02.07.2019 Views

BenchmarkJuly2019

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TECHNOLOGICAL INNOVATION & SMART SOLUTIONS<br />

Smart Solutions: Adding Benefits<br />

Network Zone: Switch Specifications<br />

12 to Try: Video Archiving<br />

Round-Up: Technical Innovation<br />

July 2019<br />

BENCHMARK<br />

Mainstream VMS Options<br />

Benchmark assesses VMS software for mainstream applications<br />

Tested: Texecom Micro Shock-W<br />

Technology: The Benefits of GPUs


DRILL. FIX.<br />

CLIP. COVER.<br />

INSTALLATION MADE SIMPLE.<br />

The X Plus Series combines the Wisenet chipset with<br />

a magnetic modular design. The four-part design was<br />

developed to make installation as quick and easy as possible.<br />

eXperience it now at WisenetX.com


BENCHMARK<br />

BENCHMARK<br />

Technological Innovation & Smart Solutions<br />

At Benchmark, we passionately believe that the future growth and<br />

development of the security sector depends upon the creation of<br />

flexible, scalable and effective solutions. As technology delivers<br />

ever increasing levels of functionality, so the ability to integrate<br />

elements such as business intelligence and smart management create a<br />

more valued proposition for all concerned. This brings together<br />

enhanced security with truly beneficial solutions.<br />

We believe that by embracing the new and emerging technologies,<br />

and by adopting a more holistic approach to encompass the inherent<br />

flexibility they offer, credible solutions that deliver enhanced protection,<br />

security and business benefits can be realised.<br />

Through independent testing, system and technology assessments,<br />

field-based analysis, educational articles and informed debate,<br />

Benchmark provides vital information to those seeking to create best-inclass<br />

solutions. The editorial materials included in the magazine and its<br />

on-line initiatives ensure that those who offer bespoke advanced<br />

solutions have access to honest, independent and relevant reporting<br />

that aids and supports them in their work. All editorial content is<br />

exclusive to Benchmark and is based upon real-world field trials, not on<br />

theoretical documents produced by manufacturers.<br />

Benchmark delivers its content via a monthly print-based<br />

publication, as well as a number of interactive electronic initiatives. By<br />

realising the potential that new technologies offer, enhanced solutions<br />

that deliver security and business benefits can be realised.<br />

Benchmark Independent Testing<br />

Benchmark Recommended<br />

Status is awarded to<br />

products that undergo the<br />

independent testing and<br />

assessment process and are considered<br />

to deliver genuine benefits in the<br />

design and creation of innovative and<br />

smarter solutions. Products which<br />

receive Recommended status have<br />

undergone testing and have reached a<br />

high standard.<br />

Benchmark Outstanding<br />

Status is awarded to<br />

products that undergo the<br />

independent testing and<br />

assessment process and are considered<br />

to deliver invaluable benefits to those<br />

designing and installing innovative and<br />

smarter solutions. Products which<br />

receive this status have undergone<br />

application-specific testing and have<br />

reached the very highest standards.<br />

Because products and<br />

systems in the electronic<br />

security industry are varied,<br />

there are inevitable price<br />

differences. Benchmark always<br />

considers the price/performance ratio,<br />

and makes adjustments to ratings to<br />

reflect value for money. In group tests,<br />

the product which delivers the best<br />

price/performance ratio receives the<br />

award of Benchmark Best Buy.<br />

3


VISIT US AT STAND F410<br />

Inner Range’s Integriti<br />

High Security System is<br />

a complete Hardware/<br />

Software solution designed<br />

<br />

installations.<br />

Our range includes:<br />

All Software<br />

Hardware Controllers<br />

End of Line Modules<br />

Power Supplies<br />

Keypads<br />

Enclosures<br />

Communications Devices<br />

Access Control Readers<br />

Credentials<br />

WHY TAKE CHANCES?<br />

FULL END TO END DATA ENCRYPTION EXTERNALLY CERTIFIED<br />

T: +44 845 470 5000 | E: ireurope@innerrange.co.uk innerrange.co.uk


JULY 2019<br />

Contents<br />

Editor<br />

Pete Conway<br />

E-mail: pete.conway@benchmarkmagazine.com<br />

Advertisement Manager<br />

Nick Tiday<br />

Tel: 020 8295 8302<br />

E-mail: nick.tiday@benchmarkmagazine.com<br />

Production<br />

Matt Jarvis<br />

Tel: 020 8295 8300<br />

E-mail: matt.jarvis@proactivpubs.co.uk<br />

Administration<br />

Tracey Cole<br />

Tel: 020 8295 8306<br />

E-mail: tracey.cole@proactivpubs.co.uk<br />

ISSN: 1750-1040<br />

Editorial and Advertisement Office<br />

PO Box 332<br />

Dartford<br />

DA1 9FF<br />

© Pro-Activ Publications Ltd 2019<br />

All rights reserved. No part of this publication may<br />

be reproduced or transmitted in any form or by any<br />

means, electronic or mechanical, including<br />

photocopy, recording, or any information storage and<br />

retrieval system, without permission in writing from<br />

the publisher.<br />

Benchmark reserves the right to alter, abridge or<br />

edit any submissions prior to publication. The views<br />

published in Benchmark are not necessarily those of<br />

the publisher.<br />

While every care has been taken to ensure<br />

accuracy in the preparation of material included in<br />

Benchmark, the publishers cannot be held responsible<br />

for the accuracy of the information contained herein,<br />

or any consequence arising from it. In the case of all<br />

product reviews, tests and assessments, judgements<br />

have been made in the context of the equipment<br />

supplied at the time of the review. Any judgements are<br />

based upon situations relevant at the time of writing,<br />

and comments relating to cost are based upon<br />

published prices available from major distributors.<br />

Comments are based upon products and systems<br />

currently available in the UK market-place.<br />

7 Editorial<br />

The introduction of the Secure by Default<br />

specifications will impose stringent cybersecurity<br />

measures on surveillance devices.<br />

8 Test: VMS for Mainstream Sites (Part 1)<br />

Benchmark looks at VMS packages which are<br />

ideal for mainstream applications, with Hanwha<br />

Techwin’s Wisenet Wave and CathexisVision 2019<br />

from Cathexis.<br />

18 Smart Solutions<br />

Benchmark looks at how integrators and<br />

installers can enhance the smart benefits of their<br />

systems using emerging technologies.<br />

22 12 To Try: Video Archiving<br />

Benchmark looks at a dozen products and<br />

services which will be of interest to those<br />

integrators and installers delivering video<br />

archiving.<br />

28 Test: Texecom Micro Shock-W<br />

Texecom’s Premier Elite Micro Shock-W offers<br />

something different when considering the use of<br />

shock sensors.<br />

31 IFSEC 2019<br />

This year’s event will see the launch of the Secure<br />

by Default standard, introduced by the<br />

Surveillance Camera Commissioner.<br />

36 Sign up for Benchmark E-News<br />

Stay updated with the Benchmark E-News service<br />

and keep informed about tests, assessments,<br />

innovation and smart technologies.<br />

39 SiX Event<br />

For system integrators and security installers, the<br />

SiX event in Manchester represents an<br />

opportunity to find out more about new and<br />

emerging technologies.<br />

40 Smart Solutions: Building Management<br />

Benchmark looks at how the COSMO PSIM+<br />

system can add value for end users by simplifying<br />

integration with other systems.<br />

43 Network Zone<br />

A guide to understanding the specifications when<br />

selecting a switch for use in a security-based<br />

networked application.<br />

49 Innovation Focus<br />

Benchmark rounds-up a number of products,<br />

services and solutions which offer an innovative<br />

option for forward-thinking engineers.<br />

60 The Benefits of GPUs<br />

Manufacturers are increasingly offering GPUbased<br />

hardware, but what do these chipsets do?<br />

66 Benchmark Innovation Awards 2019<br />

The finalists for the 2019 awards are announced,<br />

with a look at the various products from all<br />

security disciplines.<br />

74 Benchmark Online<br />

Benchmark’s website is a valuable resource for<br />

those seeking to deliver smart solutions.<br />

8<br />

28<br />

43<br />

5


Start<br />

your free<br />

trial today!<br />

Manage, configure and control your<br />

alarm system portfolio<br />

• Scheduled Remote<br />

Maintenance<br />

• Instant Health Check<br />

• Automatic Reporting<br />

Remote Maintenance<br />

Texecom Cloud’s built-in remote maintenance and Health Check<br />

services automate and record the maintenance process, making it easy<br />

for installers to offer maintenance contracts and saving unnecessary<br />

site visits - adding recurring value to end users and saving installation<br />

companies time and money.<br />

Sales:<br />

+44 (0)1706 212524<br />

www.cloud.texe.com<br />

18-20 June 2019<br />

ExCeL, London, UK<br />

VISIT US:<br />

STAND<br />

IF2210


COMMENT<br />

Editorial Comment...<br />

The UK Surveillance Camera Commissioner<br />

has announced plans to launch a Secured<br />

by Default CCTV Requirements standard<br />

on 20 June 2109. This is in response to<br />

concerns over the cybersecurity risks inherent<br />

in video surveillance hardware, and follows a<br />

number of high profile media reports about<br />

how CCTV devices are often a weak point in<br />

terms of cyber crime for many businesses and<br />

organisations.<br />

Of course, while many of the reports<br />

insinuated that CCTV as a whole was a risk in<br />

terms of cybersecurity, the majority of cases<br />

were either related to DIY or consumer home<br />

products which had been installed and<br />

configured by members of the public, or<br />

covered OEM products made for brands which<br />

professional integrators and installers simply<br />

would not use.<br />

Despite the fact that most end users<br />

wouldn’t know the difference between the<br />

products being highlighted in the media and<br />

the professional systems they’d invested in,<br />

the various associations and organisations<br />

which claim to represent the industry didn’t<br />

respond to point out where the issues laid.<br />

The result is the Secure by Default<br />

Requirements, and despite the drivers behind<br />

this initiative, it could be a good thing for the<br />

professional security systems sector, and for<br />

integrators and installers working with<br />

professional equipment.<br />

The DIY and consumer sectors must achieve<br />

a balance between ease of use and device<br />

security. These products must appeal to<br />

people with little or no technical skills. Sold in<br />

large numbers to members of the public with<br />

poor IT acumen, the manufacturers simply<br />

cannot (or will not) invest in support for the<br />

devices. Therefore, if products are complex to<br />

set-up and use, people will simply return<br />

them, and poor reviews will damage sales.<br />

These DIY devices rely on simplicity for the<br />

use, even if that means allowing them to use<br />

the devices in an insecure mode. These are<br />

the types of devices which caused many of the<br />

issues in the first place.<br />

For integrators and installers, adhering to<br />

Secure by Default Requirements should not<br />

The concerns of end users with regard to the<br />

cybersecurity of surveillance devices has largely<br />

been driven by reported cases which carry a<br />

substantial amount of misinformation. However, the<br />

resulting proposals for a ‘Secure by Default’<br />

standard have to be applauded, if only because it<br />

ensures all manufacturers implement stringent<br />

measures which will ultimately assist system<br />

integrators and security installers.<br />

be an issue, and indeed many higher end<br />

surveillance products already offer the<br />

features and functions required for such a setup.<br />

Additionally, these manufacturers also<br />

offer a wealth of support to help enforce<br />

cybersecurity.<br />

The Secure by Default Requirements will be<br />

good news if – and it’s a big if – the self<br />

certification process is carefully scrutinised<br />

for all products, especially those aimed at the<br />

DIY and consumer markets, and if they’re<br />

widely promoted, not the industry, but to end<br />

users in all sectors so they understand to look<br />

for the mark when buying a solution.<br />

If this isn’t done, then the whole exercise<br />

could be a wasted effort.<br />

The Secure by Default Requirements will be good news if – and it’s a<br />

big if – the self certification process is carefully scrutinised for all<br />

products, especially those aimed at the DIY and consumer markets.<br />

7


BENCHMARK TEST<br />

TEST: VMS for Mainstream<br />

Applications (Part 1)<br />

Cathexis: CathexisVision 2019<br />

CathexisVision 2019 is available in four variants: Lite,<br />

Core, Professional and Premium. The Lite and Core<br />

versions support 48 cameras and a single server. Core<br />

allows an increased number of connections and<br />

includes additional event management tools, plus is upgradable. The Professional version<br />

supports up to 150 cameras and unlimited servers, while the Premium package offers unlimited<br />

cameras and servers.<br />

For mainstream applications, the choice is most likely to be Lite or Core. The main difference<br />

between the two is the number of simultaneous connections (3 and 7 respectively), and Lite<br />

does not support Email- and SMS-based notifications, or Event Alarms. Both versions support<br />

VMD and ANPR, along with various event management and alarm handling functions. Events are<br />

managed by Rules which can be configured for a variety of requirements.<br />

CathexisVision 2019 is an open platform VMS. It is made up of a server package for system<br />

management and a client for connection. The Server package can be used if there isn’t a need<br />

for remote connections to the server, which may be the case in many mainstream applications.<br />

Hanwha Techwin:<br />

Wisenet Wave<br />

Wisenet Wave is an open platform<br />

VMS from Hanwha Techwin. The VMS is available in a single edition and expansions are handled<br />

by licence additions. This means that the feature-set and functionality remains the same,<br />

whether the software is used for small systems with a few cameras of for fully blown complex<br />

solutions.<br />

Wisenet Wave-based systems can support up to 50 servers in total, with a maximum of 128<br />

streams per server and up to 50 clients per server. The VMS can manage video streams in a<br />

range of formats including H.265, H.264 and MJPEG. It also supports AAC, PCM, G.726 and MP3<br />

audio formats.<br />

The software runs on Windows or Linux operating systems. It allows the use of Hanwha<br />

Techwin Wisenet devices; third party devices are supported either via integrations or by way of<br />

ONVIF protocols.<br />

Hanwha Techwin provides a list of supported devices, which offers greater detail of the<br />

functionality that is supported on specific units. The list includes devices from over 250<br />

manufacturers, with almost 4,000 devices directly supported.<br />

Other features include failover to ensure reliability in critical applications and video<br />

transcoding, offering a higher degree of flexibility when dealing with archived footage.<br />

