />
sent to smartphones, helping security<br />
managers stay alert to any changes on site.<br />
Inception can also now integrate with the<br />
Milestone XProtect video management system.<br />
The Inception controller becomes the security<br />
and access mechanism supporting the<br />
Milestone system. Multiple Inception systems<br />
can be integrated with a single Milestone<br />
system for multi-site monitoring. Live access<br />
and alarm events can be sent to Milestone,<br />
allowing a wide range of actions to be<br />
triggered within the Milestone system, such as<br />
operators being able to compare video footage<br />
to a user’s photo to grant access.<br />
Award-winning Integriti<br />
Meanwhile, Inner Range’s enterprise-level<br />
intelligent, integrated access control and<br />
intruder detection system, Integriti, has also<br />
been enhanced. IFSEC visitors can see how it<br />
now introduces ‘partitioned sites’, which<br />
allow security managers to create users and<br />
other global entities that only exist within the<br />
partition they were created in. This is<br />
particularly useful for multi-tenanted<br />
buildings because the partitions are<br />
completely isolated and invisible to users in<br />
other partitions.<br />
A new evidence vault for Integriti allows<br />
files to be stored securely without taking up<br />
space in database back-ups. Users can add<br />
MD5 and SHA-256 cryptographic hashes to<br />
ensure files are not tampered with, while<br />
video surveillance footage and snapshots<br />
associated with certain alerts can be<br />
automatically saved to the vault. Fine grain<br />
permissions allow the operator high levels of<br />
control over who can store or retrieve<br />
evidence items.<br />
High Security<br />
For visitors who need watertight security for<br />
critical national infrastructure organisations or<br />
defence and government bodies, Inner Range<br />
will also offer demonstrations of its Integriti<br />
Encrypted High Security system, which offers<br />
end-to-end encryption with Mac authentication.<br />
IFSEC demonstrations<br />
The Inner Range stand will include eight large<br />
screens to demonstrate the manufacturer’s<br />
access control systems and software in action.<br />
Inner Range will also be taking part in the<br />
event’s ‘Show Me How’ series of<br />
demonstrations, with an Inception challenge<br />
for installers and integrators.<br />
Tim Northwood, General Manager for Inner<br />
Range, stated, ‘We’re proud of the fact that<br />
our research and development never stops.<br />
Our products are constantly evolving to offer<br />
more robust safety and security as well as<br />
ease of use.<br />
‘IFSEC is always a great event for us to<br />
catch up with existing customers and show<br />
potential new ones just what our intelligent<br />
access control systems can do. Come and see<br />
for yourself.’<br />
World leader<br />
Inner Range has been a world leader in the<br />
design and manufacture of intelligent security<br />
solutions since it was established in 1988.<br />
More than 150,000 Inner Range systems have<br />
been installed in over 30 countries. Customers<br />
include hospitals and high-security units,<br />
colleges, distribution centres, pharmaceutical<br />
companies, government and critical national<br />
infrastructure sites.<br />
34
The intelligent video analytics module for real-time control of PTZ<br />
cameras. It automatically detects and tracks moving objects<br />
within the surveillance area.
Register for regular<br />
updates, free-of-charge!<br />
Benchmark E-News<br />
Benchmark is the security<br />
industry’s only magazine<br />
that targets security<br />
installers and system<br />
integrators who are<br />
delivering bespoke and<br />
innovative solutions.<br />
Written to help those who<br />
are designing, specifying<br />
and installing best-ofbreed<br />
systems,<br />
Benchmark helps its<br />
engineer-based<br />
readership by seeking out<br />
the most flexible and<br />
effective smart solutions.<br />
Every week Benchmark sends<br />
registered readers e-mail-based<br />
content including new<br />
independent tests and technology<br />
assessments, informative articles,<br />
news and technical bulletins to<br />
ensure you are kept up to date.<br />
Registration to receive<br />
Benchmark’s E-News service is<br />
free-of-charge and ensures you<br />
stay ahead of the crowd by having<br />
access to the latest industry<br />
information. Because the<br />
dedicated Benchmark team<br />
generate all of the editorial<br />
content, you can read tests and<br />
assessments that simply are not<br />
available elsewhere.<br />
Visit www.benchmarkmagazine.com<br />
today and sign up<br />
36
much more than a PSIM<br />
Physical Security Information Management<br />
The technology agnostic platform that really<br />
understands what your end user needs.<br />
Mix & Match Monitoring Interact<br />
Easily combine all<br />
your Security and<br />
Information Systems.<br />
Free yourself from<br />
Brand dependence<br />
and start correlating<br />
activities and events.<br />
Accurate monitoring<br />
and real-time analysis<br />
in ways you never<br />
thought possible!<br />
Have the ability to<br />
rapidly take informed<br />
and data-driven<br />
actions.<br />
From alerts and<br />
warnings to statistical<br />
data, the information<br />
that really matters,<br />
will appear instantly,<br />
making it easier to<br />
take action.<br />
Co-funded by:<br />
www.cosmonautasoftware.com
ADVERTISEMENT FEATURE<br />
Interested in further<br />
information? Get in touch<br />
with the MOBOTIX Sales<br />
Team via sales@mobotix.com<br />
The MOBOTIX Mx6 2nd<br />
Generation Platform<br />
Mx6 cameras use a video security and information systems offer<br />
new, more powerful excellent quality at highly affordable prices.<br />
CPU that delivers up Despite their extremely low system costs,<br />
to twice as many images per the indoor cameras feature all coveted<br />
second – at the same<br />
MOBOTIX functions, such as hemispheric<br />
resolution. For example, technology. Since distances are shorter<br />
they deliver up to 34 frames indoors, a hemispheric video system with a<br />
per second in full HD. This fisheye lens and 360° all-round view (ceiling<br />
allows for better capture of installation) or 180° panorama view (wall<br />
quick movements. The installation) is often the most efficient<br />
camera line is not only solution for indoor surveillance.<br />
faster, but also has more MOBOTIX cameras can be configured and<br />
capacity for software<br />
operated via PC, tablet or smartphone browser<br />
applications such as 3D without additional software. Thanks to optional<br />
motion analysis and license audio equipment, all four indoor variants<br />
plate capture in the camera. support twoway communication and can be<br />
The MOBOTIX Mx6 2nd recorded in an encrypted way to the internal SD<br />
Generation Platform is card. The cameras also include intelligent video<br />
offered with integrated analysis for statistics on objects and people,<br />
MxBus functionality which is heat maps and behavioural detection.<br />
based on an extended camera board. This MOBOTIX provides a cuttingedge solution for<br />
two-wire cable system developed by MOBOTIX nearly all video applications.<br />
is encrypted against cyberattacks and<br />
Thermal cameras are effective and<br />
expands camera functions by including<br />
affordable, offering high-calibre imaging<br />
practical additional MOBOTIX modules such technology in a modular dual camera system.<br />
as the MX-GPS-Box, a reliable time server for Complement perimeter protection and fire<br />
a complete video system.<br />
prevention solutions with far superior<br />
Outdoor cameras are robust, durable and technology. The weatherproof MOBOTIX<br />
multifunctional, offering weatherproof<br />
thermal cameras detect and register objects<br />
complete IP video systems for everyone who and people using a thermal signature, even in<br />
wants more than just standard solutions. total darkness at a distance of over 100<br />
From Antarctica to the swamps of Florida, metres. Importantly, thermal cameras<br />
MOBOTIX cameras are known for their<br />
safeguard privacy.<br />
reliability, even under harsh environmental The thermal cameras are based on the M16<br />
conditions, and prove it each and every day. and S16 series and can be complemented by a<br />
Thanks to their lack of mechanical moving high-resolution image sensor module. These<br />
parts and unique, multifunctional design, thermal cameras also take on the intelligent<br />
MOBOTIX outdoor cameras require no<br />
MOBOTIX video functions. Objects are<br />
additional heating or cooling at temperatures detected through the MxActivitySensor with<br />
from -30°C to +60°C (-22°F to 140°F). Their accuracy. MOBOTIX thermal cameras detect<br />
maintenance-free, fibre-glass reinforced targets as long as the temperature in the<br />
housing also protects against extremely high defined exposure window deviates from the<br />
humidity levels (non-condensing), corrosion, standard range. They are also effective in<br />
pollutants and direct sunlight.<br />
detecting life-threatening heat sources.<br />
Powered with standard PoE, MOBOTIX video<br />
systems deliver ultimate energy efficiency. The MOBOTIX Cactus Concept<br />
Special Moonlight image sensors, modular MOBOTIX developed the cactus concept for a<br />
day and night dual camera technology and reliable protection of end-to-end video<br />
intelligent exposure control reduce power systems. Protecing against hacker attacks, the<br />
consumption by enabling high-quality video intelligent video system is ready to go, but<br />
recording under even very poor light<br />
can also stand up to the ever-evolving<br />
conditions - without any additional lighting. challenges of our world. This ensures that<br />
With the indoor cameras, the details make your data stays where it is supposed to be –<br />
all the difference. Discreet, multi-functional and nowhere else.<br />
38
SiX<br />
SiX: an essential event for<br />
integrators and installers<br />
For many system integrators and security<br />
installers, the future of the security<br />
industry is dependent upon the delivery<br />
of enhanced flexibility. Increasingly, end users<br />
are seeking features and functionality which<br />
fits with their vision of a smarter future. As a<br />
result, intelligent technologies which provide<br />
advanced capabilities, scalable systems and<br />
bespoke solutions are not just expected; they<br />
are demanded by many businesses and<br />
organisations.<br />
Today’s technologies allow integrators and<br />
installers to not only deliver higher than ever<br />
levels of security and protection to businesses<br />
and organisations, but also enable them to<br />
offer a high level of benefits and added value<br />
which create business efficiencies. By<br />
ensuring end users enjoy a greater return on<br />
investment, integrators and installers taking a<br />
smart approach to business can enjoy an<br />
increased willingness by their customers to<br />
invest in smarter systems and solutions.<br />
Demand for smart and more efficient<br />
systems is high, and everyday there are more<br />
customers seeking such solutions. With many<br />
of the new and emerging technologies having<br />
a significant impact on the security arena, the<br />
flexibility and scalability of systems is<br />
constantly being enhanced. Security is not<br />
just about reducing the risk of crime. It now<br />
includes provision of a range of benefits such<br />
as compliance, asset management, building<br />
control, business intelligence and duty of care<br />
monitoring.<br />
It is vital that system integrators and<br />
security installers realise the value in these<br />
systems and ensure they offer solutions that<br />
meet customer expectations. Developments<br />
in other technology-based sectors are raising<br />
the bar in terms of performance, and end<br />
users expect the same from security.<br />
Attending Six in Manchester later this year<br />
will enable integrators and installers to<br />
network with innovative, market-leading<br />
manufacturers and service providers. SiX<br />
SiX<br />
19<br />
On 5-6 November 2019, SiX, an event specifically<br />
targeted at system integrators and security<br />
installers interested in the design, delivery and<br />
implementation of smarter solutions will take place<br />
at Event City in Manchester. Given the rapidly<br />
evolving technological landscape in today’s security<br />
sector, and the emerging technologies which add<br />
value for end users, this event promises to link<br />
forward-thinking engineers with similarly minded<br />
manufacturers and service providers.<br />
will create the only event dedicated to the<br />
delivery of efficient and value-added<br />
solutions.<br />
The event will include a conference<br />
programme, hands-on sessions and the<br />
ability to meet with manufacturers and<br />
service providers to discuss technology,<br />
implementations, integrations and other<br />
needs when creating and delivering best-ofbreed<br />
security solutions. Registration to<br />
attend is free-of-charge.<br />
2 November 5/6<br />
For event registration, visit: sixevent.co.uk<br />
39
SMART SOLUTIONS<br />
Increasing RoI with Energy<br />
Management<br />
For many end users, the benefit of implementing a smart<br />
solution is a boost to the overall return on investment.<br />
While crime prevention is the ultimate goal, any additional<br />
benefits from the system which introduce efficiencies can<br />
help with regards to authorising the contract.<br />
In the past, there was a lot of talk about the<br />
return on investment (RoI) of security<br />
solutions. However, it was difficult to<br />
ascertain a true sense of the tangible RoI<br />
because losses due to crime are not a<br />
constant, nor are they easily quantifiable.<br />
With today’s smart systems, things are<br />
somewhat different. Because the systems not<br />
only offer protection, but can also deliver a<br />
wide range of everyday efficiencies, the RoI<br />
can now be proven in many use-cases.<br />
By implementing a technology-agnostic<br />
software platform, integrators and installers<br />
can deliver a seamlessly integrated GUI which<br />
not only provides intuitive and unified control<br />
over all the elements of the security system,<br />
but can also provide control and management<br />
of peripheral systems.<br />
Too often, users only interact with a<br />
security system when something negative<br />
happens. Where smart building control is<br />
added, customers use the system on a daily<br />
basis, enjoying the realisation of business<br />
efficiencies. This not only eliminates the<br />
‘grudge purchase’ mentality, but delivers a<br />