Next Month: Part 2<br />

Benchmark will look at other mainstream VMS software options from a number of<br />

other manufacturers, including Milestone Systems and Axis Communications, to<br />

establish which packages are best suited to the needs of integrators and installers<br />

serving the general surveillance markets, and revealing which packages offer the<br />

best options.<br />

8


BENCHMARK TEST<br />

In the past the mainstream video<br />

surveillance market was very much<br />

hardware-centric when it came to recording<br />

and system management. However, with<br />

today’s evolving technological landscape, the<br />

case for open platform VMS solutions is<br />

becoming ever more compelling.<br />

The leading VMS packages often combine<br />

video management and recording, IVA<br />

implementations, as well as integrations with<br />

access control, perimeter and intruder<br />

detection, building management, business<br />

intelligence and a host of other sub-systems.<br />

In many cases, a VMS can provide an<br />

advanced and flexible security management<br />

solution which is highly cost-effective. The<br />

depth of flexibility and the ability to create<br />

truly bespoke solutions can be deployed in<br />

many different ways.<br />

There are a number of driving factors when<br />

specifying a VMS-based system for<br />

mainstream applications. The systems deliver<br />

simple installation and integration of a wide<br />

range of third party devices. Open platform<br />

VMS packages support the majority of devices<br />

from professional security manufacturers,<br />

with the market-leaders boasting thousands<br />

of supported products. This eliminates<br />

frustrations associated with single-brand<br />

hardware options.<br />

Often hardware-based recorders have<br />

limitations with regards to third party<br />

The growth in VMS deployments for video<br />

surveillance and security management has grown<br />

significantly in recent years, and for good reason.<br />

Many VMS providers take an open platform<br />

approach, ensuring third party devices can be easily<br />

supported. This enables the creation of ‘best of<br />

breed’ solutions. While often considered as an ideal<br />

solution for large and complex sites, VMS systems<br />

have increasingly won favour with integrators and<br />

installers for mainstream applications due to their<br />

highly flexible capabilities.<br />

compatibility. Many NVRs only support the<br />

manufacturer’s own cameras and codecs,<br />

along with a few models from partner<br />

companies. In some cases, future firmware<br />

upgrades don’t support new camera models,<br />

so systems cannot be upgraded as<br />

technologies advance.<br />

Not only will an open platform VMS offer a<br />

vast array of supported third party models,<br />

but because drivers have been created<br />

specifically for the individual devices, all<br />

features should be supported.<br />

Another driver for the deployment of VMS<br />

solutions is the fact that they are scalable and<br />

9


BENCHMARK TEST<br />

upgradable. As the system is software-based,<br />

new developments can be quickly<br />

implemented, ensuring end users can realise<br />

the full potential from their investment.<br />

Many integrators and installers who switch<br />

to VMS platforms find the functionality and<br />

flexibility on offer is far in excess of what is<br />

available from similar hardware solutions.<br />

Additionally, they discover the available<br />

features are also superior to those available<br />

from higher cost hardware-based options.<br />

Cathexis: CathexisVision 2019<br />

CathexisVision 2019 is available in four<br />

variants: Lite, Core, Professional and<br />

Premium. The Lite and Core versions support<br />

48 cameras and a single server. Core allows<br />

an increased number of connections and<br />

includes additional event management tools,<br />

plus is upgradable. The Professional version<br />

supports up to 150 cameras and unlimited<br />

servers, while the Premium package offers<br />

unlimited cameras and servers.<br />

For mainstream applications, the choice is<br />

most likely to be Lite or Core. The main<br />

difference between the two is the number of<br />

simultaneous connections (3 and 7<br />

respectively), and Lite does not support Emailand<br />

SMS-based notifications, or Event Alarms.<br />

Both versions support VMD and ANPR, along<br />

with various event management and alarm<br />

handling functions. Events are managed by<br />

Rules which can be configured for a variety of<br />

requirements.<br />

CathexisVision 2019 is an open platform<br />

VMS. It is made up of a server package for<br />

system management and a client for<br />

connection. The Server package can be used if<br />

there isn’t a need for remote connections to<br />

the server, which may be the case in many<br />

mainstream applications.<br />

The VMS server makes use of a single<br />

executable installation package. This is just<br />

over 350MB in size, which is pretty lean for a<br />

modern VMS.<br />

The smaller file size also means the<br />

installation process, which is very<br />

straightforward and truly is a one-click<br />

process – runs without issues. The installation<br />

time was a fraction over 1 minute 20 seconds.<br />

Once installed, the VMS runs a short<br />

‘optimisation’ program. This gives some<br />

simple set-up choices and manages some of<br />

the Microsoft services. This process takes<br />

around 20 seconds.<br />

Effectively, in just under two minutes, you<br />

have a VMS loaded and ready for<br />

configuration.<br />

CathexisVision uses a mixture of tabs,<br />

menus and contextual menus for navigation. It<br />

does take a few minutes to acclimatise<br />

yourself to the interface, and whilst the vMS is<br />

accompanied by a relatively straightforward<br />

PDF manual, it is arguably quicker and work<br />

your way through the screens, remaining<br />

aware that many of the contextual options will<br />

change depending upon the screen you’re<br />

viewing.<br />

While some VMS packages can seem<br />

overwhelming to new users, especially when<br />

they present a seemingly limitless list of<br />

options, CathexisVision at first seems almost<br />

minimal. However, the menus and<br />

configurations you’re presented with are<br />

always pertinent. We recently saw a VMS<br />

where motion detection needed to enabled,<br />

but the simple tick-box to do this wasn’t on<br />

the motion detection page. It took around 15<br />

minutes to find it. This won’t be an issue with<br />

CathexisVision 2019 as controls are logically<br />

grouped.<br />

Adding and managing devices is quick and<br />

straightforward. If you want to add a single<br />

device you can enter its config details and<br />

search for it. Additionally, by clicking the Scan<br />

button, the VMS runs an auto-discovery<br />

wizard, identifying all attached discoverable<br />

devices. The GUI doesn’t make it clear that<br />

this is an option, but it does work.<br />

There is a camera optimisation wizard<br />

which sets streams from the device, inputs,<br />

outputs and triggers. Once the cameras are<br />

configured you can select the database for<br />

archiving, along with recording parameters for<br />

events and for analytics.<br />

The menus are clean and intuitive, making<br />

the various set-up processes easy to follow. If<br />

the truth be told, the GUI lacks the stark and<br />

modern feel many VMS providers go for, but<br />

the speed of flow of the software more than<br />

makes up for the looks.<br />

The Events menu includes four tabs:<br />

General, Trigger, Action and Resources. The<br />

General menu simply requires the event name<br />

and description if required. It also allows<br />

scheduling to be applied. Where workflows<br />

are used, the event can also be allocated a<br />

priority.<br />

Triggers allows configuration of alarms,<br />

events or other conditions which initiate an<br />

automated event. Either standard or advanced<br />

triggers can be used, and the time of<br />

triggering (when or while) can be set: the<br />

difference is a trigger when an activation<br />

occurs, or while the trigger is active.<br />

Dependent upon the programmed trigger<br />

events, the options change form device to<br />

device.<br />

The Actions tab dictates the results of an<br />

event, and can include device-specific or<br />

10


Save<br />

the<br />

Date...


BENCHMARK TEST<br />

system-based activity, and the final tab,<br />

Resources, enables control over devices that<br />

are related to events.<br />

The Events functionality is simple to<br />

implement and works well, with a good<br />

degree of flexibility.<br />

Management of playback is also good, with<br />

some interesting features such as motion<br />

search and activity trails. These features are<br />

configured via the motion database and use<br />

metadata. Motion search is self explanatory,<br />

while activity trails present a time-stamped<br />

heat map which can prove useful in low<br />

activity scenes.<br />

CathexisVision 2019 delivers a good degree<br />

of functionality in a lean and easy to configure<br />

VMS.<br />

Hanwha Techwin: Wisenet Wave<br />

Wisenet Wave is an open platform VMS from<br />

Hanwha Techwin. The VMS is available in a<br />

single edition and expansions are handled by<br />

licence additions. This means that the featureset<br />

and functionality remains the same,<br />

whether the software is used for small<br />

systems with a few cameras of for fully blown<br />

complex solutions.<br />

Wisenet Wave-based systems can support<br />

up to 50 servers in total, with a maximum of<br />

128 streams per server and up to 50 clients<br />

per server. The VMS can manage video<br />

streams in a range of formats including H.265,<br />

H.264 and MJPEG. It also supports AAC, PCM,<br />

G.726 and MP3 audio formats.<br />

The software runs on Windows or Linux<br />

operating systems. It allows the use of<br />

Hanwha Techwin Wisenet devices; third party<br />

devices are supported either via integrations<br />

or by way of ONVIF protocols.<br />

Hanwha Techwin provides a list of<br />

supported devices, which offers greater detail<br />

of the functionality that is supported<br />

on specific units. The list includes<br />

devices from over 250<br />

manufacturers, with almost 4,000<br />

devices directly supported.<br />

Other features include failover to<br />

ensure reliability in critical<br />

applications and video transcoding,<br />

offering a higher degree of flexibility<br />

when dealing with archived footage.<br />

Wisenet Wave uses a Rules engine<br />

to manage the relationship between<br />

triggers and actions. Triggers can<br />

come from a variety of sources<br />

including the server or connected<br />

devices.<br />

Wisenet Wave is supplied as a<br />

Server and Client bundle (these can<br />

be obtained separately). It is a very<br />

lean package, weighing in at 124MB for both<br />

elements as single executable file. As is<br />

expected from such a lean file, the installation<br />

time is very short at 35 seconds. Establishing<br />

a site merely requires a name and password<br />

to be created, so in less than a minute the<br />

VMS is up and running and ready to configure.<br />

The process of installation and basic<br />

configuration is very straightforward.<br />

Discovering devices works well, although we<br />

did find the range of support wasn’t as great<br />

as some other VMS options. Once cameras are<br />

added, the recording and alarm parameters<br />

are set up via simple menus with easy-to-use<br />

interfaces.<br />

This is also the case when managing<br />

alarms. The VMS makes use of a clean and<br />

intuitive interface and makes use of<br />

contextual menus. As such there are several<br />

ways to access important screens, dependent<br />

upon which part of the software you are<br />

using. If there was a small criticism, it would<br />

be that at times you have to hunt out where<br />

the menus are: they can be contextual or be<br />

found as pull-out side tabs.<br />

Event management can be accessed via the<br />

System Admin menu or from the camera<br />

views. If in the latter, you simply right-click in<br />

the camera view and select Camera Rules.<br />

From the main screen you can access this<br />

functionality via the server contextual menu.<br />

There is the option to Add or Delete Rules.<br />

Clicking on Add opens up a new screen which<br />

is split into two parts: the Event (the cause of<br />

the Rule being triggered) and the Action.<br />

The first step is to specify the trigger. This<br />

can be a camera event, archive back-up<br />

completion, camera disconnect, camera IP<br />

conflict, generic event, input signal from<br />

camera, licence issue, motion detection,<br />

network issue, server status event, soft trigger<br />

12


BENCHMARK<br />

...The Event of 2019<br />

5/6 November<br />

SiX<br />

19<br />

2 November 5/6<br />

Dedicated to Installers & Integrators<br />

In Association with:<br />

sixevent.co.uk<br />

ORGANISED BY Pro-Activ<br />

CONTACT: David Lewis on 0208 295 8309 (david.lewis@proactivpubs.co.uk) or Nick Tiday 0208 295 8302 (nick.tiday@benchmarkmagazine.com)


BENCHMARK TEST<br />

or storage failure. The list isn’t ordered in a<br />

logical way, so you might need to scroll to<br />

find what you’re looking for. It could be<br />

ordered in a more logical fashion using subsections,<br />

which would make navigation a bit<br />

simpler and faster, such as allowing basic<br />

filtering by event types.<br />

Conditions can be set by when the trigger<br />

occurs, starts or stops. Once the camera being<br />

used for the trigger event is selected,<br />

additional options are presented, based upon<br />

the other settings. This ensures that<br />

configurations can’t be applied to devices<br />

which don’t support them. It is a common<br />

feature, but some entry level VMS packages<br />

don’t offer this, which can lead to wasted time<br />

inputting actions that are later rejected.<br />

The weak point in the handling of events is<br />

the lack of an option for fluent use of AND/OR<br />

operations. This makes it difficult to set up<br />

smart scenarios, which many integrators and<br />

installers see as a major benefit of VMS<br />

implementations. We’d consider this function<br />

to be of more value than some of the notebased<br />

features.<br />

Wisenet Wave boasts a number of search<br />

options: timeline, preview and motion search,<br />

alongside the more standard options.<br />

Timeline searches allow a period of time to be<br />

selected. Thumbnail images are then shown,<br />

and these include identifiers for the point in<br />

the timeline where they appear.<br />

Preview searches split longer time windows<br />

into more manageable periods. They can be<br />

useful to speed up navigation when seeking<br />

specific segments of video.<br />

Wisenet Wave’s motion search function<br />

makes use of motion detection to perform any<br />

searches of archived footage. As such, the<br />

video streams to be searched must have<br />

motion detection enabled for this feature to<br />

be active. It’s not as slick as a pure metadata<br />

search, but it still works well. Because the<br />

search uses motion detection algorithms, any<br />

area in the viewed scene which contains a<br />

motion detection mask cannot be searched.<br />

Wisenet Wave does lack some refinements<br />

of other VMS packages, but it can deliver<br />

everything required for the management of<br />

video in a mainstream application.<br />

BENCHMARK VERDICT<br />

Cathexis: CathexisVision 2019<br />

CathexisVision 2019 is an ideal VMS for mainstream applications, and one which we think more<br />

integrators and installers should consider. At first it does have a strange almost minimal feel,<br />

despite offering a full range of functions and features often only found on more costly high-end<br />

products. It includes some high-end flexibility with regard to event management, and together<br />

with an ease of customisation, it as a management option which will be of interest to integrators<br />

and installers creating smarter solutions. The implementation is very installer-friendly, which<br />

aides fast configuration, and because the software is relatively lean it runs smoothly, delivering<br />

consistent performance. Because of this, CathexisVision 2019 is rated as Recommended for use<br />

in mainstream applications.<br />

Hanwha Techwin: Wisenet Wave<br />

When Wisenet Wave first appeared, it had a few rough edges which were only to be expected<br />

as it was a new implementation of a VMS, albeit one where the core code was based upon a<br />

previously established product. Hanwha Techwin has since added some refinements and<br />

generally overhauled much of the operational side of the product, and as such it is a more<br />

dependable choice than before. It is easy to work with, but it could be further improved. It would<br />

churlish to pick fault, as it has come a long way, but it still lacks some of the refinements which<br />

other longer established products have. That said, the installation and configuration process are<br />

straightforward, although we did have a few early freezes during the licensing stage. The event<br />

management options have improved, but still lack some of the more advanced features of other<br />

VMS products. Because of this, Wisenet Wave is rated as Recommended for mainstream<br />

applications, with the proviso that it is suitable for those with a need for basic alarms.<br />

14


Evolve Legacy Camera Systems<br />

Into Powerful AI Solutions<br />

Avigilon AI Appliance<br />

Engineered for high performance, capacity and resiliency, the Avigilon Artificial Intelligence<br />

Appliance (AI Appliance) features leading-edge hardware and comes in two models to<br />

support up to sixty 2 MP cameras for enterprise scalability.<br />

Video Analysis for Non-Analytic Cameras<br />

Bring the intelligence of Avigilon self-learning video analytics<br />

to any supported non-analytic camera, allowing accurate<br />

recognition of the movement of people and vehicles.<br />

GENDER: FEMALE<br />

Combine with ACC to enable Appearance Search<br />

On-board GPU supports Avigilon Appearance Search<br />

technology in Avigilon Control Center (ACC) software<br />

regardless of the network video recorder used.<br />

avigilon.com/ai-appliance | asksales@avigilon.com<br />

User interface has been simulated for illustrative purposes.<br />

© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON APPEARANCE SEARCH, AVIGILON CONTROL CENTER and ACC are trademarks of Avigilon Corporation.