genuine return on investment.<br />
One example of this can be seen from a<br />
University in Europe. The University supports<br />
tens of thousands of users across its campus,<br />
with around 80 buildings across numerous<br />
locations. With a duty of care to students and<br />
staff, a significant investment was made into a<br />
security solution. This incorporates<br />
approximately 600 doors protected by access<br />
control, linked with more than 200 video<br />
surveillance cameras.<br />
When the system was designed, the main<br />
objective was to ensure the security control<br />
room operators could access all elements of<br />
the security system as a unified solution.<br />
However, because of the scale of the site, it<br />
also requirements relating to energy and<br />
utility management.<br />
The university management wanted to<br />
implement a degree of monitoring and control<br />
over electricity, gas and water consumption,<br />
as usage figures were high. The best solution<br />
was to integrate relevant management<br />
systems into the security solution. This was<br />
achieved using COSMO PSIM+.<br />
To deliver seamless integration of the<br />
security and energy management systems,<br />
COSMO PSIM+ allowed the relevant<br />
connectivity as it is an API-based technologyagnostic<br />
solution. The single intuitive GUI<br />
ensured that the energy management and<br />
maintenance teams could easily access realtime,<br />
accurate status information about the<br />
systems, whenever necessary.<br />
The real-time monitoring software brings<br />
together data from the complete security<br />
system, as well as from energy monitoring<br />
and operational systems in a single place. The<br />
customisable interface means COSMO PSIM+<br />
delivers an easy-to-use interactive experience<br />
for the customer, providing key features such<br />
as remote access and monitoring with full<br />
control of the site’s existing systems. As a<br />
result, the university management team has<br />
maximised its RoI on the security investment.<br />
Next Month<br />
How the COSMO PSIM+ solution can<br />
create cost-savings for the end user.<br />
40
FASTER INSTALLS.<br />
LESS WORK.<br />
IDIS<br />
reduces time and cost effectively with rapid installation<br />
With guaranteed interoperability and performance in a true plug-and-play total solution, IDIS cameras, NVRs, network<br />
equipment and client software install quickly with minimal training, keeping your margins high and customers delighted.<br />
IDIS<br />
Europe<br />
1000 Great West Road, Brentford, Middlesex, TW8 9HH, United Kingdom<br />
T +44 (0)203 657 5678 F +44 (0)203 697 9360 E uksales@idisglobal.com<br />
www.idisglobal.com
ADVERTISEMENT FEATURE<br />
Please contact our team<br />
for more information at<br />
marketing@optex-europe.com<br />
or call +44(0) 1628 631 000<br />
Upgrade your monitored alarm<br />
system to visual verification<br />
Whereas the monitoring of intruder alarms<br />
through an Alarm Receiving Centre (ARC) is<br />
generally accepted best practice, CCTV<br />
monitoring remains slow to take hold. Part of the<br />
problem has come down to money; larger sites such<br />
as major depots and warehouses with constant<br />
activity 24/7 can clearly benefit from a fully<br />
functioning CCTV system monitored through a<br />
dedicated Remote Video Response Centre (RVRC).<br />
Smaller sites, while they would benefit from visually<br />
verified alarms, would struggle to justify the<br />
investment of a full-scale RVRC solution.<br />
A similar argument can be made for the ARCs<br />
themselves. They are set up specifically to monitor<br />
intruder alarms, and they do it well. For an ARC to<br />
become an RVRC is simply not practical; not, at<br />
least, without a significant outlay in capital. But<br />
what if there was a simple technology that could act<br />
as the ‘Bridge’ between intruder and CCTV<br />
technologies, and that would enable the ARC to<br />
visually verify alarms without the need for any<br />
substantial investment? This is a challenge that is<br />
being addressed with the new OPTEX Bridge<br />
powered by CHeKT.<br />
The OPTEX Bridge, powered by CHeKT, is a<br />
hardware and software solution that takes separate<br />
intruder and CCTV technologies installed on the<br />
same site, but acting independently, and ‘bridges’<br />
them to create one, seamless, integrated monitored<br />
solution. Intruder alarms can now effectively be<br />
visually verified, without impacting the integrity of<br />
the technology installed, or its Grade.<br />
When an alarm occurs, a signal is<br />
sent to the ARC whose operator can<br />
view images pre and post the alarm<br />
event via a dedicated portal to<br />
determine whether the alarm is<br />
genuine. Camera locations can be<br />
overlaid with a map of detection<br />
zones, thus helping the ARC<br />
operator to quickly and easily ‘see’<br />
where the incident has occurred<br />
and take the appropriate action.<br />
Images can also be sent direct to<br />
the customer’s handheld device for<br />
further verification if, for example,<br />
the alarm is genuine, but the<br />
‘intruder’ is known to the customer<br />
or has a legitimate reason for being<br />
on site.<br />
The OPTEX Bridge provides a<br />
complete audit trail of activity, and<br />
can detect when a camera is not<br />
working (i.e. when it has dropped<br />
out of the network), and report the<br />
fault, thus ensuring security is not<br />
compromised. It can also<br />
communicate with the ARC in the<br />
appropriate ‘language’, regardless<br />
of the make or manufacture of the<br />
technology installed, or the<br />
protocols with which it operates. It will, in effect,<br />
work with virtually any intruder alarm technology<br />
and any ONVIF camera to deliver one seamless<br />
visual verification solution. The ARC software needs<br />
to be compatible, and many of the major ARC<br />
software platforms are already integrated.<br />
The advantages to the ARC are obvious: it gives<br />
them the ability to provide a visual verification<br />
service to residential and commercial sites without<br />
a substantial investment in time or money; the<br />
Bridge can be installed and working within the hour.<br />
Operationally there are benefits too, for the Cloudhosted<br />
platform allows a much stronger<br />
collaboration between the ARCs and the<br />
home/business owners by having the ability to<br />
share video clips to confirm the alarms (as<br />
described above) while respecting any privacy<br />
guidelines.<br />
There are advantages too for the customers and<br />
installers. For the customer, it means realising the<br />
true potential of technology which is already<br />
installed, turning an essentially ‘reactive’ system<br />
into a ‘proactive’ solution. By installing the OPTEX<br />
Bridge, sensors and cameras combine to deliver a<br />
reliable and effective early warning solution,<br />
detecting and reacting to an intrusion before a<br />
potentially damaging and costly event has occurred.<br />
It is also invaluable to those who may have lost<br />
their URN; a visually verified alarm will put them<br />
back on police response. For the installer,<br />
meanwhile, it provides another revenue stream and<br />
ability to add further value to the customer sale.<br />
42
NETWORK ZONE<br />
NETWORK ZONE:<br />
Selecting a Switch<br />
The benefits of networked security<br />
systems – whether video, access control,<br />
perimeter protection or intruder alarm –<br />
are manifold, and have been well<br />
documented. Technology is moving rapidly,<br />
and end user requirements currently change<br />
quickly as new options come to market. The<br />
rise of IoT connectivity has also focused<br />
minds on IP-connectivity.<br />
For those seeking advanced and smart<br />
solutions, there is something of a constantly<br />
evolving landscape. For critical solutions<br />
where continuity is key, the selection of<br />
appropriate infrastructure, and especially of<br />
switches, is of paramount importance when<br />
specifying a system.<br />
Selection of an inappropriate switch can<br />
create a variety of problems. These can vary<br />
from dropped connections, frozen data<br />
streams and poor performance though to<br />
missed recordings or events, undiscoverable<br />
devices and even total system failures. Where<br />
issues are created, these problems may be<br />
sporadic, which is a headache for engineers<br />
when troubleshooting in the field.<br />
Integrators and installers must ensure their<br />
selected switches are capable of delivering<br />
the functionality and reliability required, and<br />
increasingly can allow the implementation of<br />
cybersecure configurations.<br />
Basic requirements<br />
Before considering the specification of a<br />
switch, it is important to understand the basic<br />
requirements of the security system. How<br />
many devices will be deployed and how will<br />
they be used? Will the system be continuously<br />
Networked systems are the first choice of end<br />
users because of the flexibility and advanced<br />
functionality on offer. Whilst integrators and<br />
installers working in this market are competent in<br />
specifying security devices, is enough consideration<br />
given to the deployed switches?<br />
operating or will it be triggered by events,<br />
actions or transactions? Will certain devices<br />
be inactive during specified periods? All of<br />
these details will impact on the switch<br />
selection. As smart technologies expand the<br />
possibilities from modern security stystems,<br />
integrators and installers should factor in<br />
additional capacity for the inevitable system<br />
expansions and upgrades.<br />
The bit-rate allocation must be calculated to<br />
ensure the correct performance is delivered,<br />
and allowances should be made if this will<br />
change on alarm or during events. Each device<br />
should be benchmarked to ascertain<br />
performance at the specified bit-rate.<br />
The goal should never be to try to force the<br />
system to come in under a pre-defined bit-rate<br />
limit; rather, the best approach is to calculate<br />
what will be needed for consistent<br />
performance and ensure there is some<br />
additional capacity to cope with spikes in<br />
load.<br />
The many stages of designing an IP-based<br />
solution start with security requirements, and<br />
from this device requirements are established.<br />
Then, by using both the security and device<br />
requirements, data transmission details can<br />
43
NETWORK ZONE<br />
be established. These should include<br />
transmission type and the required<br />
bandwidth. Only once this is done can switch<br />
selection be considered.<br />
Layer 2 or Layer 3?<br />
One of the first questions to consider is<br />
whether you require a Layer 2 or a Layer 3<br />
switch. It is not uncommon for Layer 3<br />
switches to be automatically specified<br />
because of an assumption that they must be<br />
superior. The reference is to the OSI seven<br />
layers of networking, in which Layer 2 is the<br />
distribution layer and Layer 3 is the<br />
networking layer. This in itself describes the<br />
fundamental difference between the two.<br />
A Layer 2 switch works in a single subnet<br />
and ‘learns’ the MAC addresses of devices<br />
connected to it. For example, when a VMS<br />
requests video from a specified camera, the<br />
switch knows where that camera is on the<br />
network by its MAC address. Because all the<br />
devices reside on the same network segment,<br />
the switch simply distributes the data packets<br />
based on this information.<br />
A Layer 3 switch differs in that it can route<br />
data packets between different subnets, as it<br />
uses the IP address rather than the MAC<br />
address of a device. While both types of<br />
switch allow the creation of VLANs, a Level 2<br />
switch will not allow connection between two<br />
VLANs but a Layer 3 switch will.<br />
A VLAN (Virtual Local Area Network) is a<br />
way of dividing and segmenting network<br />
traffic within a switch. Some switches are<br />
available with a simple VLAN implementation<br />
feature, allowing the network to partition<br />
different types of traffic. This ensures that<br />
bandwidth is maintained and manages<br />
potential problems which may occur if some<br />
data streams consume all available network<br />
throughput.<br />
A VLAN enables the security network to<br />
remain independent of other network<br />
segments without affecting performance, even<br />
though all data is passing through the same<br />
switches.<br />
Managed or Unmanaged?<br />
The next choice is whether to deploy<br />
unmanaged or managed switches.<br />
Unmanaged devices are typically ‘plug-andplay’<br />
and treat all transmitted data equally. As<br />
such, all data streams are ‘fighting’ for<br />
bandwidth. A managed switch can allow<br />
Quality of Service (QoS) protocols to be<br />
respected. Some unmanaged switches claim<br />
to honour priority tags, but it is best to use a<br />
switch which supports QoS if you need to<br />
prioritise certain data streams.<br />
QoS allows the integrator or installer to set<br />
configurations for specific ports. This ensures<br />
that data being transmitted from critical<br />
devices is prioritised as more important than<br />
data streams from other devices. With the<br />
growth of IoT and peripheral add-ons to<br />
security systems, QoS becomes a more<br />
desirable feature.<br />
Unicast or Multicast?<br />
When specifying a switch, it is important to<br />
consider what transmission type will be used:<br />
Unicast or Multicast? Unicast traffic creates a<br />
one-to-one transmission. If multiple clients<br />
require data, then the relevant data is sent<br />
multiple times which impacts negatively on<br />
bandwidth usage.<br />
Multicast traffic effectively ‘publishes’ the<br />
data, creating a one-to-many transmission.<br />
Multicasting switches must support IGMP<br />
which manages clients to receive data.<br />
IGMP support includes an IGMP Querier<br />
that determines which clients belong to which<br />
groups, and an IGMP Snooper which monitors<br />
the ports on the hardware to determine which<br />
require the data. This allows the switch to<br />
only send data to those ports, reducing<br />
network load. With IPv6, IGMP is replaced by<br />
Multicast Listener<br />
Discovery (MLD).<br />
44
Stay Untouched.<br />
And Secure Your Security.<br />
www.cactusconcept.com<br />
At MOBOTIX, we have developed the unique cactus concept for a reliable and complete protection of endto-end<br />
video security systems. Protect yourself against serious hacker attacks – with an intelligent video<br />
system that is ready to go, but can also stand up to the ever evolving challenges of our world.<br />
Stay untouched with MOBOTIX!