A Smarter Way<br />

to Monitor Video<br />

Avigilon Control<br />

Center 7 Software<br />

Video Security, Transformed<br />

The upcoming release of Avigilon Control Center (ACC) 7, our latest and most advanced version of<br />

ACC video management software, is designed to revolutionize how users interact with and gain<br />

situational awareness from their video security systems.<br />

Focus of Attention Interface<br />

Introducing Focus of Attention — a cutting-edge user interface for live<br />

video monitoring that leverages AI and video analytics technologies<br />

to determine what information is important and should be presented<br />

to security operators.<br />

AI-Powered Analytics<br />

Using our deep learning video analytics and Unusual Motion Detection<br />

technologies, ACC 7 software is designed to provide customers with<br />

actionable information to help ensure critical events don’t go unnoticed.<br />

Dark Mode<br />

ACC 7 software introduces a new theme with colors specifically chosen to reduce eye strain<br />

and improve user experience in dark environments, such as video security control rooms.<br />

avigilon.com/acc7 | asksales@avigilon.com<br />

Images and user interfaces have been simulated for illustrative purposes.<br />

© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, and ACC are trademarks of Avigilon Corporation.


SMART SOLUTIONS<br />

SMART SOLUTIONS<br />

Today’s innovative security solutions allow a breadth<br />

of additional benefits to be delivered to the end user.<br />

It is typically these advanced added value elements<br />

which can win contracts if they deliver a tangible<br />

return on investment. Via its Smart Solutions<br />

projects, Benchmark looks at the bigger picture to<br />

assess how integrators and installers can deliver<br />

added value and exceed customer’s expectations.<br />

The technological landscape is rapidly<br />

evolving, and the new and emerging<br />

technologies arriving in the industry<br />

promise much for the security sector. The<br />

possibilities offered by AI and deep learning<br />

are enormous, the flexibility of advanced<br />

networking and communications can make<br />

systems even more accessible, and the<br />

flexibility of IoT and smart solutions will add<br />

value to the next generation of solutions.<br />

There are currently a whole host of<br />

developments which will impact on the<br />

security systems sector. However, integrators<br />

and installers must realise the internet of<br />

things, smart homes, intelligent buildings,<br />

connectivity, solutions as a service, business<br />

intelligence, building automation and a hold<br />

host of other more specific trends are not the<br />

future: they are happening today, and end<br />

users are seeking such solutions. If you<br />

cannot offer a system that meets their<br />

expectations, they will look elsewhere.<br />

The growth in other sectors underlines how<br />

much traction these new approaches have in<br />

commerce and industry. Just as other<br />

solutions are bolting ‘security’ on to their<br />

offering, so the security industry must also<br />

offer other services and benefits.<br />

End users will invest in solutions that<br />

deliver business benefits; they always have<br />

and they always will. Those benefits might<br />

include security, business intelligence,<br />

communications, energy control, building<br />

automation or any host of features and<br />

functions. The security sector has the<br />

technology and the skills to deliver those<br />

solutions.<br />

While security will still be at the heart of<br />

everything our industry delivers, the<br />

technologies we use and the systems we<br />

create have the capabilities to be so much<br />

smarter, providing everyday benefits for our<br />

customers. The Smart Solutions projects are<br />

designed to highlight how these benefits can<br />

best be leveraged.<br />

18


SMART SOLUTIONS<br />

Video Search Made Smarter<br />

Increases in processing power and the use of<br />

GPUs in surveillance systems have allowed<br />

video search to move forward significantly in<br />

recent times. The use of new technologies<br />

allows intelligent searches to be carried out.<br />

These have an element of ‘self-learning’ which<br />

enables the system’s search engine to filter<br />

results based upon feedback from the<br />

operator. The intelligent algorithms are fast<br />

and accurate, thus redefining how incidents<br />

can be managed. An example of this is<br />

Avigilon Appearance Search technology.<br />

Appearance Search can be used to<br />

accurately detect the presence of people and<br />

vehicles in video footage, across multiple<br />

cameras. It allows many hours of footage to<br />

be searched, with targets identified and<br />

verified, in minutes.<br />

If a suspect is identified, Appearance<br />

Search can check across all video streams –<br />

live and recorded – searching for other<br />

incidents involving the suspect. The<br />

technology will present a series of snapshots<br />

and the operator can either accept or reject<br />

these, based on their accuracy. These results<br />

are then used to further refine the search and<br />

as the system ‘learns’ more about the<br />

suspect, so it can find appearances across<br />

wider timescales, where the suspect may be<br />

dressed differently.<br />

As a starting point, Appearance Search can<br />

either use a captured image, or filtering can<br />

be applied. Initial filters are simply selected<br />

from the menus. Options include gender, hair<br />

colour and clothing colours.<br />

The technology also incorporates<br />

characteristics of a person's face, enabling the<br />

operator to search for the same person, even<br />

if items such as their clothing change over<br />

time. Appearance Search examines footage<br />

across all selected cameras and returns the<br />

results. The process is fast.<br />

The operator is presented with a series of<br />

matches. Clicking on the thumbnail plays the<br />

related video clip, allowing an assessment to<br />

be made as to whether it is relevant. The clips<br />

are either rejected or accepted, and the<br />

system uses the accepted results to further<br />

refine the search.<br />

Fast and accurate searching allows a rapid<br />

response to incidents by users.<br />

To read all articles from this project, visit: http://benchmarkmagazine.com/smart-search<br />

Add Value with Network Audio<br />

Networked audio solutions offer a complete<br />

all-in-one system that integrates seamlessly<br />

with network-based video surveillance. No<br />

additional hardware is required above the<br />

actual audio components, which simplifies<br />

the installation and configuration processes.<br />

In addition, the systems have minimal<br />

storage requirements.<br />

Fewer components mean lower costs, so<br />

the return on investment for end users is<br />

significantly increased. With a networkbased<br />

solution, all controls are softwarebased,<br />

which is a great benefit when it<br />

comes to system maintenance.<br />

Each speaker can be directly integrated<br />

within the existing data network, and can<br />

then be managed remotely via a PC or<br />

workstation.<br />

Products can be added and removed easily<br />

and effectively. It is always preferable to<br />

seek audio components that support PoE, so<br />

only one cable is required per product to<br />

supply power to the unit and transmit sound<br />

and data.<br />

Audio solutions may make use of<br />

innovative technologies, but they are also<br />

simple and accessible. This simplicity is a<br />

great advantage to the end users and<br />

integrators alike. Indeed, for the latter, audio<br />

installations are very straightforward.<br />

If an engineer possesses the required<br />

skills to install a network camera, they will<br />

also have the skills to install an audio<br />

system alongside it. It is easy to add and<br />

remove speakers as configuration takes<br />

place centrally. For the customer, the<br />

benefits are significant.<br />

Read all articles from this project: http://benchmarkmagazine.com/smart-audio-deployments<br />

19


SMART SOLUTIONS<br />

Access Control and Rules Mapping<br />

The ACT access control<br />

solution has been designed<br />

to deliver a host of<br />

advanced features that<br />

meet and exceed end user<br />

expectations. For the<br />

integrator and installer, the<br />

manufacturer has also<br />

ensured the solutions are<br />

simple to install and<br />

maintain, regardless of an<br />

engineer’s access control<br />

experience.<br />

It was important when<br />

Rules Mapping was introduced to the ACT<br />

Enterprise software that integrators and<br />

installers could deliver the benefits to their<br />

customers without spending additional time<br />

setting the system up. It was also vital that<br />

additional skills, such as writing complex<br />

code, were not required to enjoy the<br />

flexibility on offer.<br />

As a result, Rules Mapping is a simple<br />

‘point-and-click’ method of establishing<br />

varied criteria which, when met, instigate a<br />

series of actions. It is configured via a basic<br />

drag-and-drop interface, which allows the<br />

use of triggers such as system input and<br />

output changes, access control transactions<br />

and system status conditions, as well as<br />

triggers from other integrated system such<br />

as intrusion alarm events.<br />

Rules can be established for security<br />

purposes (if an entry door is forced while<br />

specified users are not on site, instigate a<br />

lockdown in certain departments and notify<br />

the security team) through to business<br />

efficiencies (if all IT team members have left<br />

for the night, disable power to the<br />

department).<br />

Rules Mapping makes access control a<br />

more flexible solution and adds value for the<br />

customer. For integrators and installers, it<br />

enables the creation of bespoke solutions<br />

without the need to write code or carry out<br />

complex programming.<br />

Read all articles from this project: http://benchmarkmagazine.com/smart-rules-mapping<br />

Smart Analytics Tracking<br />

For video surveillance to be smart, it must<br />

make it simpler for operators to deal with<br />

alarm incidents, automatically detecting<br />

suspects using IVA, before deploying smart<br />

tracking technologies to follow them across<br />

an entire site. This can be done using VMS 3D<br />

technology.<br />

3D technology can either be manually<br />

deployed or automated via triggers. These<br />

can include integrated IVA options or other<br />

alarms, linked through system actions.<br />

The basis of 3D technology is powerful<br />

geo-referencing. This allows the system to<br />

be aware of the exact location of cameras<br />

and other devices, and to correlate the data<br />

with absolute positioning devices and smart<br />

system maps.<br />

The 3D technology makes use of<br />

geospatial referencing to deliver accurate<br />

levels of camera control, alarm handling and<br />

target tracking during an incident. There are<br />

three ways in which 3D technology can be<br />

deployed: intuitive PTZ control, manual<br />

object tracking and automated tracking over<br />

multiple devices.<br />

The most impressive function is alarmbased<br />

object tracking with handover. This<br />

responds to IVA alerts, initiating automatic<br />

control of a PTZ camera in response to an<br />

event from an overview camera. Once<br />

triggered, the PTZ camera automatically<br />

follows the alarm object, tracking it without<br />

any need for operator intervention. When<br />

the target reaches the end of the range for<br />

the tracking camera, the 3D technology<br />

automatically hands over to an adjacent<br />

linked camera, which continues tracking.<br />

To read all articles from this project, visit: http://benchmarkmagazine.com/smart-tracking<br />

20


12 TO TRY<br />

12 TO TRY: Video Archiving<br />

Benchmark looks at 12 products and systems of interest for integrators and installers<br />

who are looking to implement smart solutions which include video archiving.<br />