NETWORK ZONE<br />
Switch capacity<br />
Determination of the required switch capacity<br />
requires information about a number of<br />
characteristics: number and speed of ports,<br />
uplink requirements, throughput and<br />
backplane capacity.<br />
The number of ports is fairly selfexplanatory.<br />
Each device to be connected<br />
requires an individual port. Ports will also be<br />
required for uplinks to servers or management<br />
devices.<br />
The transmission speed of the ports is<br />
typically a choice between Fast Ethernet<br />
(10/100Mbps) and Gigabit Ethernet (GigE or<br />
1000Mbps). This will depend upon the NICs<br />
(network interface cards) that are embedded<br />
in the devices making up the system.<br />
However, the need to ‘uplink’ to a server must<br />
also be considered.<br />
When specifying a switch, you must<br />
consider both the speed of the data traffic<br />
generated from the field devices coming into<br />
the switch, and the speed of the data coming<br />
out of it to the server or management device.<br />
This latter element is the uplink.<br />
To reduce the chances of data bottlenecks,<br />
uplink ports should support at least 10 times<br />
the speed of the incoming traffic. In simple<br />
terms, if a switch is deployed with 100Mbps<br />
links from field devices, a 1000Mbps uplink<br />
would be required for transmission to the<br />
server.<br />
Fast Ethernet switches are available with<br />
Gigabit Ethernet ports for uplinks. If these are<br />
not sufficient then a Gigabit Ethernet switch<br />
will be required.<br />
The backplane capacity of a switch must be<br />
considered alongside throughput. Network<br />
ports will only achieve speeds relative to how<br />
fast the switch can process data. With low<br />
cost switches, it is not unusual to discover the<br />
devices do not have the backplane speed to<br />
support all ports at full load.<br />
The switch needs to have a backplane<br />
which has the capacity to allow all the ports to<br />
simultaneously operate at full load. Because<br />
of full communication between switch blades,<br />
the common approach is that the switch<br />
backplane should be equivalent to the<br />
number of ports multiplied by the port full<br />
speed, multiplied by two.<br />
Therefore, a four-port switch with port<br />
capacities of 1Gbps would require a backplane<br />
of 8Gbps to be non-blocking.<br />
Other considerations<br />
Often a switch may be located in a hostile or<br />
harsh environment. If this is the case, always<br />
ensure that the switch is hardened and can<br />
cope with extreme environmental conditions.<br />
Power over Ethernet is a significant benefit<br />
for integrators and installers, and is one<br />
genuine cost-saving when deploying a<br />
networked platform. If selecting a PoE switch<br />
you must consider its power budget. PoE<br />
(802.3af) provides up to 15.4W per port, with<br />
up to 12.9W being assured as available. PoE+<br />
(802.3at) provides up to 30W, with up to 25W<br />
being assured as available.<br />
The security market is now seeing switches<br />
available which support PoE++ (802.3bt). This<br />
provides up to 60W per port.<br />
To determine the specification of a PoEenabled<br />
switch, you will need to know the<br />
wattage required by each field device. The<br />
total wattage can be calculated across all<br />
devices connected to the switch, and the PoE<br />
budget must exceed the total requirement.<br />
Also check that the ports can provide the<br />
connected devices with the power they need.<br />
In summary<br />
The selection of a switch is dependent upon<br />
establishing the needs of each application.<br />
Selecting the wrong switch can only lead to a<br />
bad end user experience, no matter what<br />
security solution is installed.<br />
There are manufacturers who specialise in<br />
switches for security, and these are worth<br />
consulting as they have a good working<br />
knowledge of what is required in a security<br />
application. While IT-centric switches will do<br />
the job (if properly specified), integrators and<br />
installers may find the levels of support on<br />
offer lack the specialist knowledge which<br />
security-biased companies can provide.<br />
46
CathexisVision<br />
Video Surveillance Management Solutions<br />
A proven world-class<br />
Video Management System<br />
Real return on surveillance investment<br />
CathexisVision is a globally-recognised Video<br />
Surveillance Management System. It offers<br />
users the ability to make key-decisions based<br />
on intelligent information processing, and to<br />
take automated actions in the control room or<br />
command centre environment. This provides<br />
enhanced effectiveness and efficiency, and a<br />
superior return on surveillance investment.<br />
Open Architecture Video Surveillance<br />
Management Platform<br />
Enterprise, Multi-Site Architecture<br />
Sophisticated Command Centre Environment<br />
Advanced Video Analytics<br />
Advanced Video Search<br />
Adjacent Camera Mapping<br />
Third-Party Integrations<br />
Automatic Number Plate Recognition<br />
WINNER<br />
Video Surveillance Software<br />
Time: 20 16-12-01 16:00<br />
License plate: 41424<br />
Place of issue: Abu Dhabi<br />
Group: Blacklisted<br />
Driver name: Suspect<br />
Company: Company X<br />
Powerful, Feature Rich and Fully Integrated Surveillance Software<br />
info@cathexisvideo.com | www.cathexisvideo.com
ADVERTISEMENT FEATURE<br />
NVT Phybridge EC Extender Kits<br />
Benchmark Magazine has selected the<br />
NVT Phybridge EC Extender Kits as a<br />
finalist for the 2019 Benchmark<br />
Innovation Awards. The EC Extender Kits build<br />
on the continued successes of the CLEER<br />
family of coax-to-IP enabling PoE (Power over<br />
Ethernet) solutions. The CLEER family of<br />
switches and extenders allow organisations to<br />
simplify and accelerate their digital<br />
transformation by enabling IP endpoints over<br />
any new or existing coax-based infrastructure.<br />
The CLEER family’s EC-Base Extender, when<br />
paired with the EC-Link+ or EC4 Adapter,<br />
creates a robust, single-port extender solution<br />
leveraging the downlink port of any standard<br />
PoE switch. In addition to being sold<br />
separately, the EC-Base Extender is available<br />
with an EC-Link+ or EC4 Adapter to make up<br />
the recognised EC Extender Kits.<br />
The EC-Link+ Extender Kit extends the<br />
reach of a standard PoE switch; enabling<br />
one IP endpoint using a single long-run coax<br />
cable up to 1,800 metrres - 18 times farther<br />
than a traditional solution. The EC4 Extender<br />
Kit supports up to 4 IP endpoints using a<br />
single long-run coax cable up to 915 metres -<br />
9 times farther than a traditional solution.<br />
An EC Extender Kit explainer video is<br />
available at:<br />
https://www.nvtphybridge.com/benchmarkinnovation<br />
‘We take great pride in the quality of our<br />
products; putting them through extensive<br />
testing to ensure each and every unit<br />
performs above and beyond the expectations<br />
of our customers,’ stated John Croce, CEO of<br />
NVT Phybridge. ‘We are honoured to be<br />
recognised by Benchmark for innovations that<br />
exceed industry standards.’<br />
The NVT Phybridge CLEER family of<br />
products are built with patented<br />
SmartPathPoE technology, helping<br />
organisations leverage Modern LAN Principles<br />
to establish simple and cybersecure<br />
connections from endpoint to application.<br />
Organisations are leveraging the EC<br />
Extender Kits to significantly reduce<br />
infrastructure costs and deployment<br />
timelines. The simple plug-and-play solution<br />
eliminates operational disruption and network<br />
downtime during implementation; ensuring<br />
minimal impact to the business.<br />
Customers all over the world, including a<br />
national security agency and Spanish retail<br />
giant El Corte Ingles, have already leveraged<br />
the NVT Phybridge CLEER family of coax-to-IP<br />
enabling solutions to achieve a simple, secure<br />
and cost-effective modernisation to IP and the<br />
Internet of Things.<br />
Learn more at https://www.nvtphybridge.com/benchmark-innovation<br />
48
INNOVATION FOCUS<br />
INNOVATION FOCUS<br />
Benchmark champions the use of innovative and smart solutions to deliver added<br />
value and advanced benefits to end users. Here we round up some of the innovations<br />
which have caught the eye of our editorial team.<br />
TAKEX PIR-T40NAM<br />
Bosch Project Assistant App<br />
InfiNet InfiLINK 2x2<br />
FLIR Saros<br />
SAST IoT Platform<br />
OPTEX LiDAR Enhancements<br />
TDSi GARDiS<br />
HGH Cyclope Hypervisor<br />
3xLOGIC Vigil VMS<br />
Reconeyez PIR Cameras<br />
49
INNOVATION FOCUS<br />
TAKEX PIR-T40NAM<br />
Accurate and effective<br />
detection remains a<br />
cornerstone of security<br />
solutions. Modern products<br />
deliver increased catch<br />
performance, high levels of<br />
reliability and increased<br />
flexibility. One example is the<br />
PIR-T40NAM from TAKEX, an<br />
external PIR detector with a<br />
range of up to 40 metres.<br />
External detection remains a useful<br />
element inany security solution. Whether<br />
detecting intruderss at the perimeter or<br />
triggering alarms and actions before criminals<br />
can enter a building, providing the earliest<br />
possible warning remains a powerful tool<br />
when fighting crime, allowing action to be<br />
taken before losses or damage occurs.<br />
External detection also offers a host of<br />
other benefits. The devices are used to trigger<br />
actions on surveillance systems or as a part of<br />
smart solutions. With the increased flexibility<br />
of control panels and software-based security<br />
management, credible external detection<br />
devices offer a wealth of possibilities.<br />
The PIR-T40NAM is an external sensor with<br />
a range of 40 metres. It can be used for video<br />
switching and intruder detection applications.<br />
The sensor boasts four selectable<br />
operational modes which allow flexibility<br />
when it comes to positioning the unit. With a<br />
mounting height range of between two and six<br />
metres, it allows freedom when finalising<br />
device locations. To compensate for such a<br />
wide variance in mounting height, the<br />
detector includes modes for low, middle or<br />
high position, and high density.<br />
The sensor delivers vertical curtain<br />
protection. Other features include triple mirror<br />
optics and intelligent signal processing,<br />
ensuring the sensor can accurately and<br />
reliably detect intrusions whilst rejecting<br />
nuisance activations.<br />
As the product designation indicates, the<br />
PIR-T40NAM offers anti-masking protection.<br />
Features have been included to simplify<br />
installation and set-up, which is important<br />
with long-range detection devices, especially<br />
for an engineer working alone.<br />
In Low Position mode, the sensor can be<br />
mounted at a height of 2–2.5 metres,<br />
delivering up to 40 metres coverage. Middle<br />
Position mode reduces the range to 35<br />
metres, but allows a mounting height of<br />
2.5–3.5 metres. The High Position mode<br />
reduces the coverage to 30 metres, but allows<br />
for mounting heights of 3.5–4 metres. A high<br />
position helps eliminate blind spots.<br />
Finally, the High Density mode allows a<br />
mounting position of 2–6 metres. The overall<br />
coverage is extended to 45 metres, but pet<br />
immunity is non-operational. The detection<br />
head can be rotated through 90 degrees.<br />
Aligning long-range detectors can be timeconsuming.<br />
However, the PIR-T40NAM makes<br />
use of precise detection area adjustment<br />
achieved by projecting coloured LEDs onto the<br />
surface of each mirror, allowing fine-tuning.<br />
A geared mirror array allows detection<br />
patterns to be optimised based on mounting<br />
height and operation mode.<br />
50
INNOVATION FOCUS<br />
Bosch Project Assistant App<br />
The commissioning and<br />
handover of a system can<br />
involve a lot of paperwork and<br />
documentation, and for some<br />
integrators and installers it is<br />
a task they don’t relish. Bosch<br />
claims to have an answer with<br />
its Project Assistant App,<br />
designed to simplify many<br />
administrative tasks.<br />
The delivery of documentation is an<br />
important part of system hand-over, but<br />
its not something that most integrators<br />
and installers relish. Any tool that makes the<br />
process simpler and quicker has to be<br />
welcomed.<br />
In an age of digital communications and<br />
data sharing, the generation of plans, reports<br />
and system configuration details can be, to a<br />
large extent, automated. For those delivering<br />
video surveillance solutions, the Project<br />
Assistant App from Bosch Building<br />
Technologies can help and cuts down time on<br />
site.<br />
Bosch Building Technologies has developed<br />
a smart software solution designed to assist<br />
system integrators and security installers: the<br />
Project Assistant App. Previously, the<br />
planning, configuration, installation and<br />
documenting of a video security project<br />
involved a range of different (and often<br />
separate) tools and extensive man-hours to<br />
complete, making it difficult for system<br />
integrators to manage and keep track of<br />
various projects during each phase through to<br />
the final reporting.<br />
With the Project Assistant App,<br />
transparency and efficiency can be applied to<br />
every part of a video-based security project.<br />
From set-up of secure passwords for cameras,<br />
through the assignment of IP addresses, the<br />
pre-configuration of cameras, installation and<br />
configuration on-site, and delivering details of<br />
the installation to the end-user, the process<br />
can be time consuming.<br />
Simple errors and poor communications<br />
during the commissioning process add time<br />
and costs, and can adversely impact on a<br />
clients’ satisfaction with the full security<br />
system.<br />
Project set-up and pre-configuration can<br />
start in the office, before the physical<br />
equipment is in place. Using the app and<br />
project plans, IP addresses and passwords<br />
can be entered prior to attending site. This<br />
can be done on a per camera basis, or<br />
multiple devices can be managed at once.<br />
The Project Assistant automatically enters<br />
the information for each device, without the<br />
need for the hardware to be physically<br />
present. Creating a set of virtual devices<br />
within the app eliminates the need for<br />
unboxing and re-boxing of products for<br />
labelling and pre-configuration.<br />
Bosch claims the app delivers significant<br />
time savings of up to 30 per cent.<br />
Once the devices are physically installed<br />