Milestone Systems: Husky X2<br />

The Milestone Husky X2 offers a plug-andplay<br />

experience, providing everything<br />

required for small and medium sized<br />

enterprises to implement an open platform<br />

fully functional VMS. The unit features an<br />

integral PoE switch and input/output panel,<br />

allowing cameras and alarm devices to be<br />

easily and quickly connected without<br />

requiring additional equipment.<br />

The Milestone Husky X2 is supplied with a<br />

pre-loaded free version of the company’s<br />

VMS – XProtect Essential+ – reducing the<br />

deployment costs and making it easy for<br />

integrators and installers to get started.<br />

XProtect Essential+ enables users to<br />

connect up to eight cameras, as well as giving<br />

access to all the essential functionalities of<br />

the software for free.<br />

If there is a need to upgrade, it is simple to<br />

unlock any of the paid XProtect VMS versions<br />

that suit the site’s needs with a simple license<br />

upgrade.<br />

Dependent upon the applied licence, the X2<br />

can support up to 133 devices (based on<br />

cameras recording HD720p video at 25 frames<br />

per second with a throughout of 2Mbps) with<br />

a recording throughput of 566Mbps. Onboard<br />

storage can be configured up to a maximum<br />

of 20TB.<br />

To ensure a robust and reliable system, the<br />

server’s OS is housed on a separate solid<br />

state drive. The server features two GigE NIC<br />

interfaces, and the PoE+ switch supports up<br />

to 16 ports. There are also 4 inputs and 4<br />

outputs.<br />

Eagle Eye Networks: EE<br />

Contract Vault<br />

Eagle Eye Contract Vault from Eagle Eye<br />

Networks is billed as a complete cloudbased<br />

system for recording and archiving<br />

important streams of transactions,<br />

incidents and events. Businesses and<br />

organisations can use the service to<br />

capture audio and video recordings of<br />

critical events and store them in the cloud.<br />

Users have the ability to enter<br />

customised relevant information for each<br />

event, making management a simpler task,<br />

and can start or stop the recording process<br />

with a single mouse click.<br />

Video recordings can be stored over long<br />

terms in the Eagle Eye cloud data centre.<br />

By using descriptions and captured<br />

metadata, the search and retrieval process<br />

is made simpler, according to the service<br />

provider. Users can label and tag<br />

recordings for historical reference, review,<br />

or mark as evidential footage.<br />

Retention periods vary according to<br />

contract and use, but Eagle Eye claim<br />

archives can be maintained for up to 30<br />

years where appropriate.<br />

When access to video footage is<br />

required, clips can be downloaded in MP4<br />

format and shared with other users via a<br />

web browser.<br />

The service is compatible with cameras<br />

from most leading video surveillance<br />

manufacturers.<br />

22


12 TO TRY<br />

HPE: InfoSight<br />

Hewlett Packard Enterprise offers InfoSight, a<br />

cloud-based artificial intelligence<br />

management tool, to HPE ProLiant servers.<br />

Using predictive analytics capabilities based<br />

on real-world operational data, InfoSight<br />

closes performance gaps and frees up<br />

maintenance personnel.<br />

With a growth in critical security systems<br />

making use of networked resources,<br />

businesses and organisations cannot afford<br />

downtime or expending resources to solve<br />

preventable problems, especially those that<br />

impact productivity.<br />

HPE InfoSight solve these challenges by<br />

constantly monitoring infrastructure,<br />

identifying potential problems and providing<br />

insights to facilitate a fast resolution for<br />

problems. It does this via an AI-driven<br />

framework which monitors, collects and<br />

analyses data.<br />

InfoSight gathers operational intelligence<br />

by analysing millions of sensors across a<br />

globally-connected installed base, and uses<br />

behavioural data to provide insights,<br />

forecasting and recommendations, predicting<br />

and preventing problems. The result is higher<br />

efficiency and reliability, creating a smarter,<br />

easier-to-manage infrastructure.<br />

HPE claims that with InfoSight, 86 per cent<br />

of issues are automatically predicted and<br />

resolved before a problem occurs.<br />

Manything: Manything Pro<br />

Manything Pro is a cloud-based service<br />

which can be used to provide back-up<br />

storage in conjunction with local storage on<br />

an NVR. Because the Manything Pro<br />

software is installed on the camera,<br />

integrators and installers can configure the<br />

system with archiving to a local NVR for<br />

security purposes, while cloud-based<br />

footage can be used for remote access and<br />

sharing.<br />

The Manything Pro streams are drawn<br />

from the cameras’ sub-streams and so are<br />

limited to 640 x 360 pixels. The higher<br />

resolution main stream is used by the NVR<br />

for evidential quality recordings. This can<br />

be adjusted if an NVR is not being used,<br />

allowing motion events to be sent to the<br />

cloud in higher resolutions.<br />

The Manything Pro plug-in for the<br />

compatible Hikvision cameras replaces the<br />

firmware with an open platform version,<br />

adding functionality required to use the<br />

service.<br />

Wavestore: PetaBlok<br />

PetaBlok is a high-density storage solution<br />

from Wavestore which is capable of storing<br />

up to 2.04PB of data per high density unit.<br />

When coupled with Wavestore’s<br />

HyperRAID redundancy and EcoStore hard<br />

drive energy saving technology, PetaBlok<br />

delivers an efficient and robust video<br />

management and storage solution for<br />

applications which generate extremely<br />

large amounts of data.<br />

Pre-installed with Wavestore’s VMS,<br />

PetaBlok is designed to provide a simpleto-implement<br />

and cost-effective solution<br />

for the growing number of video<br />

surveillance projects which require multimegapixel<br />

images captured from a high<br />

numbers of cameras which are to be stored<br />

over long periods of time, with a<br />

requirement for fast search and video<br />

replay.<br />

Ideal for high risk projects, where it is<br />

commonplace to store recorded video for<br />

longer durations due to legal compliance,<br />

PetaBlok will also offer a highly effective<br />

option for large-scale applications such as<br />

airports and ports, city centre surveillance,<br />

utilities and other mission-critical sites<br />

where long-retention times, or the<br />

recording of many high resolution<br />

cameras, is required.<br />

These archiving solution can support<br />

multiple sites while being controlled and<br />

managed from a central control room. Up<br />

to 255 PetaBloks can be grouped together<br />

to provide over 520 PetaBytes of storage.<br />

PetaBlok is available in various sizes<br />

from 480TB (8U) to 2.04PB (16U). This<br />

enables each PetaBlok to store images<br />

captured from over 235 4K resolution<br />

cameras in real time, for a period of 120<br />

days.<br />

23


12 TO TRY<br />

Bosch: DIVAR network 5000<br />

The DIVAR network 5000 supports 32 video<br />

channels and represents a cost-effective<br />

investment in a future-proofed IP video<br />

surveillance system that can be scaled as<br />

customers’ businesses grow. Thanks to a<br />

high level of scalability, the complete video<br />

surveillance system is flexible thanks to a<br />

built-in Power over Ethernet (PoE) switch,<br />

connecting IP cameras to the video recorder<br />

with no need for separate power adaptors,<br />

making installation quick and easy. The<br />

PoE switch can supply power to a maximum<br />

of 16 cameras.<br />

Each camera is automatically allocated<br />

its IP address from the recorder to enable<br />

simple plug-and-play operation, reducing<br />

configuration time.<br />

DIVAR network recorders enable easy<br />

monitoring and configuration as well as<br />

simple playback of recorded content.<br />

Reconfiguration of local unit settings<br />

anytime from anywhere via the DIVAR<br />

Viewer app, available on smartphones (iOS<br />

and Android), and via a web browser. The<br />

app can also be used to control the pan,<br />

tilt and zoom functions.<br />

The Bosch DDNS service enables users<br />

to create a name for their recorder, free of<br />

charge, making it easy to find the recorder<br />

without an IP address when navigating via<br />

a web browser.<br />

Axis Communications: AXIS<br />

Camera Station S20 Appliance<br />

The AXIS Camera Station S20 Appliance series<br />

constitutes a series of network video<br />

recorders for reliable high definition<br />

surveillance recording and management. The<br />

appliances are effectively hardware-based<br />

servers running the Axis Camera Station VMS<br />

and are designed to minimise installation<br />

time.<br />

The S20 appliances come in two different<br />

configurations supporting 16 or 24 cameras<br />

(S2016 and S2024 respectively). Each unit<br />

features an integrated PoE switch for the full<br />

number of channels, and the units are<br />

preloaded with all necessary software,<br />

including licenses, to allow the system to be<br />

up and running.<br />

The S2016 appliance can support a total of<br />

8TB (two 4TB drives) while the S24 supports<br />

up to 12TB (three 4TB drives). The recorders<br />

can support resolutions of up to 4K UHD.<br />

Both AXIS S20 recording appliances include<br />

a three year hardware warranty.<br />

Western Digital: WD Purple<br />

Built for always-on, high-definition video<br />

surveillance systems, the WD Purple range of<br />

surveillance-specific HDDs have been<br />

designed with the specific needs of security<br />

applications in mind. The hard drives offer a<br />

supported workload rate of up to 180TB per<br />

year and can manage up to 64 video streams<br />

simultaneously.<br />

Purple drives are optimised for surveillance<br />

needs and have been engineered to cope with<br />

high write cycles as well as the higher<br />

temperatures which are typical in NVR- and<br />

DVR-based security applications.<br />

WD Purple HDDs are available in a range of<br />

capacities from 1TB to 12TB. The drives are<br />

equipped with the manufacturer’s AllFrame<br />

Technology. This is designed to enhance ATA<br />

streaming which not only improves video<br />

playback, but also reduces frame losses and<br />

enables the use of a higher number of drives<br />

in NVRs. Between 8 and 16 bays are<br />

supported dependent upon the model.<br />

WD Purple drives with capacities of up to<br />

8TB include AllFrame 4K technology, ensuring<br />

the drives can also support the use of 4K UHD<br />

cameras.<br />

The 8TB, 10TB and 12TB drives are also<br />

designed to support Deep Learning analytics<br />

in AI-capable NVRs, and feature an enhanced<br />

workload rating of up to 360TB per year, with<br />

support for up to 16 AI-enabled channels for<br />

analytics within the system.<br />

The WD Purple range carry a three year<br />

limited warranty.<br />

24


HIGH-END CAMERA<br />

X TOP PERFORMANCE LENS<br />

THE NEW FUJINON SX800. THE BEST OF BOTH.<br />

With the new SX800, Fujinon combines both in one for the first time: camera and lens. For<br />

long range surveillance at the highest level with 40x optical magnification and constantly<br />

sharp images. www.fujifilm.eu/fujinon. Fujinon. To see more is to know more.


12 TO TRY<br />

Dell: IoT Solutions for<br />

Surveillance<br />

Dell Technologies’ Edge and IoT Solutions<br />

Division offers new solutions and bundles<br />

to simplify deployment of secure, scalable<br />

solutions for edge computing and IoT use<br />

cases. The solutions combine tools from<br />

Dell’s portfolio with technology from Intel<br />

and partners in the Dell Technologies IoT<br />

Solutions Partner Program. This will drive<br />

workloads for computer vision – enabled by<br />

imaging sensors – and machine intelligence<br />

from sensors and control systems.<br />

Cameras provide information-rich data<br />

about the status of sites, but the sheer<br />

volumes of video data create too much<br />

information for operators to cost-effectively<br />

monitor for real-time decision making<br />

purposes. Applying analytics, such as AI, to<br />

these data streams automates actionable<br />

insights.<br />

Events driven by video data and analysed<br />

along with telemetry from other systems<br />

results in even more powerful insights. The<br />

rapid evolution of the IoT market and the<br />

fast pace of innovation means many<br />

customers require IT grade infrastructure.<br />

Surveillance is the first use-case to which<br />

Dell Technologies has applied computer<br />

vision, so customers can monitor events<br />

and automate decision-making.<br />

The IoT Solution for Surveillance is<br />

specifically built to transform and simplify<br />

how surveillance technology is delivered.<br />

Available as a package, the engineered,<br />

pre-integrated solution will provide a<br />

consistent foundation from edge to<br />

distributed core to cloud. It will also be<br />

ready to run on day one with customer data<br />

to speed the return on investment.<br />

Seagate: SkyHawk HDDs<br />

Seagate offers the SkyHawk range of HDDs<br />

which have been design for around-the-clock<br />

workloads in surveillance applications. The<br />

range includes hard drives of varying<br />

capacities up to 14TB, with drives specifically<br />

designed for DVR- and NVR-based surveillance<br />

systems.<br />

SkyHawk surveillance drives are equipped<br />

with ImagePerfect technology. This firmware<br />

allows for higher image integrity and supports<br />

archiving from up to 64 HD video streams. The<br />

algorithm reduces data errors, allows images<br />

to be stored without pixilation and prevents<br />

frame loss when working with multiple stream<br />

recordings.<br />

Secure Logiq: HPS-2U-H<br />

Server<br />

The HPS-2U-H servers boast the same<br />

form factor, storage options and<br />

resilience features of the M series servers<br />

from Secure Logiq, but include an<br />

upgraded Xeon Silver Octa-core<br />

processor and 24GB of 6 channel memory<br />

as well as 10GbE networking for high<br />

throughput applications.<br />

This server range has been designed<br />

for higher camera counts and basic video<br />

analytics applications (such as ANPR), as<br />

well as for projects with multiple client<br />

positions and mobile device transcoding.<br />

With a throughput of 1,500Mbps and a<br />

maximum storage capacity of 120TB, the<br />

server offers RAID 5 with spare storage,<br />

dual 10 Gigabit ethernet NICs, redundant<br />

PSUs and the option of GPUs to enable<br />

suitability with some of the leading VMS<br />

options.<br />

The server makes use of the Windows<br />

Server 2016 64-bit OS (other options are<br />

available). The OS and application<br />

software are stored on solid state drives<br />

to offer enhanced reliability.<br />

Johnson Controls: ExacqVision<br />

S-Series<br />

The ExacqVision S-Series offers additional<br />

video and audio storage capacity to the range<br />

of ExacqVision video appliances available<br />

from Johnson Controls. The storage units are<br />

available in 2U and 4U variants.<br />

The storage units offer a high level of data<br />

recoverability with back-up from exacqVision<br />

recorders to S-Series storage, and feature an<br />

instant search facility, speeding up<br />

investigations. The units allow the<br />

optimisation of network loads, as scheduled<br />

or continuous archiving can be selected<br />

dependent upon the infrastructure. To assist<br />

when storing critical video and audio, userdefined<br />

archiving rules can be set including<br />

retention times.<br />

Each S-Series storage unit can be used to<br />

consolidate archives from multiple video<br />

recorders, and optional dual 10Gbps network<br />

interfaces allow faster archiving.<br />

The storage units can support capacities of<br />

up to 240TB.<br />

26


ADVERTISEMENT FEATURE<br />

Image Capture and Big<br />

Data management<br />

Historically, security-related video surveillance<br />

has relied upon the capture of video streams<br />

to allow reactive post-event analysis. To<br />

enhance retention periods, camera counts were<br />

kept to a minimum, and strategies to maximise<br />

storage included reduced frame rates, limited<br />

resolutions or increased compression, and timebased<br />

recoding. The latter approach meant stored<br />

footage would be encoded after a certain period,<br />

reducing quality and frame rate, thus freeing up<br />

more space.<br />

This approach was used for many years, as it was<br />

the most cost-effective option. Invariably, users<br />

would be aware an incident had occurred within a<br />

short time span, and as archived footage grew<br />

older, the likelihood of it being required diminished.<br />

While these strategies do enhance video<br />

retention times, they also introduce a level of<br />

compromise which, given today’s demands on<br />

video-based solutions, are not acceptable.<br />

With numerous advances in processing in recent<br />

years, the potential for captured video streams has<br />

grown exponentially. Where once the capture of<br />

suspicious activity was the sole purpose of video<br />

surveillance, today’s systems are delivering realtime<br />

data about the ongoing status of sites,<br />

business operations and procedures, and a host of<br />

other variables. The big data captured by video<br />

surveillance, or through other systems which are<br />

linked to video solutions, is invaluable to<br />

businesses and organisations, for a host of reasons<br />

along with site protection and security.<br />

It is these additional uses of the data which<br />

often add value and benefits for customers,<br />

allowing the return on investment in their solutions<br />

to be a tangible and measurable element. In order<br />

to capture this valuable additional data, the trend<br />

is towards the implementation of a greater number<br />

of cameras, the retention of real-time streams even<br />

when there is no security-related activity, and the<br />

expansion of real-time processing and analytics<br />

deployments.<br />

Traditional constraints relating to video<br />

infrastructure have been removed, and customers<br />

expect to receive smart benefits from modern<br />

implementations. As advanced surveillance<br />

systems collect, process and analyse increased<br />

amounts of data including video, audio, metadata<br />

and geolocation information, the solutions require<br />

ever higher capacities in terms of computational<br />

processing, storage and networking resources.<br />

What was once considered ‘sufficient’ in terms of<br />

video surveillance infrastructures can no longer<br />

cope with today’s demands.<br />

According to research carried out by NVIDIA, 30<br />

billion images per second (100 trillion images per<br />

hour) will be captured by surveillance cameras<br />

across the globe by 2020. With the pursuit of smart<br />

cities and intelligent buildings, much of this data<br />

will also be processed and filtered using AI and<br />

machine learning technologies. This represents a<br />

sea-change in terms of how data is stored,<br />

managed and utilised. Legacy video surveillance<br />

infrastructure simply will not cope with the load.<br />

To address the future growth, HPE OEM<br />

Solutions has created Edgeline Converged Edge<br />

Systems, a purpose-built platform for converging<br />

data acquisition, control and analytics at the edge,<br />

delivering remote management for businesses and<br />

organisations. The platform ensures solutions can<br />

connect to extended networks, capture and analyse<br />

critical data from a wide range of sources, and take<br />

appropriate actions when events or incidents<br />

demand it. Because the data is processed at the<br />

edge, management of information is fast, efficient<br />

and less prone to problems which may occur across<br />

the wider system infrastructure.<br />

The compact, energy-efficient, ruggedised<br />

platforms can support virtually all edge-based<br />

video processing use cases. Customisable, the<br />

platform supports a variety of chassis types, server<br />

arrays, GPUs, CPU cores, memory and storage.<br />

By combining HPE Edgeline Converged Edge<br />

Systems with the use of robust and resilient HPE<br />

ProLiant Gen10 servers for essential centralised<br />

storage and processing, it is possible to create a<br />

secure and resilient platform that delivers the<br />

performance and reliability expected from<br />

advanced solutions, both now and in the future.<br />

As demands for the storage, processing and<br />

management of constantly expanding volumes of<br />

data increase, and as the need for real-time<br />

business intelligence and data mining becomes<br />

more prevalent for businesses and organisations, it<br />

makes sense to utilise the secure and flexible<br />

options offered by edge-based systems.<br />

Build surveillance systems<br />

that keep security threats in<br />

sight with the latest Edge<br />

technology from HPE OEM<br />

Solutions. Find out more at<br />

http://www.hpe.com/<br />

solutions/oem-cctv<br />

27


BENCHMARK TEST<br />

A More Flexible Shock?<br />

Texecom – Premier Elite Micro Shock-W<br />

When Texecom launched the Premier Elite Micro<br />

Contact-W, the miniature form factor and the device’s low<br />

profile offered a wireless contact which could be virtually<br />

hidden in most window and door frames. This made it<br />

suitable for many applications and allowed its use as a<br />

trigger in smart systems too. The range is now completed by<br />

the Premier Elite Micro Shock-W, which allows a high level<br />

of flexibility when mounting shock sensors.<br />

28<br />

TEXECOM: MICRO<br />

SHOCK-W<br />

www.benchmarkmagazine.com<br />

Traditionally, magnetic<br />

contacts and shock<br />

sensors are a staple in<br />

intruder alarm applications,<br />

offering protection for<br />

doors and windows at a<br />

site. While essential when<br />

delivering security to a<br />

building, it’s hard to get<br />

too excited by the<br />

products. In many<br />

installations, shocks and<br />

contacts can be<br />

problematic. They<br />

create issues with<br />

wiring, and even the<br />

advent of wireless<br />

devices doesn’t get<br />

rid of the problem<br />

that few end users<br />

want large detectors<br />

on every window or<br />

door.<br />

Where the Premier Elite Micro Shock-W<br />

makes this problem a thing of the past is its<br />

diminutive size. Sharing the same proportions<br />

as the Premier Elite Micro Contact-W, it can be<br />

easily concealed in uPVC window and door<br />

frames. Even where this is not possible, it is<br />

small enough to be used discreetly in a wide<br />

range of applications.<br />

While best practice is for every external<br />

door and window which could feasibly bear<br />

the brunt of a physical attack to be protected<br />

with a shock sensor, this rarely happens.<br />

However, with the Micro Shock-W, problems<br />

such as the need to run numerous cables, and<br />

users objecting to large sensors fitted in plain<br />

sight are eliminated.<br />

Additionally, because of the diminutive size<br />

of the device, it can be used for a wider range<br />

of applications, including a host of triggering<br />

tasks in smart intruder systems.<br />

Specification<br />

The Premier Elite Micro Shock-W is a<br />

miniature low profile wireless shock sensor<br />

which has been designed to meet Grade 2<br />

EN50131-2-8 requirements; the standard<br />

includes specifications for shock sensor<br />

sensitivity, which the Micro Shock-W meets.<br />

The shock detector makes use of Texecom’s<br />

established and proven Ricochet mesh-based<br />

network, and so forms a part of a self-healing<br />

wireless environment which is both robust<br />

and consistent in coverage. Long-term tests<br />

by Benchmark on the Ricochet wireless<br />

platform have proved it to be stable in a wide<br />

range of conditions.<br />

Measuring 57 x 27.5 x 8.2mm, the size of<br />

the device also makes it ideal for monitoring<br />

secure safes and cabinets, storage units and<br />

drawers, both for security and automation<br />

triggering. It is powered by a single coin-cell<br />

CR2450 battery and has a claimed battery life<br />

of up to three years.<br />

The Micro Shock-W is available in three<br />

finishes: white, brown and anthracite. This<br />

means it can be used with white, wood effect<br />

and aluminium finish door and window frames<br />

with little to no visible impact.<br />

Using advanced accelerometer technology<br />

rather than piezoelectric sensing, the 868Mhz<br />

device features five sensitivity settings,<br />

allowing accurate performance regardless of<br />

the substrate it is installed on. Set-up is<br />

simple, making use of a single button.<br />

The detector is tamper protected, and is<br />

compatible with Premier Elite and Premier<br />

control panels and Ricochet expansion packs.<br />

The sensor features a single push button and<br />

a multi-coloured LED to simplify set-up. It is


BENCHMARK TEST<br />

supplied with a battery, an adhesive mounting<br />

pad with fixing screws, and an instruction<br />

leaflet.<br />

Installation<br />

The installation of the Premier Elite Micro<br />

Shock-W is quick and straightforward, very<br />

much like the installation of most Ricochetenabled<br />

peripherals. The backplate of the<br />

shock sensor simply unclips using a small<br />

screwdriver to open the physical latch, and<br />

can be attached to the mounting substrate<br />

using the provided adhesive pad.<br />

While the pad will be suitable for use in<br />

ungraded systems, we’d still advise using the<br />

supplied screws (which are required for a<br />

Grade 2 system) as well. If the shock sensor is<br />

in a hard to access position, it’s quite easy to<br />

pull it free from the substrate when opening<br />

for battery changes if the screws haven’t been<br />

used!<br />

As with all Ricochet devices, Learning the<br />

shock sensor onto the alarm system is also a<br />

simple process. To quickly access the<br />

Ricochet learn menu, simply press the Omit<br />

key while in engineer mode. With the control<br />

panel in Ricochet Learn mode and an empty<br />

zone selected, the button on the front of the<br />

shock sensor needs to be pressed for three<br />

seconds. The sensor’s LED will turn from pink<br />

to green once the device has been learned.<br />

If there is a need to relearn the sensor, the<br />

battery will need to be removed and<br />

reinserted to force the device into learn mode<br />

again.<br />

It is worth noting that if you mount the<br />

backplate and then take the shock sensor<br />

closer to the keypad to initiate the learning<br />

process, the LED will show as orange as the<br />

device will be in tamper mode. Once fitted to<br />

the backplate, the status will show correctly.<br />

There is a wireless range test which can be<br />

carried out using the shock sensor while the<br />

alarm panel is in commission mode. This can<br />

only be done during the first hour the sensor<br />

is powered up. By pressing the button on the<br />

detector for three seconds, the LED will flash<br />

pink, turning green when the wireless link is<br />

confirmed.<br />

With the Premier Elite Micro Shock-W<br />

learned and mounted, the final step is to set<br />

the sensitivity. This process needs to be<br />

completed within 10 minutes of the device<br />

being learned onto the system.<br />

The process is straightforward. By pressing<br />

the button twice, the shock sensor goes into<br />

sensitivity mode and defaults to Level 2,<br />

which is ideal for detection on framed glazed<br />

windows. Each press of the button steps the<br />

sensitivity level up one. Level 1 is the least<br />

sensitive (for use on wood), and Level 5 is<br />

most sensitive (for concrete substrates). The<br />

levels are indicated by the speed of the LED<br />

pulsing. Once the desired sensitivity setting is<br />

reached, the button is held down for three<br />

seconds. An impact test can now be carried<br />

out, and if further adjustments are required,<br />

the process is simply repeated.<br />

Performance<br />

For the test we added 10 Premier Elite Micro<br />

Shock-W devices to a variety of substrates,<br />

with each set up accordingly with regard to<br />

sensitivity. The detectors were installed in<br />

three buildings with distances of up to 80<br />

metres from the panel, and all showed strong<br />

and consistent wireless links directly to the<br />

control panel.<br />

Shock sensors are either going to detect<br />

impacts or not, and when configured properly<br />

with regard to the mounting substrate and the<br />

type of impact expected, they worked well.<br />

Catch performance was consistent, and only<br />

one unit required a tweak after the initial setup.<br />

There were no false alarms during the test<br />

period, and only one nuisance alarm when<br />

maintenance was carried out near a sensor set<br />

as a separate zone which is permanently<br />

armed (and we forgot to disable it). Indeed,<br />

throughout the test the sensors performed as<br />

expected.<br />

The Micro Shock-W devices ignored a host<br />

of innocuous vibrations and general everyday<br />

conditions.<br />

Verdict<br />

Texecom’s Premier Elite Micro Shock-W<br />

sensors are reliable and stable devices which<br />

will be popular<br />

with integrators<br />

and installers<br />

seeking a<br />

discreet low<br />

profile option for<br />

windows and<br />

doors. Their<br />

diminutive size<br />

makes them ideal<br />

for a wide range of<br />

applications,<br />

including the<br />

protection of other<br />

assets.<br />

Performance was<br />

consistent, and as<br />

such, the shock<br />

sensors achieve<br />

Benchmark<br />

Recommended<br />

status.<br />

29


ADVERTISEMENT FEATURE<br />

For more information contact:<br />

Axis Communications (UK)<br />

Ltd.1 Capability Green,<br />

Luton, Bedfordshire, LU1 3LU<br />

Phone: +44 (0) 1582 283760<br />

www.axis.com<br />

30<br />

AXIS P32 Series – a success story born<br />

from a creative corporate culture<br />

An open and dynamic work environment where<br />

employees are given free rein to create new<br />

ground-breaking products, services and<br />

solutions resulted in a new approach to camera<br />

R&D.<br />

Innovation in all its forms is central to Axis's<br />

activities, as well as vital to its continued growth<br />

and profitable development. The culture of<br />

innovation is closely linked to Axis’ philosophy of<br />

listening to its employees, having faith in their<br />

activities and giving them freedom and<br />

independence. A successful example of this<br />

engaging corporate culture is the development of<br />

the network cameras in the AXIS P32 Series.<br />

The brief was simple: design an advanced highquality<br />

camera but still make it affordable. Axis found<br />

that it could not meet the demanding technical<br />

requirements by designing a camera in the traditional<br />

way. The development team was therefore given free<br />

rein to produce different prototypes within certain<br />

given frameworks. The group had fixed requirements<br />

on quality and functionality, as well as a time limit.<br />

Initially, a prototype was used for a completely<br />

different type of camera model, and then further<br />

developed, which was a new approach.<br />

‘We wanted to learn and benefit from products<br />

with a different design logic,’ said Michael Chen,<br />

Global Product Manager at Axis Communications.<br />

‘Amongst other things, we thought about what<br />

makes the camera impact-resistant and waterresistant.<br />

Then we wondered if it would be possible<br />

to separate these two things.’<br />

Michael Chen was involved in developing the<br />

AXIS P32 Series, then as the supervising<br />

mechanical engineer for the team. In the water and<br />

climate laboratories, thorough testing was carried<br />

out in which the cameras were exposed to snow,<br />

rain and wind.<br />

‘We were allowed plenty of time to test, test and<br />

test again the development of our products to<br />

ensure we had the best possible solution,’ added<br />

Chen.<br />

Cooperation took place with colleagues within<br />

their own department, but also with<br />

representatives from the quality, production, test<br />

and design departments.<br />

‘We saw a lot of collaboration, both within the<br />

group and with other departments, to come up<br />

with the most innovative ideas.’<br />

The result was a camera that contained less<br />

metal and was lighter when compared to<br />

equivalent cameras. AXIS P32 features advanced<br />

functions such as optimised IR, Lightfinder<br />

technology (cameras are extremely light sensitive<br />

and can capture colour images in the dark) and<br />

Axis Zipstream technology, which compresses<br />

video data, reducing bandwidth and storage<br />

requirements. In addition, WDR has been made<br />

possible, allowing the camera to reproduce sharp<br />

images even if there are variations in the light<br />

conditions in a single image.<br />

Axis's corporate culture is characterised by an<br />

entrepreneurial spirit, transparency and diligence,<br />

and is vital for maintaining innovation and<br />

dynamism.<br />

All employees are involved, engaged and take<br />

responsibility for what they do. The employees are<br />

allowed a great deal of freedom under<br />

responsibility, which helps to promote innovation<br />

and creativity.<br />

‘We don't limit anybody, if you want to show<br />

ambition then you get the opportunity,’ stated<br />

Michael Chen.<br />

The common core values form the basis of the<br />

corporate culture. Amongst other things, they<br />

mean being open to colleagues' ideas and<br />

customer needs, working together to achieve<br />

Axis's objectives, and being at the forefront and<br />

creating the best products and solutions.<br />

‘At Axis, there is freedom to talk to whomever<br />

you want to, whenever you want; everyone's door<br />

is always open,’ adds Chen. ‘Everyone wants to<br />

help out. It's what makes Axis such an enjoyable<br />

and healthy workplace where people want to stay<br />

for a long time.’<br />

Amongst Axis's other major advantages is the<br />

independence and how people are allowed to be<br />

curious and think freely without limitations.<br />

‘A developer will not be hampered by limitations<br />

but will instead have the opportunity to see the<br />

big picture. Engineers have free rein when it comes<br />

to their work in order to understand the challenges<br />

faced by customers, to understand the<br />

environments in which the camera will be used<br />

and to develop solutions that are relevant.’<br />

The culture of innovation contributes to<br />

increased profitability for Axis, with satisfied<br />

employees who stay a long time. Staff turnover is<br />

low at 6.5 per cent, while the company is growing<br />

rapidly.<br />

‘There is a long-term approach in this way of<br />

working. It's fun, the experience helps people to<br />

grow, and grow together with their colleagues.<br />

And the result will be successful products and<br />

solutions for a smarter and safer world,’ Chen<br />

concludes.