and connected to a network, the Project<br />
Assistant is also connected to the network via<br />
Wi-Fi or a physical link. By scanning QR codes<br />
on the cameras, the MAC address is identified<br />
and the camera is assigned to a specific<br />
virtual camera.<br />
The Project Assistant makes it possible for<br />
every camera in the project to be contacted,<br />
checked and reported in a matter of seconds,<br />
producing a final client-ready report complete<br />
with field-of-view snapshots.<br />
51
INNOVATION FOCUS<br />
InfiNet InfiLINK 2x2<br />
Advances in communications infrastructure enable<br />
smart security systems to use wireless connectivity<br />
in a point-to-point capacity. As a result, the<br />
implementation of wide area surveillance is<br />
becoming simpler and more cost effective. One<br />
such option is InfiNet’s InfiLINK 2x2.<br />
Wireless connectivity is something most<br />
end users use on a regular basis. They<br />
trust the technology and understand<br />
its benefits based on experience. For many,<br />
wireless connectivity is an expectation. While<br />
they may not have a full understanding of the<br />
issues surrounding the transmission of<br />
multiple high bitrate video streams, it is a<br />
hurdle if integrators and installers need to<br />
challenge those expectations.<br />
Wireless technology has become a<br />
cornerstone of many critical solutions in<br />
security and safety. High capacity links are<br />
available that can provide cost-effective<br />
transmission on campus-type sites or where<br />
‘last mile’ connectivity might prove to be too<br />
costly. In such applications, a growing number<br />
of options are available, and most require<br />
little or no telecoms training to install.<br />
One such option is InfiLINK 2X2 from InfiNet<br />
Wireless. InfiLINK 2X2 is a point-to-point<br />
wireless transmission solution, combining<br />
high-speed capabilities of<br />
up to 280Mbps<br />
throughput, with features<br />
as leading-edge radio<br />
protocols providing<br />
spectral efficiency and<br />
wireless transmissions<br />
over distances in excess<br />
of 90 kilometres.<br />
While the InfiLINK 2X2<br />
has an impressive range,<br />
that doesn’t mean it is<br />
limited to use in city<br />
centre applications. The<br />
wireless solution can be<br />
deployed by many<br />
organisations to provide<br />
Ethernet extensions, such<br />
as simple LAN-to-LAN<br />
connectivity, between two<br />
locations. These could be<br />
separate sites or<br />
buildings on a single site. The application<br />
becomes increasingly cost-effective is there is<br />
a need to cross an obstacle such as a road,<br />
railway or river.<br />
In its most advanced configuration, the<br />
InfiLINK 2x2 provides complete<br />
communications and transmission<br />
infrastructure, enabling businesses and<br />
organisations of various sizes to connect<br />
remote or satellite sites, allowing the<br />
simultaneous transmission of multi-protocol<br />
services such as video, alarm data, voice<br />
communications and other data.<br />
The solution is available in two options:<br />
InfiLINK 2x2 Pro and InfiLINK 2x2 Lite. The<br />
latter has restrictions on throughput which<br />
are governed by the software license. It also<br />
has some performance limitations and does<br />
not support power via PoE.<br />
The solution is available in 4.9–6GHz and<br />
6–6.4 GHz frequency bands and uses MIMO<br />
2x2 (Multiple Input; Multiple Output)<br />
technology. Software is upgradeable<br />
dependent upon licensing, which adds<br />
features and capacity. The solution offers 5,<br />
10, 20 and 40MHz channel widths.<br />
Other features include a gigabit Ethernet<br />
port, flexible uplink/downlink reallocations,<br />
line-of-sight and non-line-of-sight<br />
deployments and advanced Quality-of-Service<br />
(QoS) support. The manufacturer claims that<br />
the solution is an out-of-the-box plug and play<br />
option.<br />
52
INNOVATION FOCUS<br />
FLIR Saros<br />
The linking of multiple technologies to achieve<br />
superior performance is an approach well<br />
understood by integrators and installers<br />
looking to deliver high quality solutions.<br />
Often this involves configuring disparate<br />
devices to work in unison,but<br />
manufacturers now offer combined<br />
devices, such as the Saros range from FLIR<br />
When it comes to security applications,<br />
there is no one perfect technology. If<br />
such a thing existed, it would make<br />
everyone’s lives easier. As a result, while<br />
single technology solutions can offer a degree<br />
of risk mitigation, all have some degree of<br />
compromise. For a critical solution, any level<br />
of compromise can introduce vulnerabilities<br />
that potentially negate the protection on offer.<br />
Saros is a single device that combines a<br />
number of technologies to deliver a solution<br />
which maximises catch performance while<br />
minimising the level of compromise.<br />
Saros devices make use of high definition<br />
video cameras, thermal imaging cores,<br />
integral illuminators, intelligent video<br />
analytics, alarm inputs and outputs and twoway<br />
audio. This enables a high degree of<br />
flexibility and permits numerous combinations<br />
to be deployed, enhancing the level of<br />
protection on offer.<br />
The Saros range utilises its perimeter<br />
protection technologies to deliver accurate<br />
and actionable alarm notifications backed by<br />
verified alarm data. The devices include<br />
multiple Lepton thermal sensors, along with<br />
up to three HD1080p or 4K video modules,<br />
dependent upon the product specification.<br />
The units additionally incorporate IR and<br />
white light LED illuminators, with auto<br />
selection based upon the operating mode and<br />
site conditions.<br />
Both the video and thermal imaging<br />
streams incorporate advanced onboard<br />
analytics. These have the ability to<br />
differentiate between people and vehicles,<br />
ensuring alarm classifications are accurate.<br />
The Saros range enables users to<br />
implement reliable outdoor intrusion<br />
detection in a cost-effective manner by<br />
minimising equipment requirements and<br />
reducing false alarms.<br />
With the<br />
growing focus on<br />
cybersecurity, FLIR<br />
has ensured its Saros<br />
range incorporates<br />
cybersecure design and<br />
engineering to reduce the risk of<br />
remote security attacks. The devices<br />
incorporate end-to-end encryption for set-up,<br />
web connectivity and video stream<br />
transmission. The configurations eliminate the<br />
need for port-forwarding, and device<br />
configurations can be ‘locked down’ when the<br />
initial set-up is completed to deliver a high<br />
degree of tamper prevention.<br />
The Saros range includes six models. The<br />
DH-390 2TB and DH-390 8MP models feature<br />
a single HD1080p video sensor and a 4K UHD<br />
video sensor respectively. Both variants<br />
incorporate two thermal imaging sensors with<br />
a 320 x 120 pixel array with a 90 degree field<br />
of view.<br />
The MH-6180 4MP and MH-6180 16MP<br />
models feature dual HD1080p video sensors<br />
and 4K UHD video sensors respectively. Both<br />
variants incorporate two thermal imaging<br />
sensors with a 640 x 120 pixel array with a 180<br />
degree field of view.<br />
Finally, the MH-9270 6MP and MH-9270<br />
24MP cameras feature three HD1080p video<br />
sensors and 4K UHD video sensors<br />
respectively. Both variants incorporate six<br />
thermal imaging sensors with a 960 x 120<br />
pixel array with a 270 degree field of view.<br />
All devices include real-time video and<br />
backlight compensation. A 16GB SSD is used<br />
for edge storage.<br />
The video cameras use 3-9mm lenses with<br />
autofocus and motorised zoom.<br />
Saros delivers a range of complementary<br />
benefits while ensuring installations are<br />
simple and cost-effective.<br />
53
INNOVATION FOCUS<br />
SAST IoT Platform<br />
For forward-think integrators<br />
and installers, IoT is not a<br />
technology of the future.<br />
Today, many businesses and<br />
organisations have embraced<br />
IoT, and is using it to good<br />
effect. SAST seeks to link it<br />
with security-centric video<br />
surveillance technology.<br />
Many in security think IoT is a peripheral<br />
set of technologies, systems and<br />
devices which they can decide<br />
whether or not to embrace. This blinkered<br />
thinking is very far from the truth. A number of<br />
business es and organisations are reliant on<br />
IoT technology, so integrators and installers<br />
face a simple choice: if they want to win<br />
contracts, they have to integrate with IoT.<br />
The inertia IoT has gathered means, like it<br />
or not, it is increasingly becoming a part of<br />
the smart security sector. If the industry<br />
attempts to side-step its influence, it will<br />
quickly see business being lost to those who<br />
embrace IoT and deliver the benefits and<br />
added value it offers.<br />
Security and Safety Things (SAST), a spinoff<br />
from Robert Bosch, has announced its<br />
vision for a new IoT platform focused on the<br />
security video camera segment.SAST<br />
describes its project as a ‘global platform for<br />
the next generation of security cameras’. The<br />
start-up, which is a subsidiary of Bosch but<br />
operates as an independent business, has<br />
been created to harness the potential<br />
available from innovative IP-connected<br />
security cameras.<br />
Changes in the way surveillance is deployed<br />
includes an increase in internet connectivity<br />
and processing at the edge. Both of these are<br />
results of the increased use of next generation<br />
processing, advanced video compression and<br />
stream management. The impact is that edgebased<br />
video analytics are becoming<br />
increasingly viable for business applications.<br />
Within the evolving surveillance market,<br />
SAST claims specialised software applications<br />
will represent a significant growth segment,<br />
with accelerated implementations during the<br />
next five years.<br />
One of the drivers for growth will be<br />
enhanced processing power. This has already<br />
played a significant part in enabling the<br />
introduction of intelligence at the edge for<br />
video surveillance, and given the drive to<br />
implement even faster processing in the<br />
future, including increased use of GPUs and<br />
neuron chip sets, the smart functionalities will<br />
become more prevalent.<br />
Whilst the initial focus of the IoT platform<br />
willbe the video surveillance sector, the<br />
platform is being built to embrace open<br />
connectivity, and will be ready to support<br />
additional IoT systems.<br />
SAST has outlined four stages which it<br />
defines as core to the creation of its IoT<br />
ecosystem. These are a new camera OS, tools<br />
for developers, ready-to-use AI-enabled<br />
applications and an integrator portal.<br />
SAST intends to create a universal camera<br />
operating system (OS) based on the Android<br />
Open Source Project. A single OS will simplify<br />
tasks, as a single API and codec can be used.<br />
Developers and designers will be aided by a<br />
set of tools such as analytics and performance<br />
tests available via SAST, making use of<br />
common KPIs.<br />
An app store will present a front-end for the<br />
platform, enabling integrators and installers<br />
to download specific applications. Apps will<br />
be AI-based and tested for conformity.<br />
54
INNOVATION FOCUS<br />
OPTEX LiDAR<br />
Enhancements<br />
The rise of LiDAR detection is<br />
growing in the security<br />
systems sector, with an<br />
increasing number of<br />
integrators and installers<br />
embracing the accuracy and<br />
flexibility on offer. OPTEX has<br />
enhanced its long range RLS-<br />
3060 series via a new<br />
firmware upgrade which<br />
boosts performance.<br />
OPTEX, the manufacturer of detection<br />
solutions, has launched enhanced<br />
versions of the product firmware and<br />
configuration software for its REDSCAN RLS-<br />
3060 laser scanner series. The upgrades bring<br />
greater functionality to the existing models,<br />
ensuring that they offer advanced<br />
performance with additional flexibility for a<br />
variety of applications.<br />
Version 8.0 of the RLS-3060 series firmware<br />
and REDSCAN Manager feature a number of<br />
upgrades for the long-range, 190 degrees 2D<br />
LiDAR series. Both the RLS-3060L and RLS<br />
3060SH (the latter includes an integral heater<br />
for harsh environments) now offer more<br />
flexibility in managing dry contacts with the<br />
option to switch from normally open (N.O) to<br />
normally closed (N.C).<br />
The new firmware version also brings a<br />
number of features to the standard model 30<br />
metre radius RLS-3060L that were previously<br />
only available in the higher-end RLS-3060SH<br />
model. Four detection areas can now be<br />
independently adjusted on an analogue<br />
connection, while up to eight areas can be<br />
adjusted on an IP connection. The shape of<br />
the detection area can also be customised to<br />
better match the layout of the site. The Area<br />
Allocation or Masking function will enable<br />
users to precisely define a number of<br />
independent detection zones to allow for<br />
varied needs.<br />
Another feature which has been made<br />
available for the standard laser scanner model<br />
with the upgraded firmware is the<br />
Indoor/Outdoor Loitering Detection Mode.<br />
This function detects loitering and similar<br />
suspicious behaviour by monitoring people<br />
and objects, generating an alarm condition if<br />
they stay in the selected detection area for a<br />
longer period that the user-defined time<br />
window.<br />
For the more advanced RLS-3060-SH laser<br />
scanner model, which is designed to operate<br />
in harsher environments, the upgrades enable<br />
a Detection Range Expansion mode. This<br />
extends the detection range from a 30 metre<br />
to a 50 metre radius.<br />
When used in horizontal mode, this setting<br />
allows the creation of a pre-warning zone from<br />
30 metres to 50 metres radius, in which larger<br />
objects such as vehicles can be detected.<br />
When the LiDAR detector is set up in a<br />
vertical detection mode and mounted at 3.6<br />
metres, the laser scanner can detect a<br />
standing or squatting person over a range of<br />
100 metres, giving benefits when the sensor<br />
has been deployed for perimeter protection.<br />
The RLS-3060L and RLS-3060SH are<br />
certified as integrated with a number of<br />
leading VMS solutions.<br />
55
INNOVATION FOCUS<br />
TDSi GARDiS<br />
With remote control and management<br />
becoming an expectation of many users,<br />
emphasis is on the delivery of stable,<br />