IFSEC 2019<br />

IFSEC 2019 Surveillance<br />

Camera Day<br />

As part of the National Surveillance<br />

Camera Strategy for England and Wales,<br />

the Surveillance Camera Commissioner<br />

has announced the first Surveillance Camera<br />

Day on 20 June 2019.<br />

The purpose of the Surveillance Camera Day<br />

is to raise public awareness about the<br />

provision and operation of surveillance<br />

cameras and to enhance public debate<br />

surrounding the technology. In doing so, it is<br />

hoped the event will encourage conversations<br />

that will help inform policy-makers and<br />

service providers regarding societally<br />

acceptable surveillance practices and<br />

legitimacy for surveillance camera systems<br />

that are delivered in line with society’s needs.<br />

In recent times there have been media<br />

debates over the legitimacy with regard to<br />

some security practices, often based upon<br />

misinformation or a lack of understanding<br />

about video surveillance is deployed. As a<br />

result of the open day, it is hoped that the<br />

public will be given access to transparent and<br />

accurate information to help them better<br />

understand the benefits and positive aspects<br />

of the use of video surveillance with regard to<br />

security, safety and more efficient<br />

communities and services.<br />

There will be a number of different<br />

elements to the Surveillance Camera Day. The<br />

Commissioner is encouraging surveillance<br />

control centres to open their doors, allowing<br />

the public can see, first hand, how they<br />

operate. To complement the ‘doors open’<br />

initiative, a number of surveillance camera<br />

operators will be publishing a surveillance<br />

camera factsheet, setting out basic facts<br />

about their systems, including what it is<br />

designed to do, how it is used and the number<br />

of cameras involved.<br />

The Commissioner will also be launching a<br />

‘Secure by Default’ standard for<br />

manufacturers at the IFSEC International<br />

Conference in London. Where manufacturers<br />

meet the new standard, it will ensure that the<br />

default settings of a product are the most<br />

secure settings possible. This means they are<br />

much less likely to be vulnerable to cyber<br />

attacks. The standard will involve self<br />

certification.<br />

IFSEC International is Europe's leading security<br />

event and a global stage committed to promoting<br />

the future of integrated security. It is designed to<br />

offer a response to the world’s evolving threats,<br />

inviting every vertical of the security industry to<br />

forge a global agenda. This year the exhibition is<br />

hosting the launch of the first Surveillance Camera<br />

Day, along with the introduction of the Secure by<br />

Default basic requirement standard to enhance<br />

cybsersecurity.<br />

Tony Porter, Surveillance Camera<br />

Commissioner, stated, ‘Surveillance Camera<br />

Day is a world first. The UK is sometimes<br />

referred to as the most surveilled country on<br />

the planet. I want to start a conversation<br />

about how surveillance cameras are used,<br />

why they’re used and who is using them.<br />

Cameras keep people safe, but new and<br />

emerging technology can lead to<br />

infringements of civil liberties. Engagement is<br />

a key strand of the national strategy and I<br />

want people who use cameras to shine a light<br />

on what they do, how they’re using cameras<br />

to protect communities, not spy on them.’<br />

31


ADVERTISEMENT FEATURE<br />

Installers to master video system<br />

cybersecurity - more powerful<br />

tech options at IFSEC<br />

A line-up of 2019’s most important advances in video<br />

technology - including powerful and dynamic privacy masking,<br />

a range of exciting new cameras and smarter deep learning<br />

analytics - will be showcased by IDIS at IFSEC 2019.<br />

One of the top priorities - for installers and<br />

end-users - is an issue that’s been<br />

prominent in the news lately:<br />

cybersecurity.<br />

IDIS, which is Korea’s largest video<br />

technology manufacturer, is telling visitors to<br />

its stand (IF1110) that network security, and<br />

the threat of cyber-loopholes, should be taken<br />

very seriously indeed by video surveillance<br />

users.<br />

To inform those involved in level decisionmaking<br />

across the sector, the company has<br />

now produced a cybersecurity advisory video,<br />

which is available via the IDIS website and<br />

YouTube channel. The video explains the<br />

urgent need to strengthen the resilience of<br />

traditional surveillance network processes.<br />

The IDIS team will be reinforcing this<br />

message at IFSEC 2019.<br />

According to the company, end users should<br />

plan for three specific risks: data access<br />

loopholes, data transmission weaknesses, and<br />

threats against the integrity of recorded footage.<br />

IDIS has put effort into addressing these risks<br />

at every stage, from R&D through to<br />

installation. states James Min, Managing<br />

Director, IDIS Europe.<br />

‘We have developed a rich, layered and<br />

comprehensive set of technologies and features<br />

to ensure maximum protection for end users.’<br />

For example, IDIS DirectIP, the cornerstone of<br />

the IDIS Total Solution, closes up widespread<br />

vulnerabilities and serves as a proprietary<br />

mutual authentication system for all IDIS IP<br />

products. DirectIP speeds up implementations<br />

and streamlines cybersecurity by eliminating<br />

the need for engineers to manage multiple IP<br />

addresses and associated passwords during<br />

implementation.<br />

It not only speeds up installation but<br />

mitigates against human error and the common<br />

malpractice of saving passwords in vulnerable<br />

spreadsheets.<br />

Supporting integrators and installers who want<br />

to ensure cybersecurity but don’t have in-depth,<br />

specialist knowledge of routing or networking,<br />

IDIS’s For Every Network (FEN) peer-to-peer<br />

technology lets engineers deploy and configure<br />

secure, multi-site surveillance solutions that<br />

deliver centralised monitoring and control.<br />

IDIS is also highlighting the cybersecurity<br />

essentials for transmission and recording,<br />

together with its own patented and proprietary<br />

technologies which prevent activities such as<br />

snooping, modification and destruction of data.<br />

There’s also a timely reminder about the<br />

continuing importance of video recording<br />

integrity. With its advanced Chained Fingerprint<br />

technology, IDIS authenticates footage so that<br />

it can be submitted to the police and courts as<br />

admissible evidence.<br />

‘We’ve focused on cybersecurity in our<br />

training programmes too, covering devices and<br />

networks,’ states James Min. ‘We’re giving<br />

integrators and installers the tools and<br />

knowledge they need to protect their customers<br />

from video cybersecurity loopholes.’<br />

Privacy masking made easy<br />

As usual, IDIS has also been working hard on<br />

technology innovations that make a difference.<br />

For example, one advance will make life easier<br />

for end users when it comes to submitting video<br />

evidence or requests for footage in compliance<br />

with the General Data Protection Regulation<br />

(GDPR).<br />

The company will launch IDIS Dynamic Privacy<br />

Masking (IDPM) during IFSEC which makes the<br />

blurring and masking of people, vehicles and<br />

sensitive areas much faster and easier.<br />

Importantly, IDPM will be available totally costfree<br />

as a direct download from the IDIS website.<br />

This means that for integrators and installers<br />

who use IDIS platforms, there is no need to rely<br />

on expensive third-party suppliers to do this job,<br />

or to use slow, cumbersome techniques to do it<br />

32


ADVERTISEMENT FEATURE<br />

yourself. Instead, the user simply selects any<br />

faces or objects that need to be masked and<br />

IDPM will handle the task dynamically,<br />

throughout the clip, even if the subjects move<br />

around. IDPM applies the masks without<br />

changing or altering the integrity and<br />

authenticity of the video, meaning masking can<br />

also easily be removed if necessary.<br />

New cameras for speedy set-up<br />

and top performance<br />

It goes without saying that IDIS has also spent<br />

the last year innovating with its award-winning<br />

camera line-up. The selection of models being<br />

introduced at IFSEC includes an easy-to-install 2<br />

Megapixel micro-dome (86pi x 58), designed for<br />

speedy set-up and rapid deployment. It features<br />

in-built IR illumination with a range of 15 metres<br />

and, with no cable whip (pigtail), it offers neater<br />

and quicker installation. The 2MP micro-dome’s<br />

neat appearance makes it ideal for locations<br />

where aesthetics are important, such as highend<br />

retail stores.<br />

The IDIS Light Master PTZ features a powerful<br />

36x optical zoom and an Auto-IRIS with Hall<br />

Sensor for optimum image quality. Integrators<br />

and installers can choose between PoE or low<br />

power 24V AC PSUs. In operation, the camera<br />

benefits from highly accurate auto-return<br />

positioning that ensures the home positioning<br />

index is never lost, even if the camera has been<br />

forced to change angle.<br />

A new range of 5 Megapixel IP cameras will<br />

also be revealed, meeting demand from endusers<br />

for a wider range of high definition options.<br />

The range includes a choice of fixed- and<br />

motorised-focus domes for indoor and outdoor<br />

use, and outdoor motorised bullet-type cameras.<br />

Powerful deep learning analytics<br />

now easy to add<br />

Also launching at the show, IDIS’s DV-2116 ‘AI in<br />

the Box’ will make deep learning analytics more<br />

affordable for small to mid-sized applications,<br />

enhancing security and control room efficiency.<br />

The plug-and-play IDLA-ready appliance<br />

comes embedded with an NVDIA GTX1060 GPU<br />

chipset, allowing the analysis of up to 16<br />

channels simultaneously. Users benefit from<br />

powerful intelligent search functions, tracking<br />

by colour, object and number, plus the soon to<br />

be available Re-ID, which makes it easy to<br />

locate specific individuals within selected time<br />

and location parameters.<br />

The introduction of ‘AI in the Box’ makes<br />

deep learning analytics now easier to adopt<br />

through plug-and-play installation via IDIS<br />

Solutions Suite video management software<br />

(VMS). This allows installation without costly<br />

disruption, and the 97 per cent accuracy proven<br />

in independent testing will minimise false<br />

alarms, significantly improving detection and<br />

monitoring performance.<br />

Visitors to the IDIS stand will also learn about<br />

end-to-end solutions for retail, education and<br />

commercial applications, the flagship plug-andplay<br />

offering DirectIP, and IDIS’s choice of video<br />

VMS including the totally cost-free IDIS Center<br />

and the award-winning modular and scalable<br />

IDIS Solution Suite. Together these advances<br />

offer end-users, integrators, installers,<br />

consultants and distributors new levels of<br />

system-building flexibility, along with significant<br />

cost advantages and enhanced security.<br />

‘Once again IDIS will be at IFSEC showcasing<br />

the most innovative video technology,’ states<br />

James Min, Managing Director, IDIS Europe. ‘For<br />

end-users we’ll be demonstrating how IDIS can<br />

lower the total cost of ownership, and for<br />

integrators and installers we’ll explain how the<br />

implementation of IDIS technology can improve<br />

profitability.’<br />

Don’t miss the IDIS party,<br />

Wednesday 19 June<br />

For a chance to catch-up with industry<br />

contacts – and win a fantastic European break<br />

for two – end users, integrators and installers<br />

are encouraged to come to the IDIS Happy Hour<br />

Party on Wednesday 19 June at 15:00 on stand<br />

IF1110. You might go home a winner when you<br />

try your luck on the ‘lights out’ and ‘buzz wire’<br />

games – and see if your speed, agility and<br />

accuracy match IDIS’ deep learning analytics!<br />

James Min,<br />

Managing Director,<br />

IDIS Europe<br />

For more information about<br />

IDIS’s video solutions, visit<br />

www.idisglobal.com, email<br />

uksales@idisglobal.com or<br />

call +44 (0)203 657 5678.<br />

For up to date news and<br />

information about IDIS’s<br />

technology launches and<br />

activities throughout IFSEC,<br />

follow @IDISglobal on<br />

Twitter.<br />

33


ADVERTISEMENT FEATURE<br />

What’s new with Inner Range?<br />

Come and find Inner Range at<br />

Stand IF1030 or visit<br />

innerrange.co.uk<br />

Access control manufacturer Inner Range<br />

will showcase a host of product<br />

upgrades and enhancements at IFSEC<br />

International 2019, including new apps,<br />

integrations, partitioned systems and an<br />

evidence vault with cryptographic<br />

fingerprinting.<br />

Powerful and budget-friendly<br />

Inception<br />

Inner Range’s award-winning entry-level<br />

access control system, Inception, now has its<br />

own dedicated Sky Command App to control<br />

access remotely. This allows interactive<br />

control and live status of areas, inputs, doors<br />

and outputs, as well as simple or multimode<br />

area arming options. Push notifications can be<br />

sent to smartphones, helping security<br />

managers stay alert to any changes on site.<br />

Inception can also now integrate with the<br />

Milestone XProtect video management system.<br />

The Inception controller becomes the security<br />

and access mechanism supporting the<br />

Milestone system. Multiple Inception systems<br />

can be integrated with a single Milestone<br />

system for multi-site monitoring. Live access<br />

and alarm events can be sent to Milestone,<br />

allowing a wide range of actions to be<br />

triggered within the Milestone system, such as<br />

operators being able to compare video footage<br />

to a user’s photo to grant access.<br />

Award-winning Integriti<br />

Meanwhile, Inner Range’s enterprise-level<br />

intelligent, integrated access control and<br />

intruder detection system, Integriti, has also<br />

been enhanced. IFSEC visitors can see how it<br />

now introduces ‘partitioned sites’, which<br />

allow security managers to create users and<br />

other global entities that only exist within the<br />

partition they were created in. This is<br />

particularly useful for multi-tenanted<br />

buildings because the partitions are<br />

completely isolated and invisible to users in<br />

other partitions.<br />

A new evidence vault for Integriti allows<br />

files to be stored securely without taking up<br />

space in database back-ups. Users can add<br />

MD5 and SHA-256 cryptographic hashes to<br />

ensure files are not tampered with, while<br />

video surveillance footage and snapshots<br />

associated with certain alerts can be<br />

automatically saved to the vault. Fine grain<br />

permissions allow the operator high levels of<br />

control over who can store or retrieve<br />

evidence items.<br />

High Security<br />

For visitors who need watertight security for<br />

critical national infrastructure organisations or<br />

defence and government bodies, Inner Range<br />

will also offer demonstrations of its Integriti<br />

Encrypted High Security system, which offers<br />

end-to-end encryption with Mac authentication.<br />

IFSEC demonstrations<br />

The Inner Range stand will include eight large<br />

screens to demonstrate the manufacturer’s<br />

access control systems and software in action.<br />

Inner Range will also be taking part in the<br />

event’s ‘Show Me How’ series of<br />

demonstrations, with an Inception challenge<br />

for installers and integrators.<br />

Tim Northwood, General Manager for Inner<br />

Range, stated, ‘We’re proud of the fact that<br />

our research and development never stops.<br />

Our products are constantly evolving to offer<br />

more robust safety and security as well as<br />

ease of use.<br />

‘IFSEC is always a great event for us to<br />

catch up with existing customers and show<br />

potential new ones just what our intelligent<br />

access control systems can do. Come and see<br />

for yourself.’<br />

World leader<br />

Inner Range has been a world leader in the<br />

design and manufacture of intelligent security<br />

solutions since it was established in 1988.<br />

More than 150,000 Inner Range systems have<br />

been installed in over 30 countries. Customers<br />

include hospitals and high-security units,<br />

colleges, distribution centres, pharmaceutical<br />

companies, government and critical national<br />

infrastructure sites.<br />

34


The intelligent video analytics module for real-time control of PTZ<br />

cameras. It automatically detects and tracks moving objects<br />

within the surveillance area.


Register for regular<br />

updates, free-of-charge!<br />

Benchmark E-News<br />

Benchmark is the security<br />

industry’s only magazine<br />

that targets security<br />

installers and system<br />

integrators who are<br />

delivering bespoke and<br />

innovative solutions.<br />

Written to help those who<br />

are designing, specifying<br />

and installing best-ofbreed<br />

systems,<br />

Benchmark helps its<br />

engineer-based<br />

readership by seeking out<br />

the most flexible and<br />

effective smart solutions.<br />

Every week Benchmark sends<br />

registered readers e-mail-based<br />

content including new<br />

independent tests and technology<br />

assessments, informative articles,<br />

news and technical bulletins to<br />

ensure you are kept up to date.<br />

Registration to receive<br />

Benchmark’s E-News service is<br />

free-of-charge and ensures you<br />

stay ahead of the crowd by having<br />

access to the latest industry<br />

information. Because the<br />

dedicated Benchmark team<br />

generate all of the editorial<br />

content, you can read tests and<br />

assessments that simply are not<br />

available elsewhere.<br />

Visit www.benchmarkmagazine.com<br />

today and sign up<br />

36


much more than a PSIM<br />

Physical Security Information Management<br />

The technology agnostic platform that really<br />

understands what your end user needs.<br />

Mix & Match Monitoring Interact<br />

Easily combine all<br />

your Security and<br />

Information Systems.<br />

Free yourself from<br />

Brand dependence<br />

and start correlating<br />

activities and events.<br />

Accurate monitoring<br />

and real-time analysis<br />

in ways you never<br />

thought possible!<br />

Have the ability to<br />

rapidly take informed<br />

and data-driven<br />

actions.<br />

From alerts and<br />

warnings to statistical<br />

data, the information<br />

that really matters,<br />

will appear instantly,<br />

making it easier to<br />

take action.<br />

Co-funded by:<br />

www.cosmonautasoftware.com


ADVERTISEMENT FEATURE<br />

Interested in further<br />

information? Get in touch<br />

with the MOBOTIX Sales<br />

Team via sales@mobotix.com<br />

The MOBOTIX Mx6 2nd<br />

Generation Platform<br />

Mx6 cameras use a video security and information systems offer<br />

new, more powerful excellent quality at highly affordable prices.<br />

CPU that delivers up Despite their extremely low system costs,<br />

to twice as many images per the indoor cameras feature all coveted<br />

second – at the same<br />

MOBOTIX functions, such as hemispheric<br />

resolution. For example, technology. Since distances are shorter<br />

they deliver up to 34 frames indoors, a hemispheric video system with a<br />

per second in full HD. This fisheye lens and 360° all-round view (ceiling<br />

allows for better capture of installation) or 180° panorama view (wall<br />

quick movements. The installation) is often the most efficient<br />

camera line is not only solution for indoor surveillance.<br />

faster, but also has more MOBOTIX cameras can be configured and<br />

capacity for software<br />

operated via PC, tablet or smartphone browser<br />

applications such as 3D without additional software. Thanks to optional<br />

motion analysis and license audio equipment, all four indoor variants<br />

plate capture in the camera. support twoway communication and can be<br />

The MOBOTIX Mx6 2nd recorded in an encrypted way to the internal SD<br />

Generation Platform is card. The cameras also include intelligent video<br />

offered with integrated analysis for statistics on objects and people,<br />

MxBus functionality which is heat maps and behavioural detection.<br />

based on an extended camera board. This MOBOTIX provides a cuttingedge solution for<br />

two-wire cable system developed by MOBOTIX nearly all video applications.<br />

is encrypted against cyberattacks and<br />

Thermal cameras are effective and<br />

expands camera functions by including<br />

affordable, offering high-calibre imaging<br />

practical additional MOBOTIX modules such technology in a modular dual camera system.<br />

as the MX-GPS-Box, a reliable time server for Complement perimeter protection and fire<br />

a complete video system.<br />

prevention solutions with far superior<br />

Outdoor cameras are robust, durable and technology. The weatherproof MOBOTIX<br />

multifunctional, offering weatherproof<br />

thermal cameras detect and register objects<br />

complete IP video systems for everyone who and people using a thermal signature, even in<br />

wants more than just standard solutions. total darkness at a distance of over 100<br />

From Antarctica to the swamps of Florida, metres. Importantly, thermal cameras<br />

MOBOTIX cameras are known for their<br />

safeguard privacy.<br />

reliability, even under harsh environmental The thermal cameras are based on the M16<br />

conditions, and prove it each and every day. and S16 series and can be complemented by a<br />

Thanks to their lack of mechanical moving high-resolution image sensor module. These<br />

parts and unique, multifunctional design, thermal cameras also take on the intelligent<br />

MOBOTIX outdoor cameras require no<br />

MOBOTIX video functions. Objects are<br />

additional heating or cooling at temperatures detected through the MxActivitySensor with<br />

from -30°C to +60°C (-22°F to 140°F). Their accuracy. MOBOTIX thermal cameras detect<br />

maintenance-free, fibre-glass reinforced targets as long as the temperature in the<br />

housing also protects against extremely high defined exposure window deviates from the<br />

humidity levels (non-condensing), corrosion, standard range. They are also effective in<br />

pollutants and direct sunlight.<br />

detecting life-threatening heat sources.<br />

Powered with standard PoE, MOBOTIX video<br />

systems deliver ultimate energy efficiency. The MOBOTIX Cactus Concept<br />

Special Moonlight image sensors, modular MOBOTIX developed the cactus concept for a<br />

day and night dual camera technology and reliable protection of end-to-end video<br />

intelligent exposure control reduce power systems. Protecing against hacker attacks, the<br />

consumption by enabling high-quality video intelligent video system is ready to go, but<br />

recording under even very poor light<br />

can also stand up to the ever-evolving<br />

conditions - without any additional lighting. challenges of our world. This ensures that<br />

With the indoor cameras, the details make your data stays where it is supposed to be –<br />

all the difference. Discreet, multi-functional and nowhere else.<br />

38


SiX<br />

SiX: an essential event for<br />

integrators and installers<br />

For many system integrators and security<br />

installers, the future of the security<br />

industry is dependent upon the delivery<br />

of enhanced flexibility. Increasingly, end users<br />

are seeking features and functionality which<br />

fits with their vision of a smarter future. As a<br />

result, intelligent technologies which provide<br />

advanced capabilities, scalable systems and<br />

bespoke solutions are not just expected; they<br />

are demanded by many businesses and<br />

organisations.<br />

Today’s technologies allow integrators and<br />

installers to not only deliver higher than ever<br />

levels of security and protection to businesses<br />

and organisations, but also enable them to<br />

offer a high level of benefits and added value<br />

which create business efficiencies. By<br />

ensuring end users enjoy a greater return on<br />

investment, integrators and installers taking a<br />

smart approach to business can enjoy an<br />

increased willingness by their customers to<br />

invest in smarter systems and solutions.<br />

Demand for smart and more efficient<br />

systems is high, and everyday there are more<br />

customers seeking such solutions. With many<br />

of the new and emerging technologies having<br />

a significant impact on the security arena, the<br />

flexibility and scalability of systems is<br />

constantly being enhanced. Security is not<br />

just about reducing the risk of crime. It now<br />

includes provision of a range of benefits such<br />

as compliance, asset management, building<br />

control, business intelligence and duty of care<br />

monitoring.<br />

It is vital that system integrators and<br />

security installers realise the value in these<br />

systems and ensure they offer solutions that<br />

meet customer expectations. Developments<br />

in other technology-based sectors are raising<br />

the bar in terms of performance, and end<br />

users expect the same from security.<br />

Attending Six in Manchester later this year<br />

will enable integrators and installers to<br />

network with innovative, market-leading<br />

manufacturers and service providers. SiX<br />

SiX<br />

19<br />

On 5-6 November 2019, SiX, an event specifically<br />

targeted at system integrators and security<br />

installers interested in the design, delivery and<br />

implementation of smarter solutions will take place<br />

at Event City in Manchester. Given the rapidly<br />

evolving technological landscape in today’s security<br />

sector, and the emerging technologies which add<br />

value for end users, this event promises to link<br />

forward-thinking engineers with similarly minded<br />

manufacturers and service providers.<br />

will create the only event dedicated to the<br />

delivery of efficient and value-added<br />

solutions.<br />

The event will include a conference<br />

programme, hands-on sessions and the<br />

ability to meet with manufacturers and<br />

service providers to discuss technology,<br />

implementations, integrations and other<br />

needs when creating and delivering best-ofbreed<br />

security solutions. Registration to<br />

attend is free-of-charge.<br />

2 November 5/6<br />

For event registration, visit: sixevent.co.uk<br />

39


SMART SOLUTIONS<br />

Increasing RoI with Energy<br />

Management<br />

For many end users, the benefit of implementing a smart<br />

solution is a boost to the overall return on investment.<br />

While crime prevention is the ultimate goal, any additional<br />

benefits from the system which introduce efficiencies can<br />

help with regards to authorising the contract.<br />

In the past, there was a lot of talk about the<br />

return on investment (RoI) of security<br />

solutions. However, it was difficult to<br />

ascertain a true sense of the tangible RoI<br />

because losses due to crime are not a<br />

constant, nor are they easily quantifiable.<br />

With today’s smart systems, things are<br />

somewhat different. Because the systems not<br />

only offer protection, but can also deliver a<br />

wide range of everyday efficiencies, the RoI<br />

can now be proven in many use-cases.<br />

By implementing a technology-agnostic<br />

software platform, integrators and installers<br />

can deliver a seamlessly integrated GUI which<br />

not only provides intuitive and unified control<br />

over all the elements of the security system,<br />

but can also provide control and management<br />

of peripheral systems.<br />

Too often, users only interact with a<br />

security system when something negative<br />

happens. Where smart building control is<br />

added, customers use the system on a daily<br />

basis, enjoying the realisation of business<br />

efficiencies. This not only eliminates the<br />

‘grudge purchase’ mentality, but delivers a<br />

genuine return on investment.<br />

One example of this can be seen from a<br />

University in Europe. The University supports<br />

tens of thousands of users across its campus,<br />

with around 80 buildings across numerous<br />

locations. With a duty of care to students and<br />

staff, a significant investment was made into a<br />

security solution. This incorporates<br />

approximately 600 doors protected by access<br />

control, linked with more than 200 video<br />

surveillance cameras.<br />

When the system was designed, the main<br />

objective was to ensure the security control<br />

room operators could access all elements of<br />

the security system as a unified solution.<br />

However, because of the scale of the site, it<br />

also requirements relating to energy and<br />

utility management.<br />

The university management wanted to<br />

implement a degree of monitoring and control<br />

over electricity, gas and water consumption,<br />

as usage figures were high. The best solution<br />

was to integrate relevant management<br />

systems into the security solution. This was<br />

achieved using COSMO PSIM+.<br />

To deliver seamless integration of the<br />

security and energy management systems,<br />

COSMO PSIM+ allowed the relevant<br />

connectivity as it is an API-based technologyagnostic<br />

solution. The single intuitive GUI<br />

ensured that the energy management and<br />

maintenance teams could easily access realtime,<br />

accurate status information about the<br />

systems, whenever necessary.<br />

The real-time monitoring software brings<br />

together data from the complete security<br />

system, as well as from energy monitoring<br />

and operational systems in a single place. The<br />

customisable interface means COSMO PSIM+<br />

delivers an easy-to-use interactive experience<br />

for the customer, providing key features such<br />

as remote access and monitoring with full<br />

control of the site’s existing systems. As a<br />

result, the university management team has<br />

maximised its RoI on the security investment.<br />

Next Month<br />

How the COSMO PSIM+ solution can<br />

create cost-savings for the end user.<br />

40


FASTER INSTALLS.<br />

LESS WORK.<br />

IDIS<br />

reduces time and cost effectively with rapid installation<br />

With guaranteed interoperability and performance in a true plug-and-play total solution, IDIS cameras, NVRs, network<br />

equipment and client software install quickly with minimal training, keeping your margins high and customers delighted.<br />