intuitive interfaces that enable simpler<br />
configuration, monitoring and control. TDSi<br />
claims to deliver all of this with its GARDiS<br />
software package.<br />
Access control<br />
differs from<br />
other security<br />
technologies, in that user<br />
interaction with the system is<br />
more common during periods<br />
when events or incidents are not being<br />
managed. Because the collection and<br />
management of real-time data delivers<br />
information about personnel status, the data<br />
can be used for other applications alongside<br />
security. Indeed, the flexibility of the data<br />
collected and managed by access control can<br />
be of great value in terms of site management.<br />
In order to realise the benefits of this data,<br />
access control systems need to facilitate easy<br />
processes for integrators and installers, as<br />
well as enabling simple management of<br />
authorised persons and departments. For the<br />
end user, the generation of reports and ability<br />
to track activity across a site ensures full<br />
flexibility at all times.<br />
GARDiS access control management<br />
software improves accessibility to connected<br />
systems. Suitable for use by integrators and<br />
installers, as well as end users and IT<br />
managers, it boasts ease of installation across<br />
a number of Windows versions, with a<br />
graphical user-friendly interface developed to<br />
accommodate the needs of users.<br />
TDSi states it answered demands for a<br />
simple and straightforward platform requiring<br />
minimal training. In recognition of this, the<br />
software’s installation wizard reduces<br />
complexity during the set-up.<br />
GARDiS is a web-based application which<br />
runs as a service, ensuring it is always<br />
operational. The software has been followed<br />
by a selection of hardware products designed<br />
to integrate with the Cloud-hosted solution.<br />
Aiming to deliver a different approach to<br />
security system operation, GARDiS provides a<br />
core Security-as-a-Service (SaaS) model,<br />
which delivers opportunities with regard to<br />
recurring revenue.<br />
The user interface has been designed to<br />
ensure switching between the various<br />
functions is a simple process with minimal<br />
load times. Supported by a help system<br />
including short video demos, it reduces the<br />
time spent contacting customer support.<br />
The Dashboard is the default opening<br />
screen, and provides a view of events. Basic<br />
icon-based controls simplify actions and<br />
settings.<br />
The People menu is where users are added<br />
and details or permissions are edited. The<br />
information includes departmental<br />
designations, vehicle registration, periods of<br />
employment, along with information about<br />
the credential and access permissions.<br />
Access tags and tokens are managed via the<br />
Credentials screen. Adding and deleting<br />
credentials is straightforward.<br />
The next two screens, Organisations and<br />
Sites, allow configurations about the<br />
customer business.<br />
Field devices are managed via the<br />
Equipment screen. This uses a wizard to<br />
simplify the addition of ACUs, and adds these<br />
to the system, allowing door control<br />
information and communications options to<br />
be established.<br />
Door options include setting open times,<br />
enabling free access and/or egress, and<br />
control of the strike. Access Levels allows<br />
permission groups to be established.<br />
The Event Management screen allows a<br />
range of system events to be selected, either<br />
as live system events or as notifiable alarms.<br />
These can be linked with alarms.<br />
Finally, the Reports menu allows<br />
customisable reports to be generated,<br />
enabling users to quickly create audit trails or<br />
data for muster lists, along with a host of<br />
other reports.<br />
56
INNOVATION FOCUS<br />
HGH Cyclope Hypervisor<br />
An increasing number of high<br />
risk sites are seeking the<br />
earliest possible warning of<br />
intrusion. Where sites cover<br />
large areas with lengthy<br />
perimeters, the complexity of<br />
solutions can be an issue.<br />
HGH offers CYCLOPE<br />
Hypervisor, a GUI designed to<br />
simplify the management of<br />
more advanced solutions.<br />
With the evolving threat landscape<br />
faced by many commercial and<br />
industrial sites, the concept of wide<br />
area surveillance has never been more critical.<br />
If large and open sites are at risk of multiple<br />
intrusions, it is important security teams and<br />
the relevant authorities are alerted as quickly<br />
as possible. Often, an early warning is the<br />
best way to ensure effective actions are taken.<br />
Sites which represent significant challenges<br />
for integrators and installers include critical<br />
infrastructure sites, prisons, ports and<br />
maritime facilities, airports and airfields,<br />
remote utility plants, border areas, etc.. The<br />
combination of large areas and lengthy<br />
perimeters makes protection costly and<br />
difficult to implement.<br />
HGH Infrared Systems offers the Spynel<br />
range of 360 degree infrared sensors, and<br />
these make use of CYCLOPE automatic<br />
detection software. CYCLOPE Hypervisor is a<br />
GUI enabling remote management and<br />
supervision of devices from a single operatorfriendly<br />
display.<br />
CYCLOPE Hypervisor makes use of the<br />
functionality inherent in the CYCLOPE<br />
intrusion detection software provided with the<br />
SPYNEL 360-degree IR security cameras.<br />
Offering management for distributed sites,<br />
CYCLOPE Hypervisor centralises data from the<br />
security sensors over a network to offer a<br />
global geolocation-based interface.<br />
CYCLOPE Hypervisor is ideal for use in large<br />
critical infrastructure applications with<br />
complex security architecture, including if<br />
multiple Spynel sensors are located on one or<br />
several sites.<br />
All detected threats are listed and shown<br />
with geolocation data on maps, displayed on<br />
a single screen. By merging relevant<br />
information from various devices, the GUI<br />
enables early warning of security breaches for<br />
faster and more effective reactions.<br />
Collected information includes geolocation<br />
data related to threats and connected sensors<br />
on vector smart maps. This assists remote<br />
operators who may not be familiar with all<br />
sites. Each map can be centered on a selected<br />
Spynel sensor, ensuring a focus can be<br />
maintained on areas of interest.<br />
Data is displayed in a tabular format, listing<br />
the recent detected events with information<br />
such as the incident ID, location and a timestamp.<br />
Threats can include infrared<br />
thumbnails of activity.<br />
Bookmarks can be created, enabling rapid<br />
investigations of relevant data. Incident<br />
information can be filtered, and targets and<br />
field devices are shown on the map. Operators<br />
can configure audible alerts based upon<br />
predefined detection criteria.<br />
CYCLOPE Hypervisor delivers 360-degree<br />
surveillance without dead zones, enabling<br />
situational awareness.<br />
CYCLOPE Hypervisor can be used with the<br />
range of Spynel sensors. The Spynel X has a<br />
detection range of eight kilometres and offers<br />
360 degree coverage. The Spynel-S offers<br />
panoramic coverage, with a detection range of<br />
six kilometres. The Spynel-C sensor has an<br />
image resolution of 12 megapixels, and<br />
delivers full panoramic coverage. The Spynel-<br />
U features a range of two and one half<br />
kilometres. A panoramic video camera can be<br />
fitted as an optional extra. Finally, the Spynel-<br />
M is a cost-effective panoramic option with a<br />
detection range of 700 metres.<br />
57
INNOVATION FOCUS<br />
3xLOGIC Vigil VMS<br />
The VMS is a cornerstone of<br />
smart security solutions, and<br />
despite the roots of the<br />
software being video<br />
surveillance, today’s<br />
packages can manage the<br />
whole range of security<br />
technologies. Vigil from<br />
3xLOGIC combines VMS and<br />
access control to deliver<br />
added value for users.<br />
The flexibility and scalability of VMS<br />
software has been proven, and the fact<br />
that the vast majority of foward-thinking<br />
integrators and installers are using the<br />
technology as the basis of bespoke and smart<br />
solutions speaks volumes about the power it<br />
can deliver.<br />
Where once security technology was<br />
restricted in terms of potential due to<br />
hardware-based technological limitations,<br />
today the industry is capable of delivering<br />
solutions which not only protect businesses<br />
and organisations, but also make their<br />
operations more efficient and help them<br />
reduce waste and enforce compliance.<br />
VMS is considered a video-specific offering<br />
(the V does stand for Video) but today, VMS is<br />
a misnomer. While the software does offer<br />
video management, that is one part of the<br />
functionality available from these systems.<br />
VMS systems offer flexibility and scalability,<br />
allowing smart functionality and advanced<br />
alarm management to be supported.<br />
VMS packages allow integration with access<br />
control, alarm and detection equipment, plus<br />
a whole host of business intelligence and IoT<br />
sensors and solutions.<br />
One example is Vigil from 3xLOGIC, which<br />
combines video management with access<br />
control functionality. 3xLOGIC has made Vigil<br />
available in the UK and Europe. Vigil is an<br />
enterprise grade VMS which is linked with the<br />
manufacturer’s range of NVRs and PoEenabled<br />
cameras. To simplify installation, the<br />
VMS uses wizard-based guides to define<br />
network parameters, system identification<br />
information and camera profiles.<br />
There is an increasing demand from<br />
businesses for integrated VMS and access<br />
control. Recognising this trend, Vigil can be<br />
integrated with 3xLOGIC’s Infinias access<br />
control system, which has been designed to<br />
be easily scalable.<br />
Connections between the Vigil and Infinias<br />
are wireless. System configuration is carried<br />
out through the software with a cloud-based<br />
programming tool. Video is automatically<br />
linked with access events and alarms.<br />
The combined technologies offer a high<br />
level of functionality. A result of its intuitive<br />
set-up process is reduced technical resources.<br />
As a result, Vigil opens up a new revenue<br />
stream for integrators and installers who work<br />
with small to medium-sized enterprises.<br />
Vigil enables users to monitor server<br />
connectivity, camera status, storage details<br />
and server settings, and the RapidStream<br />
technology and SubStream motion detection<br />
functionality ensures high resolution video<br />
streams with reduced bandwidth demands.<br />
Users can identify points of interest within<br />
recorded streams by creating a SmartSearch<br />
mask. Data can be archived automatically.<br />
The Infinias range includes Infinias CLOUD,<br />
a cloud-based management application,<br />
delivering security features to enable<br />
seamless management. Scalable to manage<br />
anything from single door control to campuswide<br />
installations, Infinias CLOUD is designed<br />
to deliver flexible security.<br />
58
INNOVATION FOCUS<br />
Reconeyez PIR Cameras<br />
As wireless connectivity and cloud service<br />
provision grows in other commercial<br />
sectors, so end users in the security<br />
market are seeking simple-to-deploy, flexible<br />
solutions to their risk-based problems.<br />
Whether seeking protection for temporary<br />
threats or in locations which lack essential<br />
infrastructure, the appetite for batterypowered<br />
cloud-connected systems is evident.<br />
Reconeyez is launching into the security<br />
market with a battery-powered alarm system<br />
that provides video verification. Claimed to<br />
provide a new high quality and flexible<br />
solution for outdoor security applications, the<br />
company has stated it places a particular<br />
emphasis on mobile and temporary security,<br />
as well as permanent outdoor-based asset<br />
and infrastructure protection.<br />
The new PIR with integral camera delivers a<br />
standalone system. It has been designed to<br />
be used where there is no available mains<br />
power, as the PIR cameras work with a<br />
battery-powered 2G/3G/4G bridge to send<br />
alarms and images back to a control room.<br />
These can then be used for visual verification<br />
purposes.<br />
Some of the key features of the standalone<br />
system include high quality images streamed<br />
from the PIR cameras. The devices make use<br />
of integrated Artificial Intelligence (AI) to<br />
reduce false alarms and differentiate between<br />
target objects. The devices makes use of<br />
predefined image classification categories,<br />
and only flag footage as an alarm event if the<br />
images contain people, cars, trucks, bicycles<br />
or buses.<br />
The detection range is quoted as being up<br />
to 35 metres.<br />
The wireless transmission is carried out<br />
over a proprietary mesh network which the<br />
manufacturer states improves radio<br />
communications between the PIR cameras<br />
and the transmission bridge. Making use of<br />
Cloud-based alarm monitoring and<br />
maintenance software, the devices can have<br />
optional integration into other software<br />
platforms.<br />
Battery life is quoted as 400 days or up to<br />
50,000 events.<br />
The PIR Cameras incorporate separate<br />
camera sensors for day and night image<br />
capture, with a bank of IR illuminators to<br />
provide high image quality regardless of the<br />
ambient illumination levels.<br />
Verification of alarms is increasingly demanded by<br />
end users, and as such integrators and installers<br />
can secure more contracts by delivering a simple<br />
but effective system to meet those needs.<br />
Reconeyez is a new name in the security sector and<br />
is seeking to provide a system that assists in terms<br />
of visual verification of alarm incidents.<br />
Reconeyez is promoting the PIR cameras as<br />
being installable in two minutes. The<br />
manufacturer states integrators and installers<br />
simply need to insert the battery and the<br />
system starts to monitor the protected area.<br />
As devices use proprietary low power mesh<br />
technology, this simplifies the installation<br />
process.<br />
Estonian-based Reconeyez’s parent<br />
company, Defendec, has been supplying the<br />
same technology since 2009, with<br />
deployments in 24 countries.<br />
59
ARTIFICIAL INTELLIGENCE<br />
The Importance of GPUs for<br />
Artificial Intelligence<br />
The benefits on offer from Artifical Intelligence,<br />
Machine Learning and Deep Learning are<br />
numerous, but performance is often dependent<br />
upon the use of suitable hardware. Using GPUs<br />
(graphics processing units) is increasingly common,<br />
with many hardware providers offering devices with<br />
enhanced processing, and the chipsets can also be<br />
added to legacy systems. What is a GPU, and why<br />
do they matter?<br />
For many integrators and installers, the<br />
developments being made in Artifical<br />
Intelligence, Machine Learning and Deep<br />
Learning enable the creation of ever more<br />
innovative and bespoke solutions. The<br />
potential is limitless, and as processing power<br />
increases further (as it inevitably will), the<br />
opportunities which will be opened up by<br />
these technologies can only increase.<br />
Faster computational speed and resources<br />
equates to the ability to run more processes<br />
and algorithms simultaneously, which in turn<br />
enables the creation of more ‘intelligent’<br />
systems. However, smart systems only make<br />
sense – and appeal to customers – if they<br />
have a convincing use-case. Without a<br />
demand from businesses and organisations,<br />
the best technologies will not impact on the<br />
security solutions market.<br />
The technologies in question will<br />
predominantly be added into products and<br />
systems at the manufacturing level.<br />
Integrators and installers are unlikely to ever<br />
have to work with the coding or processors on<br />
offer. Their challenge is to understand the<br />
benefits on offer, and to sell those to the end<br />
user.<br />
Sadly, simply stating that a system uses<br />
Artifical Intelligence or Deep Learning isn’t<br />
going to persuade an end user to increase<br />
their budget, as these generic terms mean<br />
little to them. As with most emerging<br />
technologies, the real-world benefits which<br />
can be realised for businesses and<br />
60
ARTIFICIAL INTELLIGENCE<br />
organisations are what will excite the<br />
mainstream market-place.<br />
End users won’t buy AI or Deep Learning<br />
because it’s something ‘new’. The benefits are<br />
what the customer will pay for. However, this<br />
does not mean integrators and installers<br />
should not bother about gaining an<br />
understanding of how the technologies work<br />
in harmony with appropriate hardware.<br />
Indeed, a level of knowledge is important to<br />
ensure that benefits and features are not<br />
under-utilised or oversold.<br />
Which technology?<br />
To understand why GPUs are important, it is<br />
worth considering the various technologies.<br />
Often the terms Artifical Intelligence, Machine<br />
Learning and Deep Learning will be used<br />
interchangeably. Whilst the technologies are<br />
linked, they are different.<br />
Artifical Intelligence (AI) is the overarching<br />
technology. Both Machine Learning and Deep<br />
Learning are part of the AI landscape. AI<br />
seems to have risen to prominence in recent<br />
years, but the pursuit of AI has been on-going<br />
since the 1950s.<br />
AI is simply the delivery of systems and<br />
solutions which can apply intelligence to a<br />
problem. That sounds vague, because it is!<br />
The clearest definition of AI is where a<br />
machine uses all available and relevant data<br />
to maximise its chances of success in a given<br />
task. By using reasoning and probability, AI<br />
allows a machine, system or solution to<br />
participate in the decision making.<br />
AI relies on the system ‘learning’ about its<br />
environment and the various actions which<br />
take place, either normally or as a part of<br />
‘exceptional’ activity. There are two main<br />
types of learning associated with AI: Machine<br />
Learning and Deep Learning.<br />
Machine Learning is very common in the IT<br />
world, and many systems are based upon this<br />
approach. Machine Learning is used by social<br />
media, search engines, on-line services and<br />
data management systems. It works by<br />
running data through a variety of algorithms<br />
and uses the results to ‘predict’ things in a<br />
given environment.<br />
Deep Learning is superior to Machine<br />
Learning, and uses numerous layers of<br />
algorithms (which is where the ‘deep’<br />
reference comes from). It can understand an<br />
environment and make decisions based upon<br />
what it has learned.<br />
A good way of understanding the difference<br />
between the two is that Machine Learning<br />
systems will search through millions of<br />
options to quickly find a solution in a given<br />
environment, based upon what it has been<br />
programmed to do. Deep Learning systems<br />
will use gained knowledge and experience to<br />
61
ARTIFICIAL INTELLIGENCE<br />
understand the environment, and will filter<br />
past events to decide how to act accordingly.<br />
It is important to realise both processes<br />
require a high level of computational power.<br />
Machine Learning involves a high degree of<br />
searching and filtering, and Deep Learning<br />
runs multiple processes, simultaneously, to<br />
ensure it ‘understands’ the status data from a<br />
given site or system.<br />
Not only does the hardware require the<br />
capacity to manage these computational<br />
tasks, but it also needs to ensure it has the<br />
processing power to carry out everyday tasks<br />
too: video processing, data recording and<br />
searches, access control transactions, alarm<br />
and event handling, etc..<br />
The cost-effective way of delivering such<br />
performance is via hardware acceleration. This<br />
is a process whereby the server ‘offsets’ some<br />
of the tasks to additional hardware elements,<br />
thus freeing up its core resources to other<br />
tasks. GPUs are well suited to this role and<br />
ensure the CPU (central processing unit)<br />
manages a reduced workload.<br />
CPUs and GPUs<br />
The CPU has, for a long time, been the driving<br />
force in servers and PCs. Over the years, CPU<br />
performances have increased, and while that<br />
does mean today’s servers have higher<br />
performance levels, the workload we expect<br />
them to manage has also increased<br />
significantly.<br />
If you consider video, the servers of the<br />
past managed PAL video streams with much<br />
lower resolutions than is standard today.<br />
However, in order to ensure the video footage<br />
wasn’t degraded by limitations in the<br />
hardware, the streams were often forced to<br />
limited frame rates, or quality was restricted<br />
by a bitrate overhead.<br />
Because the cameras were only used for<br />
security surveillance, the numbers of devices<br />
were often kept to a bare minimum, and<br />
additional processing was typically limited to<br />
motion detection.<br />
Despite these elements resulting a low load<br />
on the server hardware, restrictions were<br />
required to ensure consistent performance.<br />
Since then, processing capabilities have<br />
increased and modern servers provide a lot<br />
more power in terms of processing. However,<br />
HD1080p has become the de facto standard<br />
for video, and the increased use of 4K UHD,<br />
multi-megapixel and 360 degree video has<br />
further impacted on loads. Increasingly,<br />
cameras are being deployed with higher levels<br />
of IVA, adding to the work a server must do.<br />
Video is used not only for security, but also<br />
for safety, site management, traffic control,<br />
process management, etc.. The result of this<br />
is increased camera counts, which in turn<br />
creates more video data. Additionally, these<br />
higher numbers of cameras are using<br />
advanced video analytics in order to automate<br />
management tasks, which again increases the<br />
load on the server’s processing capacity.<br />
Mobile viewing is another task which has<br />
grown significantly in popularity. However, it<br />
also can create a lot of processing load, as<br />
video inevitably needs to be transcoded to<br />
make it suitable for remote viewing. In some<br />
systems, mobile viewing can have such an<br />
impact that essential core services become<br />
unstable or fail, compromising on the<br />
credibility of the entire security solution. By<br />
offsetting much of this processing work,<br />
modern systems remain stable and efficient.<br />
The emphasis placed on GPUs needs to be<br />
considered in a balanced way. While it is true<br />
they offer a remedy to systems which might<br />
otherwise grind to a halt, the CPU remains<br />
very important to a server’s suitability for<br />
security use.<br />
The CPU contains millions of transistors<br />
which perform a variety of calculations.<br />
Standard CPUs have up to four processing<br />
cores. The benefit of CPUs is that they can<br />
carry out a huge range of tasks, very quickly.<br />
The GPU is more specialised, and is<br />
designed to display graphics and carry out<br />
specific computational tasks. GPUs have a<br />
lower clock speed than CPUs, but have<br />
significantly more processing cores. This<br />
allows it to carry out mathematical operations<br />
62
TAKE CONTROL<br />
OF YOUR CCTV ADMINISTRATION<br />
SECURE PASSWORDS WITH EMAIL RECOVERY<br />
With a powerful CMS for effective maintenance and planning,<br />
immediate fault diagnostics and administrative management without<br />
having to go to site; the Aspect Central Management System is 100%<br />
license free and allows for unlimited CCTV systems to be connected.<br />
CALL US ON 01924 258000<br />
OR REGISTER ONLINE AT WWW.VIDECON.CO.UK
ARTIFICIAL INTELLIGENCE<br />
over and over again. The processing cores run<br />
simultaneously, making it ideal for handling<br />
repetitive tasks.<br />
GPUs might lack the diverse abilities of a<br />
CPU, but they make up for it in terms of<br />
speed. A CPU can perform up to four<br />
computations per clock cycle, while a GPU can<br />
perform thousands.<br />
GPUs were designed for 3D game rendering,<br />
but the performance can harnessed to<br />
accelerate computational workloads. A GPU<br />
can manage huge batches of data, performing<br />
basic operations very quickly. NVIDIA, the<br />
leading manufacturer of GPUs, states the<br />
ability to process thousands of threads can<br />
accelerate software by 100x over a CPU alone.<br />
GPUs excel in carrying out multimedia<br />
tasks: transcoding video, image recognition,<br />
pattern matching, content analysis, etc..<br />
These are therefore tasks which are better<br />
passed to the GPU than managed by the CPU.<br />
While much of this might sound like the<br />
GPU has arrived just in time to save the<br />
struggling CPU, the reality is that GPUs have<br />
nowhere near the flexibility of CPUs. Indeed,<br />
they were never designed as a replacement.<br />
The best value in terms of system<br />
performance, price, and power comes from a<br />
combination of CPUs with GPUs. Indeed, many<br />
of the tasks which a GPU carries out are done<br />
because the CPU makes the decision to hand<br />
them over. Some explanations of the<br />
difference between CPUs and GPUs neglects<br />
to point out that with CPUs, most hardware<br />
would be very limited. The two types of<br />
processors co-exist in order to ensure optimal<br />
performance in an advanced hardware set-up,<br />
and matching the two components is best left<br />
to the experts.<br />
A legacy option?<br />
Is there any option of an upgrade if an end<br />
user has invested in hardware for their<br />
security project, but because there was no<br />
need at the time, hadn’t allowed for the<br />
introduction of GPUs to accelerate<br />
performance? There is, but caution is<br />
required.<br />
It’s already been mentioned that GPUs were<br />
designed for the gaming industry, where the<br />
ability to render accurate high-quality<br />
graphics is necessary. Serious gamers have,<br />
for many years, invested heavily in high<br />
performance PCs, and as the performance of<br />
games increased, so the upgrades market<br />
also blossomed.<br />
The most common way to add GPUs to PCs<br />
was via graphics cards. These simple PCI<br />
cards can be added to hardware, boosting<br />
graphics performance. The same is true of<br />
security servers. By adding an upgraded<br />
graphics card, the GPU performance can be<br />
used for hardware acceleration. Implementing<br />
this is usually very easy. Many VMS of other<br />
software packages include a simple ‘use<br />
hardware acceleration’ tick box.<br />
If adding a GPU via a graphics card is very<br />
simple, and switching on hardware<br />
acceleration is often a case of simply checking<br />
a box in a menu, why do integrators and<br />
installers need to exercise caution if going<br />
down the route of upgrading a legacy server?<br />
The answer is one of expectations. If a<br />
system is lagging when under load, it stands<br />
to reason that deploying a GPU upgrade will<br />
boost performance, and it probably will.<br />
However, the question mark is over how much<br />
it will boost the performance by.<br />
Any enhancements can be affected by other<br />
hardware components. For example, if the<br />
CPU is extremely overloaded, not because the<br />
system is throwing too much work at it but<br />
because it is woefully inadequate for the job,<br />
then adding a GPU might not make a<br />
significant difference, because the CPU will<br />
still be struggling. If memory limitations are<br />
causing issues, then adding a GPU might not<br />
have a significant result.<br />
CPUs and GPUs work together and rely on<br />
other hardware components too. If the various<br />
elements are mismatched, the benefits of<br />
GPUs might not be obvious.<br />
In summary<br />
AI, Machine Learning and Deep Learning are in<br />
their infancy in security, but the technologies<br />
promise much. The important point for<br />
integrators and installers is to ensure they<br />
have the right hardware to cope with the high<br />
workload.<br />
64
INNOVATION AWARDS<br />
Rewarding Innovation<br />
INNOVATION<br />
AWARDS 2019<br />
At Benchmark, we passionately believe that the<br />
future of the electronic security sector lies in the<br />
creation of innovative and smart solutions. In order<br />
to allow installers and integrators to create such<br />
solutions, it is vital that manufacturers deliver<br />
innovation that both enhances the technological<br />
capabilities of their products, and allows those<br />
developments to be implemented in a realistic<br />
fashion. In order to highlight such advances,<br />
Benchmark runs its Innovation Awards scheme,<br />
which recognises and rewards innovative thinking.<br />
Here we highlight the finalists in the 2019<br />
Benchmark Innovation Awards.<br />
The security industry has never before<br />
enjoyed the sheer breadth of<br />
technological options that it does today.<br />
The security systems market is advancing on a<br />
daily basis, and alongside developments from<br />
security innovators we can also benefit from<br />
the constant advancements being made in the<br />
IT, communications, AV and consumer sectors.<br />
The impact of these innovations is immediate,<br />
and we can leverage what is on offer as and<br />
when they happen. In short, innovation has<br />
become our watchword.<br />
As advances in technology deliver ever<br />
greater levels of functionality, so the ability to<br />
integrate security elements increases. This is<br />
further added to by interoperability with other<br />
functions such as business intelligence and<br />
smart management. The result is that security<br />
systems offer a more valued proposition for<br />
all concerned, bringing together enhanced<br />
security with truly beneficial solutions.<br />
Through on-going innovation, and by<br />
embracing the new and emerging<br />
technologies, manufacturers can assist<br />
installers and integrators who wish to adopt a<br />
more holistic approach to system design. This<br />
allows the solutions to encompass the<br />
inherent flexibility that new technologies<br />
offer.<br />
Defining innovation<br />
The Benchmark Innovation Awards scheme<br />
recognises and rewards innovations which<br />
deliver real benefits to installers, integrators<br />
and end users.<br />
Innovations must bring value; it’s not<br />
enough for a manufacturer to add features<br />
simply to expand a list of functions. If there is<br />
no tangible benefit for installers and<br />
integrators, or their customers, developments<br />
cannot be considered as innovative!<br />
Devices or systems must either deliver a<br />
new concept or different approach which is<br />
both effective and realistic, or should include<br />
a specific feature or function which ranks as<br />
innovative.<br />
Also, with an increasing focus on<br />
integration and interoperability, devices or<br />
software which add functionality and bring<br />
together other established systems are<br />
coming to the fore.<br />
Innovation is the lifeblood of the security<br />
systems sector, and is vital for a credible and<br />
profitable future.<br />
66
INNOVATION AWARDS<br />
Video Hardware<br />
FLIR: Saros<br />
DH-390<br />
FLIR’s Saros<br />
dome cameras<br />
include patented<br />
and patentpending<br />
technologies to<br />
deliver accurate,<br />
actionable alerts,<br />
and verified<br />
alarm data for<br />
outdoor<br />
commercial perimeters. The cameras integrate multiple<br />
technologies in one device, including two thermal sensors<br />
supported by onboard analytics, plus the choice of an<br />
HD1080p or 4K UHD video camera, IR and visible LED<br />
illuminators, two-way audio and digital input/outputs. The DH-<br />
390 features a thermal resolution of 320 x 120 with a 90-<br />
degree field-of-view.<br />
Hikvision: Thermal Smart Linkage Tracking<br />
Hikvision’s Thermal Smart Linkage Tracking Systems makes<br />
use of a single fixed thermal imaging camera and a videobased<br />
PTZ camera. The PTZ camera uses smart processing to<br />
track multiple moving targets, triggered by the fixed thermal<br />
camera which delivers an overview of the protected area. There<br />
are a number of models with differing detection ranges.<br />
Edesix: VB-300<br />
The VB-300 series of body-worn cameras are WiFi-enabled<br />
devices. With a 130 degree horizontal field of view, day/night<br />
recording capability, RFID touch-assign enabled and integrated<br />
pre-record functionality, the VideoBadges can record footage of<br />
ongoing incidents. Video and audio footage is kept securely on<br />
the camera with no removable media card, and is encrypted.<br />
Hanwha Techwin: Wisenet XNP-6550RH<br />
The Wisenet XNP-6550RH PTZ camera features a 55x optical<br />
zoom, gyro sensing for accurate stabilisation, optical Defog and<br />
integral IR LEDs with an effective range of up to 500 metres. The<br />
optical Defog uses an optical low pass filter which accepts a<br />
higher light range in front of the camera’s image sensor in order to<br />
reduce the influence of fog. Other features include adaptive IR<br />
technology, auto-tracking, integral video analytics, dynamic<br />
streaming and dual SD/SDHC/SDXC memory slots.<br />
IDIS: Super Fisheye 5MP Compact<br />
The Super Fisheye 5MP Compact camera (DC-Y6513RX) is a<br />
compact 360 degree camera designed for wide area protection<br />
applications. Features include Smart UX Controls for high<br />
accuracy and ease-of-use, smooth de-warping on the camera<br />
as well as on desktop applications, protection against video<br />
loss via built-in Smart Failover technology, and an intelligent<br />
codec. Intelligent video and event trigger functions utilise<br />
motion detection, active tampering and trip zones.<br />
Video Software<br />
Milestone: XProtect+ 2019<br />
XProtect+ 2019 extends the usability of the Smart Client, with<br />
support for one- and two-way audio in the Mobile and Web<br />
clients. This includes communication directly from a phone<br />
with the Push-To-Talk function. All software packages in the<br />
XProtect+ range include Milestone’s Rules Engine, support for<br />
H.265 video formats, hardware-accelerated video decoding,<br />
centralised management and Active Directory support.<br />
Bosch: BVMS Pro 9<br />
BVMS Professional provides seamless management of digital<br />
video, audio and data. The network-based system offers<br />
optimum results with Bosch devices, leveraging the proprietary<br />
capabilities of the cameras and recording solutions. The<br />
system is equipped with embedded resilience, allowing day-today<br />
operations to continue should the management server or<br />
recording servers fail. Edge-based video content analysis and<br />
advanced recording technology reduce the cost of ownership.<br />
Johnson Controls: TrickleStor<br />
The VideoEdge TrickleStor feature provides an integrated<br />
camera-NVR connectivity solution protecting against video loss<br />
by recording video locally . By recording directly onto SD cards<br />
when a connectivity failure to the VideoEdge NVR takes place,<br />
video is protected. TrickleStor automates the process of media<br />
database repair, reducing the risks when a network<br />
communication failure event occurs.<br />
Mobotix: Mx6 Second Generation Platform<br />
MOBOTIX offer its second generation Mx6 camera line with a<br />
new platform that includes the integrated MxBus functionality.<br />
The MxBus technology is based on an extended camera board.<br />
This two-wire cable system is encrypted against cyberattacks<br />
and expands camera functions by including practical additional<br />
modules such as the MX-GPS-Box, a reliable time server for a<br />
complete video system. Mx6 cameras without MxBus can also<br />
process and use the data from an MxBus module connected to<br />
a camera within the same network.<br />
IPS: VideoManager 3D VMS<br />
VideoManager VMS makes use of 3D technology, which<br />
enhances the management suite’s operational feature-set.<br />
The software’s 3D technology automates tracking and camera<br />
handover, meaning operators can follow suspects without a<br />
need to manually control PTZ-enabled cameras. The cameras<br />
automatically use IVA to track suspects, and if the target<br />
moves from one<br />
camera’s protected<br />
area to another, the<br />
system automatically<br />
hands over.<br />
VideoManager includes<br />
VMD and sabotage<br />
detection, and IPS<br />
intelligent video<br />
analytics can be added<br />
via licence upgrades.<br />
67
INNOVATION AWARDS<br />
Access Control Hardware<br />
Paxton: PaxLock Pro<br />
PaxLock Pro is Paxton’s third generation of electronic door<br />
handle, offering a robust, wireless and aesthetically pleasing<br />
product suitable for a wide range of sites. It can be installed to<br />
operate as part of a networked access control system or as a<br />
standalone device. It is available in two options for internal<br />
and external facing doors. Simple to install, it is compatible<br />
with DIN standard locks so replacement of an existing door<br />
handle creates minimal disruption.<br />
Nortech: FeeMaster Smart Range<br />
The FeeMaster Smart system provides a simple, cost effective<br />
means of managing revenue collection while simultaneously<br />
controlling short-stay, long-stay and seasonal parking access.<br />
The FeeMaster system is also ideal for controlling access for<br />
staff, long stay and seasonal parkers due to the ability to<br />
validate smart cards for any given duration of time.<br />
Pacom: 8003 Controller<br />
The 8003 controller is an intelligent IP-enabled hybrid<br />
controller that provides flexible intrusion detection and access<br />
control for up to eight doors. As an access control device, the<br />
8003 can support up to 8 doors, each with an IN and OUT<br />
reader, enabling anti-passback. The 8003 controller can<br />
operate standalone for smaller or remote environments or can<br />
be easily incorporated as part of a fully integrated access<br />
control system for larger buildings or multi-site applications.<br />
Comelit: VIP Mini HF WiFi<br />
The VIP Mini HF WiFi features an integral WiFi port and gateway<br />
for forwarding video entry phone calls to smartphones and<br />
tablets running the Comelit app. All functions and<br />
programming can be performed from a graphic menu, using<br />
eight soft-touch keys. The unit is powered by PoE, and includes<br />
an induction loop with T position for users of hearing aids.<br />
ASSA Abloy: Aperio H100<br />
The H100 door handle offers integration with a number of<br />
third-party systems. Available in online and offline versions, it<br />
can be retrofitted without drilling for doors with a thickness of<br />
30–80mm. The H100 is battery-operated and supports iCLASS,<br />
Mifare, Mifare Plus, Desfire SE and EV1 card technologies.<br />
Access Control Software<br />
Vanderbilt: ACT Enterprise<br />
The latest release of ACT Enterprise includes a number of<br />
updates to enhance the solution. To help with integration, ACT<br />
Enterprise integrates seamlessly with the company’s SPC<br />
intrusion system. ACT Enterprise is also supported by intuitive<br />
smartphone apps delivering real-time monitoring, system<br />
management and user administration. To facilitate smart<br />
functionality, one of the headline additions is rules mapping,<br />
allowing triggers to implement actions.<br />
Qognify: Qognify ACI<br />
Access Control Insights (ACI) is designed to analyse access<br />
control system data to deliver operational insights, detecting<br />
abnormal behaviours and identifying critical events.Utilising<br />
machine learning data analytics, Qognify ACI detects unusual<br />
card holder activities associated with potential fraud, theft or<br />
other risks, alerting the system operator of threats. All<br />
functionality is delivered without changing legacy access<br />
control systems.<br />
Evva: Xesar 3.0<br />
The Xesar system is an innovative electronic access system<br />
which is fully scalable, allowing use in residential<br />
developments, educational facilities and office buildings. Xesar<br />
can be simply and securely managed, either from within a<br />
locally installed network or via the cloud. The Xesar system can<br />
be created from a number of modules. These include cylinders,<br />
escutcheons, readers, door handles, cam locks and padlocks.<br />
BQT Solutions: Net2 Integration<br />
BQT offers a software integration between its miPASS Access<br />
TMS software and Paxton’s Net2 access control software. The<br />
integration enables the seamless addition of BQT biometric<br />
readers to new or legacy Net2 systems, facilitating a smooth<br />
transition from less secure card technologies to more robust<br />
options like fingerprint biometrics and BQT’s own miPASS<br />
credentials.<br />
TDSi: GARDiS<br />
GARDiS access control management software boasts ease of<br />
installation across a number of Windows versions, with a<br />
graphical user-friendly interface developed specifically to<br />
accommodate the needs of a wide variety of users. The<br />
software’s installation wizard reduces complexity during the<br />
set-up. GARDiS is a<br />
web-based<br />
application which<br />
runs as a service.<br />
This ensures that is<br />
always operational.<br />
The software will be<br />
enhanced with a<br />
selection of<br />
hardware products<br />
designed to fully<br />
integrate with Cloudhosted<br />
security<br />
solutions.<br />
68
INNOVATION AWARDS<br />
Site Protection Hardware<br />
Takex: PIR-<br />
T40NAM<br />
The PIR-T40NAM is<br />
a long-range<br />
external PIR with a<br />
maximum range of<br />
40 metres. The<br />
sensor boasts four<br />
selectable<br />
operational modes<br />
which allow<br />
flexibility when it<br />
comes to<br />
positioning the unit.<br />
With a mounting<br />
height range of<br />
between two and six<br />
metres, it allows freedom when finalising device locations. The<br />
PIR-T40NAM delivers vertical curtain protection. Other<br />
headline features include triple mirror optics and intelligent<br />
signal processing.<br />
OPTEX: OPTEX Bridge powered by CHeKT<br />
The OPTEX Bridge powered by CHeKT combines remotely<br />
monitored intruder alarm systems and ONVIF cameras to<br />
create a visual verification platform. The solution has been<br />
developed to be compatible with most intruder alarm systems,<br />
and any ONVIF camera, as well as being integrated with most<br />
ARCs’ monitoring software platforms. The Cloud hosted<br />
platform allows collaboration between the ARCs and the users<br />
by sharing video clips to confirm alarms.<br />
SICK: Visionary-T DT Sensor<br />
The Visionary-T DT sensor is a configurable, plug-and-play 3D<br />
detection sensor. The device makes use of single-snapshot<br />
Time of Flight technology for a range of detection, notification<br />
and security applications. The sensor uses integral image<br />
processing, ensuring it can be added to installations without<br />
additional IT-based infrastructure.<br />
InnoSent: iSYS-5021 with Tracker<br />
The iSYS-5021 is a 24GHz radar system. InnoSent has<br />
developed it with the aim of fusing together radar and<br />
cameras. The integrated Smart Tracker detects multiple<br />
moving objects within the detection area. It combines radar<br />
detections with tracked data and allows the anonymous<br />
monitoring of relevant events. The targets are recorded even if<br />
a person stops moving, changes postures or starts crawling.<br />
Raytec: Urban-X<br />
Urban-X is a range of high-performance general area<br />
luminaires designed for industrial applications. Urban-X<br />
delivers several performance advantages compared to<br />
traditional lighting, such as a lumen output up to 14,000lm.<br />
The range achieves powerful illumination through the use of<br />
Platinum SMT LED technology. High thermal performance<br />
ensures the luminaires run cool, providing long-life.<br />
Site Protection Software<br />
BT Redcare: Redcare Ultimate<br />
Ultimate is claimed to be BT Redcare’s best alarm signalling<br />
system yet, suitable for every level of risk. It uses a private IP<br />
connection on the Redcare network, backed up by two 4G<br />
SIMs. Resilience is ensured as the panel includes battery backup.<br />
Real-time monitoring means any problems with the<br />
connection can be notified in 90 seconds. The service can<br />
deliver alarm and fire signalling, as well as monitoring of<br />
business elements.<br />
Pyronix: ProControl+<br />
Pyronix has added voice push notifications to both the iOS and<br />
Android versions of the ProControl+ app. When an alarm<br />
occurs, if the system is set or unset, or if an event is triggered<br />
by any life safety devices integrated with the system, the user<br />
receives a voice push notification. The feature adds value<br />
without any additional cost. When combined with cameras for<br />
video verification, users can also see what is happening.<br />
Teleste: S-AWARE<br />
S-AWARE provides users with a smart platform to centralise<br />
system information and manage daily operations. Data from<br />
various sources can be collected, identified, analysed and<br />
distributed in a single, easy-to-use, web-based graphical user<br />
interface. S-AWARE can be deployed as a standalone product,<br />
or integrated with Teleste’s S-VMX video management<br />
solution. It stores and records information from all system<br />
components and tracks events to generate reports for analysis.<br />
Reconeyez: Video Verification System<br />
Reconeyez offers a battery-powered alarm system with video<br />
verification, providing a flexible solution for outdoor security,<br />
with a particular emphasis on mobile/temporary security. The<br />
standalone system can be used where there is no mains power<br />
and the PIR-managed cameras work with a battery-powered<br />
2G/3G/4G bridge to send alarms and images back to a control<br />
room for verification purposes.<br />
Texecom: Texecom Cloud<br />
Texecom Cloud delivers enhanced system management<br />
options to integrators and installers. The cloud platform<br />
enhances day-to-day remote management. Benefits include<br />
remote maintenance and healthchecks across the full portfolio<br />
of systems, remote access to systems via any web-connected<br />
device, access management, reduction in time of on-site<br />
configurations, flexible reporting and a number of additional<br />
benefits which enable additional value and add-on services.<br />
69
INNOVATION AWARDS<br />
Intelligent Systems<br />
Business Intelligence<br />
Herta: BioFinder<br />
BioFinder makes it possible to search for a specific subject,<br />
through facial recognition, in one or various recorded videos.<br />
By working with GPU architecture, it processes all the images<br />
at a high speed, making it possible to locate a specific subject<br />
more rapidly. BioFinder delivers forensic analysis and the<br />
classification of information.<br />
Avigilon: AI Appliance<br />
The AI Appliance adds patented Avigilon self-learning video<br />
analytics and Appearance Search technology to almost any IP<br />
camera. When connected to Avigilon Control Center (ACC)<br />
software, integrators and installers can create powerful AIbased<br />
solutions, with automatic alerts of potentially critical<br />
events and the ability to search for and locate a person or<br />
vehicle of interest across an entire site.<br />
Axis: AXIS Guard Suite<br />
AXIS Guard Suite encompasses motion, intrusion and loitering<br />
analytics for Axis network video products. It detect threats and<br />
instigates configured actions. The analytics are suitable for use<br />
in a range of locations. The analytics can be used with Axis<br />
network video products running firmware 7.x or higher. They<br />
are available at no extra cost for Axis Q-line products and at a<br />
low cost for other compatible products. The applications<br />
support multiple profiles, allowing trigger settings for different<br />
times of day.<br />
Davantis: Daview Mini<br />
Daview Mini offers a comprehensive security solution for small<br />
sites, centralising video analytics and alarm verification,<br />
enabling system operators to take immediate action. The<br />
appliance is quick and easy to install and features intuitive<br />
software. The system is compatible with devices using the<br />
ONVIF protocol. The appliance features relays for activating<br />
external devices, and perimeter protection is enhanced thanks<br />
to a SmartWalk function which aids configuration.<br />
Genetec: Streamvault Appliances<br />
Streamvault is a complete line of secure, ready-to-deploy<br />
security infrastructure solutions designed to help integrators<br />
and installers design a system that meets project<br />
requirements. With Security Center, the Genetec VMS product,<br />
pre-loaded, Streamvault appliances simplify deployment and<br />
maintenance, and unify a site’s security operations.<br />
Briefcam: Briefcam Protect<br />
BriefCam’s video content analytics platform adds value to<br />
video surveillance system investments by making captured<br />
video searchable, actionable and quantifiable. Using a fusion<br />
of computer vision technologies, together with patented Video<br />
Synopsis technology, Briefcam enables video system operators<br />
to review hours of video in minutes, rapidly identifying people<br />
and objects of interest. The software provides robust<br />
detection, classification and recognition.<br />
A.I. Tech: AI-PARKING-DEEP<br />
AI-PARKING-DEEP is a video analytics solution for parking<br />
management. Using deep learning techniques, it is able to<br />
analyse car parks, including indoor and outdoor areas, to<br />
assess if spaces are empty or occupied. The solution is aimed<br />
at parking management, and delivers occupancy rates for<br />
parking areas. It can operate in enclosed spaces or on streets,<br />
and can inform users about parking spaces.<br />
Allgovision: Flow Map<br />
The Allgovision analytics packages offer a diverse number of<br />
modules, including a host of business intelligence options. The<br />
AGV-VA-FLOW module implement flow mapping, allowing<br />
footfall traffic is a surveyed area to be quickly and easily<br />
mapped. The analytics module produces a movement trend<br />
map which highlights the percentage split for various<br />
movement paths taken by people in the monitored zone, over a<br />
defined time period.<br />
Anyvision: Better Tomorrow Platform<br />
Better Tomorrow is a state-of-the-art platform that enables<br />
one-to-many recognition on-demand. The platform can either<br />
be based in the local premises or in the cloud. It can be used<br />
for recognition of persons of interest, as well as recognition of<br />
humans or other specified objects. Other features include heat<br />
mapping. The technology can be applied across multiple sites,<br />
and results can be filtered by adding variants as required.<br />
SAST: IoT Platform<br />
SAST offers a global platform for the next generation of<br />
security cameras. It has been created to harness the potential<br />
available from emerging innovative IP-based security cameras<br />
and devices. With surveillance technologies being deployed<br />
using internet connectivity and processing at the edge, the<br />
increased use of next generation processing and advanced<br />
video<br />
compression<br />
and stream<br />
management<br />
requires a new<br />
approach. The<br />
SAST IoT<br />
platform is<br />
designed for<br />
edge-based<br />
video analytics<br />
as well as<br />
business<br />
applications.<br />
70
Available colours:<br />
White<br />
Black<br />
Internal or external version available<br />
PaxLock Pro<br />
Robust, Secure, Wireless Access Control<br />
Designed in black or white, with anti-scratch coating to maintain a high quality<br />
look and feel. PaxLock Pro is available for internal or external facing doors,<br />
making it suitable for a range of buildings and applications.<br />
Standalone<br />
or Networked<br />
Compatible with<br />
DIN Locksets<br />
IP55 Rated<br />
for External Use<br />
IK10<br />
Impact Rated<br />
5-Year<br />
Guarantee<br />
Full information:<br />
paxton.info/3599<br />
New and improved<br />
Net2Air Bridge<br />
• Improved aesthetics<br />
• Enhanced, low profile design<br />
• Easy to install
INNOVATION AWARDS<br />
Infrastructure<br />
Seagate: SkyHawk AI 14TB<br />
SkyHawk AI HDDs are available in 14TB<br />
variants and have been designed for use in AIcapable<br />
surveillance systems. Traditional<br />
SkyHawk drives are optimised for<br />
predominantly write-based performance but<br />
the AI models are configured for higher<br />
workloads, such as the in-depth searching<br />
and logging that AI-enabled systems perform.<br />
The drives also include data protection<br />
coverage as they are supplied with a two year<br />
Rescue Data Recovery Services plan bundled<br />
with every AI drive.<br />
ComNet: CTS24+2<br />
The CTS24+2 is a managed layer-2<br />
commercial grade Ethernet transport system<br />
and provides up to 24 ports of 10/100TX<br />
Ethernet and two ports of 10/100/1000TX or<br />
1000FX transmission. The CTS24+2 series<br />
allows for flexibility in combining standard<br />
copper, optical and extended distance<br />
Ethernet in one device. Optional PoE supplies<br />
of 400 or 720 Watts are available. Up to three<br />
8-channel modules can be fitted to each<br />
chassis: the modules are CAT5/6 10/100 Mbps<br />
Ethernet, 100FX optical SFP, or CopperLine<br />
Coax or UTP interfaces.<br />
D-Link: DIS-700G<br />
The DIS-700G Series Industrial Layer 2+<br />
Gigabit managed switches are designed to<br />
withstand temperature variations, vibrations<br />
and shocks, making them ideal for security<br />
applications. The rugged switches feature a<br />
hardened design combined with high<br />
availability network features which are vital<br />
when considering surveillance and wireless<br />
connectivity. The switches provide high<br />
throughput and reduced response time which<br />
is critical for security-based video, voice and<br />
data applications.<br />
NVT Phybridge: EC Extender Kit<br />
The NVT Phybridge EC Extender solution is<br />
designed to upgrade the downlink capabilities<br />
of a standard Ethernet switch, delivering<br />
10/100Mbps symmetrical (full duplex) data<br />
and PoE over coax. The solution offers<br />
enhanced range with distances of up to 1.2km.<br />
IP-based IoT devices can be connected to the<br />
existing coaxial infrastructure, delivering<br />
optimal performance while saving costs and<br />
time. Cost savings can enable system<br />
designers to transfer budget and resources<br />
towards higher-quality applications and<br />
devices.<br />
InfiNet: InfiLink 2x2<br />
InfiLINK 2X2 is a point-to-point wireless<br />
transmission solution, combining high-speed<br />
capabilities of up to 280Mbps throughput,<br />
with a range of features and benefits such as<br />
leading-edge radio protocols providing<br />
spectral efficiency and wireless transmissions<br />
over long distances. The wireless solution can<br />
be deployed to provide Ethernet extensions,<br />
such as simple LAN-to-LAN connectivity,<br />
between two locations where physical cabling<br />
might be cost-prohibitive.<br />
72
Trial the technologies shaping the future of security.<br />
<br />
<br />
<br />
Show Me How<br />
<br />
To register for free visit: ifsec.co.uk/benchmark<br />
Running alongside:
BENCHMARK – driving innovation<br />
and smart solutions in the security industry<br />
The Benchmark website is a supplement<br />
to the printed monthly magazine, and<br />
includes a variety of tests and<br />
assessments of the latest technologies,<br />
including videos where relevant, as well as<br />
guides to product selection, independent<br />
technology-based articles and information<br />
about the latest influential products and<br />
systems comprising security and smart<br />
technologies.<br />
TESTS AND ASSESSMENTS<br />
All tests and assessments are fully independent, and<br />
manufacturers have no involvement in the process.<br />
Additionally, Benchmark makes no charge, financially or of any<br />
other kind, for inclusion in tests. All products are selected by<br />
an independent team. In short, it’s the only way you can<br />
ascertain the truth about product and system performance in<br />
real-world applications! Tests are carried out by an<br />
independent team of experts, telling you the whole truth about<br />
the performance you can expect.<br />
DRIVING INNOVATION<br />
Benchmark believes that the future of the security sector lies<br />
in the creation of innovative solutions which deliver credible<br />
security, flexibility and smart value-added benefits. With<br />
unrivalled technical expertise, Benchmark ensures you are upto-date<br />
in an increasingly technical environment.<br />
LONG-TERM SYSTEM EVALUATIONS<br />
The Benchmark website now includes information from the<br />
newly launched long-term system evaluation. There are many<br />
theories about how systems can deliver added value;<br />
Benchmark sees what is and what is not possible by creating a<br />
long-term system to investigate the various possibilities.<br />
@benchmarkmag<br />
STAY UP TO DATE<br />
Benchmark is always testing and assessing<br />
new products and technologies. Keep up to<br />
date with the latest reports by following<br />
Benchmark on Twitter.<br />
www.twitter.com/benchmarkmag<br />
www.benchmarkmagazine.com
thepaper<br />
Business News for Security Professionals<br />
Pro-Activ Publications is embarking on a revolutionary<br />
launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />
latest financial and business information for<br />
professionals operating in the security sector<br />
The Paper will bring subscribers (including CEOs,<br />
managing directors and finance directors within the<br />
UK’s major security businesses) all the latest company<br />
and sector financials, details of business re-brands,<br />
market research and trends and M&A activity<br />
FOR FURTHER INFORMATION<br />
ON THE PAPER CONTACT:<br />
Brian Sims BA (Hons) Hon FSyI<br />
(Editor, The Paper and Risk UK)<br />
Telephone: 020 8295 8304<br />
e-mail: brian.sims@risk-uk.com<br />
www.thepaper.uk.com
Secure operations 24/7 to see all the details,<br />
all the time with Bosch FLEXIDOME IP starlight 8000i.<br />
With quick installation plus wireless and remote commissioning, camera<br />
adjustments can be corrected whenever needed plus up to 4k Ultra HD<br />
resolutions and starlight technology so you can see all the details all the time.<br />
Find out more at boschsecurity.com