IDIS<br />

Europe<br />

1000 Great West Road, Brentford, Middlesex, TW8 9HH, United Kingdom<br />

T +44 (0)203 657 5678 F +44 (0)203 697 9360 E uksales@idisglobal.com<br />

www.idisglobal.com


ADVERTISEMENT FEATURE<br />

Please contact our team<br />

for more information at<br />

marketing@optex-europe.com<br />

or call +44(0) 1628 631 000<br />

Upgrade your monitored alarm<br />

system to visual verification<br />

Whereas the monitoring of intruder alarms<br />

through an Alarm Receiving Centre (ARC) is<br />

generally accepted best practice, CCTV<br />

monitoring remains slow to take hold. Part of the<br />

problem has come down to money; larger sites such<br />

as major depots and warehouses with constant<br />

activity 24/7 can clearly benefit from a fully<br />

functioning CCTV system monitored through a<br />

dedicated Remote Video Response Centre (RVRC).<br />

Smaller sites, while they would benefit from visually<br />

verified alarms, would struggle to justify the<br />

investment of a full-scale RVRC solution.<br />

A similar argument can be made for the ARCs<br />

themselves. They are set up specifically to monitor<br />

intruder alarms, and they do it well. For an ARC to<br />

become an RVRC is simply not practical; not, at<br />

least, without a significant outlay in capital. But<br />

what if there was a simple technology that could act<br />

as the ‘Bridge’ between intruder and CCTV<br />

technologies, and that would enable the ARC to<br />

visually verify alarms without the need for any<br />

substantial investment? This is a challenge that is<br />

being addressed with the new OPTEX Bridge<br />

powered by CHeKT.<br />

The OPTEX Bridge, powered by CHeKT, is a<br />

hardware and software solution that takes separate<br />

intruder and CCTV technologies installed on the<br />

same site, but acting independently, and ‘bridges’<br />

them to create one, seamless, integrated monitored<br />

solution. Intruder alarms can now effectively be<br />

visually verified, without impacting the integrity of<br />

the technology installed, or its Grade.<br />

When an alarm occurs, a signal is<br />

sent to the ARC whose operator can<br />

view images pre and post the alarm<br />

event via a dedicated portal to<br />

determine whether the alarm is<br />

genuine. Camera locations can be<br />

overlaid with a map of detection<br />

zones, thus helping the ARC<br />

operator to quickly and easily ‘see’<br />

where the incident has occurred<br />

and take the appropriate action.<br />

Images can also be sent direct to<br />

the customer’s handheld device for<br />

further verification if, for example,<br />

the alarm is genuine, but the<br />

‘intruder’ is known to the customer<br />

or has a legitimate reason for being<br />

on site.<br />

The OPTEX Bridge provides a<br />

complete audit trail of activity, and<br />

can detect when a camera is not<br />

working (i.e. when it has dropped<br />

out of the network), and report the<br />

fault, thus ensuring security is not<br />

compromised. It can also<br />

communicate with the ARC in the<br />

appropriate ‘language’, regardless<br />

of the make or manufacture of the<br />

technology installed, or the<br />

protocols with which it operates. It will, in effect,<br />

work with virtually any intruder alarm technology<br />

and any ONVIF camera to deliver one seamless<br />

visual verification solution. The ARC software needs<br />

to be compatible, and many of the major ARC<br />

software platforms are already integrated.<br />

The advantages to the ARC are obvious: it gives<br />

them the ability to provide a visual verification<br />

service to residential and commercial sites without<br />

a substantial investment in time or money; the<br />

Bridge can be installed and working within the hour.<br />

Operationally there are benefits too, for the Cloudhosted<br />

platform allows a much stronger<br />

collaboration between the ARCs and the<br />

home/business owners by having the ability to<br />

share video clips to confirm the alarms (as<br />

described above) while respecting any privacy<br />

guidelines.<br />

There are advantages too for the customers and<br />

installers. For the customer, it means realising the<br />

true potential of technology which is already<br />

installed, turning an essentially ‘reactive’ system<br />

into a ‘proactive’ solution. By installing the OPTEX<br />

Bridge, sensors and cameras combine to deliver a<br />

reliable and effective early warning solution,<br />

detecting and reacting to an intrusion before a<br />

potentially damaging and costly event has occurred.<br />

It is also invaluable to those who may have lost<br />

their URN; a visually verified alarm will put them<br />

back on police response. For the installer,<br />

meanwhile, it provides another revenue stream and<br />

ability to add further value to the customer sale.<br />

42


NETWORK ZONE<br />

NETWORK ZONE:<br />

Selecting a Switch<br />

The benefits of networked security<br />

systems – whether video, access control,<br />

perimeter protection or intruder alarm –<br />

are manifold, and have been well<br />

documented. Technology is moving rapidly,<br />

and end user requirements currently change<br />

quickly as new options come to market. The<br />

rise of IoT connectivity has also focused<br />

minds on IP-connectivity.<br />

For those seeking advanced and smart<br />

solutions, there is something of a constantly<br />

evolving landscape. For critical solutions<br />

where continuity is key, the selection of<br />

appropriate infrastructure, and especially of<br />

switches, is of paramount importance when<br />

specifying a system.<br />

Selection of an inappropriate switch can<br />

create a variety of problems. These can vary<br />

from dropped connections, frozen data<br />

streams and poor performance though to<br />

missed recordings or events, undiscoverable<br />

devices and even total system failures. Where<br />

issues are created, these problems may be<br />

sporadic, which is a headache for engineers<br />

when troubleshooting in the field.<br />

Integrators and installers must ensure their<br />

selected switches are capable of delivering<br />

the functionality and reliability required, and<br />

increasingly can allow the implementation of<br />

cybersecure configurations.<br />

Basic requirements<br />

Before considering the specification of a<br />

switch, it is important to understand the basic<br />

requirements of the security system. How<br />

many devices will be deployed and how will<br />

they be used? Will the system be continuously<br />

Networked systems are the first choice of end<br />

users because of the flexibility and advanced<br />

functionality on offer. Whilst integrators and<br />

installers working in this market are competent in<br />

specifying security devices, is enough consideration<br />

given to the deployed switches?<br />

operating or will it be triggered by events,<br />

actions or transactions? Will certain devices<br />

be inactive during specified periods? All of<br />

these details will impact on the switch<br />

selection. As smart technologies expand the<br />

possibilities from modern security stystems,<br />

integrators and installers should factor in<br />

additional capacity for the inevitable system<br />

expansions and upgrades.<br />

The bit-rate allocation must be calculated to<br />

ensure the correct performance is delivered,<br />

and allowances should be made if this will<br />

change on alarm or during events. Each device<br />

should be benchmarked to ascertain<br />

performance at the specified bit-rate.<br />

The goal should never be to try to force the<br />

system to come in under a pre-defined bit-rate<br />

limit; rather, the best approach is to calculate<br />

what will be needed for consistent<br />

performance and ensure there is some<br />

additional capacity to cope with spikes in<br />

load.<br />

The many stages of designing an IP-based<br />

solution start with security requirements, and<br />

from this device requirements are established.<br />

Then, by using both the security and device<br />

requirements, data transmission details can<br />

43


NETWORK ZONE<br />

be established. These should include<br />

transmission type and the required<br />

bandwidth. Only once this is done can switch<br />

selection be considered.<br />

Layer 2 or Layer 3?<br />

One of the first questions to consider is<br />

whether you require a Layer 2 or a Layer 3<br />

switch. It is not uncommon for Layer 3<br />

switches to be automatically specified<br />

because of an assumption that they must be<br />

superior. The reference is to the OSI seven<br />

layers of networking, in which Layer 2 is the<br />

distribution layer and Layer 3 is the<br />

networking layer. This in itself describes the<br />

fundamental difference between the two.<br />

A Layer 2 switch works in a single subnet<br />

and ‘learns’ the MAC addresses of devices<br />

connected to it. For example, when a VMS<br />

requests video from a specified camera, the<br />

switch knows where that camera is on the<br />

network by its MAC address. Because all the<br />

devices reside on the same network segment,<br />

the switch simply distributes the data packets<br />

based on this information.<br />

A Layer 3 switch differs in that it can route<br />

data packets between different subnets, as it<br />

uses the IP address rather than the MAC<br />

address of a device. While both types of<br />

switch allow the creation of VLANs, a Level 2<br />

switch will not allow connection between two<br />

VLANs but a Layer 3 switch will.<br />

A VLAN (Virtual Local Area Network) is a<br />

way of dividing and segmenting network<br />

traffic within a switch. Some switches are<br />

available with a simple VLAN implementation<br />

feature, allowing the network to partition<br />

different types of traffic. This ensures that<br />

bandwidth is maintained and manages<br />

potential problems which may occur if some<br />

data streams consume all available network<br />

throughput.<br />

A VLAN enables the security network to<br />

remain independent of other network<br />

segments without affecting performance, even<br />

though all data is passing through the same<br />

switches.<br />

Managed or Unmanaged?<br />

The next choice is whether to deploy<br />

unmanaged or managed switches.<br />

Unmanaged devices are typically ‘plug-andplay’<br />

and treat all transmitted data equally. As<br />

such, all data streams are ‘fighting’ for<br />

bandwidth. A managed switch can allow<br />

Quality of Service (QoS) protocols to be<br />

respected. Some unmanaged switches claim<br />

to honour priority tags, but it is best to use a<br />

switch which supports QoS if you need to<br />

prioritise certain data streams.<br />

QoS allows the integrator or installer to set<br />

configurations for specific ports. This ensures<br />

that data being transmitted from critical<br />

devices is prioritised as more important than<br />

data streams from other devices. With the<br />

growth of IoT and peripheral add-ons to<br />

security systems, QoS becomes a more<br />

desirable feature.<br />

Unicast or Multicast?<br />

When specifying a switch, it is important to<br />

consider what transmission type will be used:<br />

Unicast or Multicast? Unicast traffic creates a<br />

one-to-one transmission. If multiple clients<br />

require data, then the relevant data is sent<br />

multiple times which impacts negatively on<br />

bandwidth usage.<br />

Multicast traffic effectively ‘publishes’ the<br />

data, creating a one-to-many transmission.<br />

Multicasting switches must support IGMP<br />

which manages clients to receive data.<br />

IGMP support includes an IGMP Querier<br />

that determines which clients belong to which<br />

groups, and an IGMP Snooper which monitors<br />

the ports on the hardware to determine which<br />

require the data. This allows the switch to<br />

only send data to those ports, reducing<br />

network load. With IPv6, IGMP is replaced by<br />

Multicast Listener<br />

Discovery (MLD).<br />

44


Stay Untouched.<br />

And Secure Your Security.<br />

www.cactusconcept.com<br />

At MOBOTIX, we have developed the unique cactus concept for a reliable and complete protection of endto-end<br />

video security systems. Protect yourself against serious hacker attacks – with an intelligent video<br />

system that is ready to go, but can also stand up to the ever evolving challenges of our world.<br />

Stay untouched with MOBOTIX!


NETWORK ZONE<br />

Switch capacity<br />

Determination of the required switch capacity<br />

requires information about a number of<br />

characteristics: number and speed of ports,<br />

uplink requirements, throughput and<br />

backplane capacity.<br />

The number of ports is fairly selfexplanatory.<br />

Each device to be connected<br />

requires an individual port. Ports will also be<br />

required for uplinks to servers or management<br />

devices.<br />

The transmission speed of the ports is<br />

typically a choice between Fast Ethernet<br />

(10/100Mbps) and Gigabit Ethernet (GigE or<br />

1000Mbps). This will depend upon the NICs<br />

(network interface cards) that are embedded<br />

in the devices making up the system.<br />

However, the need to ‘uplink’ to a server must<br />

also be considered.<br />

When specifying a switch, you must<br />

consider both the speed of the data traffic<br />

generated from the field devices coming into<br />

the switch, and the speed of the data coming<br />

out of it to the server or management device.<br />

This latter element is the uplink.<br />

To reduce the chances of data bottlenecks,<br />

uplink ports should support at least 10 times<br />

the speed of the incoming traffic. In simple<br />

terms, if a switch is deployed with 100Mbps<br />

links from field devices, a 1000Mbps uplink<br />

would be required for transmission to the<br />

server.<br />

Fast Ethernet switches are available with<br />

Gigabit Ethernet ports for uplinks. If these are<br />

not sufficient then a Gigabit Ethernet switch<br />

will be required.<br />

The backplane capacity of a switch must be<br />

considered alongside throughput. Network<br />

ports will only achieve speeds relative to how<br />

fast the switch can process data. With low<br />

cost switches, it is not unusual to discover the<br />

devices do not have the backplane speed to<br />

support all ports at full load.<br />

The switch needs to have a backplane<br />

which has the capacity to allow all the ports to<br />

simultaneously operate at full load. Because<br />

of full communication between switch blades,<br />

the common approach is that the switch<br />

backplane should be equivalent to the<br />

number of ports multiplied by the port full<br />

speed, multiplied by two.<br />

Therefore, a four-port switch with port<br />

capacities of 1Gbps would require a backplane<br />

of 8Gbps to be non-blocking.<br />

Other considerations<br />

Often a switch may be located in a hostile or<br />

harsh environment. If this is the case, always<br />

ensure that the switch is hardened and can<br />

cope with extreme environmental conditions.<br />

Power over Ethernet is a significant benefit<br />

for integrators and installers, and is one<br />

genuine cost-saving when deploying a<br />

networked platform. If selecting a PoE switch<br />

you must consider its power budget. PoE<br />

(802.3af) provides up to 15.4W per port, with<br />

up to 12.9W being assured as available. PoE+<br />

(802.3at) provides up to 30W, with up to 25W<br />

being assured as available.<br />

The security market is now seeing switches<br />

available which support PoE++ (802.3bt). This<br />

provides up to 60W per port.<br />

To determine the specification of a PoEenabled<br />

switch, you will need to know the<br />

wattage required by each field device. The<br />

total wattage can be calculated across all<br />

devices connected to the switch, and the PoE<br />

budget must exceed the total requirement.<br />

Also check that the ports can provide the<br />

connected devices with the power they need.<br />

In summary<br />

The selection of a switch is dependent upon<br />

establishing the needs of each application.<br />

Selecting the wrong switch can only lead to a<br />

bad end user experience, no matter what<br />

security solution is installed.<br />

There are manufacturers who specialise in<br />

switches for security, and these are worth<br />

consulting as they have a good working<br />

knowledge of what is required in a security<br />

application. While IT-centric switches will do<br />

the job (if properly specified), integrators and<br />

installers may find the levels of support on<br />

offer lack the specialist knowledge which<br />

security-biased companies can provide.<br />

46


CathexisVision<br />

Video Surveillance Management Solutions<br />

A proven world-class<br />

Video Management System<br />

Real return on surveillance investment<br />

CathexisVision is a globally-recognised Video<br />

Surveillance Management System. It offers<br />

users the ability to make key-decisions based<br />

on intelligent information processing, and to<br />

take automated actions in the control room or<br />

command centre environment. This provides<br />

enhanced effectiveness and efficiency, and a<br />

superior return on surveillance investment.<br />

Open Architecture Video Surveillance<br />

Management Platform<br />

Enterprise, Multi-Site Architecture<br />

Sophisticated Command Centre Environment<br />

Advanced Video Analytics<br />

Advanced Video Search<br />

Adjacent Camera Mapping<br />

Third-Party Integrations<br />

Automatic Number Plate Recognition<br />

WINNER<br />

Video Surveillance Software<br />

Time: 20 16-12-01 16:00<br />

License plate: 41424<br />

Place of issue: Abu Dhabi<br />

Group: Blacklisted<br />

Driver name: Suspect<br />

Company: Company X<br />

Powerful, Feature Rich and Fully Integrated Surveillance Software<br />

info@cathexisvideo.com | www.cathexisvideo.com


ADVERTISEMENT FEATURE<br />

NVT Phybridge EC Extender Kits<br />

Benchmark Magazine has selected the<br />

NVT Phybridge EC Extender Kits as a<br />

finalist for the 2019 Benchmark<br />

Innovation Awards. The EC Extender Kits build<br />

on the continued successes of the CLEER<br />

family of coax-to-IP enabling PoE (Power over<br />

Ethernet) solutions. The CLEER family of<br />

switches and extenders allow organisations to<br />

simplify and accelerate their digital<br />

transformation by enabling IP endpoints over<br />

any new or existing coax-based infrastructure.<br />

The CLEER family’s EC-Base Extender, when<br />

paired with the EC-Link+ or EC4 Adapter,<br />

creates a robust, single-port extender solution<br />

leveraging the downlink port of any standard<br />

PoE switch. In addition to being sold<br />

separately, the EC-Base Extender is available<br />

with an EC-Link+ or EC4 Adapter to make up<br />

the recognised EC Extender Kits.<br />

The EC-Link+ Extender Kit extends the<br />

reach of a standard PoE switch; enabling<br />

one IP endpoint using a single long-run coax<br />

cable up to 1,800 metrres - 18 times farther<br />

than a traditional solution. The EC4 Extender<br />

Kit supports up to 4 IP endpoints using a<br />

single long-run coax cable up to 915 metres -<br />

9 times farther than a traditional solution.<br />

An EC Extender Kit explainer video is<br />

available at:<br />

https://www.nvtphybridge.com/benchmarkinnovation<br />

‘We take great pride in the quality of our<br />

products; putting them through extensive<br />

testing to ensure each and every unit<br />

performs above and beyond the expectations<br />

of our customers,’ stated John Croce, CEO of<br />

NVT Phybridge. ‘We are honoured to be<br />

recognised by Benchmark for innovations that<br />

exceed industry standards.’<br />

The NVT Phybridge CLEER family of<br />

products are built with patented<br />

SmartPathPoE technology, helping<br />

organisations leverage Modern LAN Principles<br />

to establish simple and cybersecure<br />

connections from endpoint to application.<br />

Organisations are leveraging the EC<br />

Extender Kits to significantly reduce<br />

infrastructure costs and deployment<br />

timelines. The simple plug-and-play solution<br />

eliminates operational disruption and network<br />

downtime during implementation; ensuring<br />

minimal impact to the business.<br />

Customers all over the world, including a<br />

national security agency and Spanish retail<br />

giant El Corte Ingles, have already leveraged<br />

the NVT Phybridge CLEER family of coax-to-IP<br />

enabling solutions to achieve a simple, secure<br />

and cost-effective modernisation to IP and the<br />

Internet of Things.<br />

Learn more at https://www.nvtphybridge.com/benchmark-innovation<br />

48


INNOVATION FOCUS<br />

INNOVATION FOCUS<br />

Benchmark champions the use of innovative and smart solutions to deliver added<br />

value and advanced benefits to end users. Here we round up some of the innovations<br />

which have caught the eye of our editorial team.<br />

TAKEX PIR-T40NAM<br />

Bosch Project Assistant App<br />

InfiNet InfiLINK 2x2<br />

FLIR Saros<br />

SAST IoT Platform<br />

OPTEX LiDAR Enhancements<br />

TDSi GARDiS<br />

HGH Cyclope Hypervisor<br />

3xLOGIC Vigil VMS<br />

Reconeyez PIR Cameras<br />

49


INNOVATION FOCUS<br />

TAKEX PIR-T40NAM<br />

Accurate and effective<br />

detection remains a<br />

cornerstone of security<br />

solutions. Modern products<br />

deliver increased catch<br />

performance, high levels of<br />

reliability and increased<br />

flexibility. One example is the<br />

PIR-T40NAM from TAKEX, an<br />

external PIR detector with a<br />

range of up to 40 metres.<br />

External detection remains a useful<br />

element inany security solution. Whether<br />

detecting intruderss at the perimeter or<br />

triggering alarms and actions before criminals<br />

can enter a building, providing the earliest<br />

possible warning remains a powerful tool<br />

when fighting crime, allowing action to be<br />

taken before losses or damage occurs.<br />

External detection also offers a host of<br />

other benefits. The devices are used to trigger<br />

actions on surveillance systems or as a part of<br />

smart solutions. With the increased flexibility<br />

of control panels and software-based security<br />

management, credible external detection<br />

devices offer a wealth of possibilities.<br />

The PIR-T40NAM is an external sensor with<br />

a range of 40 metres. It can be used for video<br />

switching and intruder detection applications.<br />

The sensor boasts four selectable<br />

operational modes which allow flexibility<br />

when it comes to positioning the unit. With a<br />

mounting height range of between two and six<br />

metres, it allows freedom when finalising<br />

device locations. To compensate for such a<br />

wide variance in mounting height, the<br />

detector includes modes for low, middle or<br />

high position, and high density.<br />

The sensor delivers vertical curtain<br />

protection. Other features include triple mirror<br />

optics and intelligent signal processing,<br />

ensuring the sensor can accurately and<br />

reliably detect intrusions whilst rejecting<br />

nuisance activations.<br />

As the product designation indicates, the<br />

PIR-T40NAM offers anti-masking protection.<br />

Features have been included to simplify<br />

installation and set-up, which is important<br />

with long-range detection devices, especially<br />

for an engineer working alone.<br />

In Low Position mode, the sensor can be<br />

mounted at a height of 2–2.5 metres,<br />

delivering up to 40 metres coverage. Middle<br />

Position mode reduces the range to 35<br />

metres, but allows a mounting height of<br />

2.5–3.5 metres. The High Position mode<br />

reduces the coverage to 30 metres, but allows<br />

for mounting heights of 3.5–4 metres. A high<br />

position helps eliminate blind spots.<br />

Finally, the High Density mode allows a<br />

mounting position of 2–6 metres. The overall<br />

coverage is extended to 45 metres, but pet<br />

immunity is non-operational. The detection<br />

head can be rotated through 90 degrees.<br />

Aligning long-range detectors can be timeconsuming.<br />

However, the PIR-T40NAM makes<br />

use of precise detection area adjustment<br />

achieved by projecting coloured LEDs onto the<br />

surface of each mirror, allowing fine-tuning.<br />

A geared mirror array allows detection<br />

patterns to be optimised based on mounting<br />

height and operation mode.<br />

50


INNOVATION FOCUS<br />

Bosch Project Assistant App<br />

The commissioning and<br />

handover of a system can<br />

involve a lot of paperwork and<br />

documentation, and for some<br />

integrators and installers it is<br />

a task they don’t relish. Bosch<br />

claims to have an answer with<br />

its Project Assistant App,<br />

designed to simplify many<br />

administrative tasks.<br />

The delivery of documentation is an<br />

important part of system hand-over, but<br />

its not something that most integrators<br />

and installers relish. Any tool that makes the<br />

process simpler and quicker has to be<br />

welcomed.<br />

In an age of digital communications and<br />

data sharing, the generation of plans, reports<br />

and system configuration details can be, to a<br />

large extent, automated. For those delivering<br />

video surveillance solutions, the Project<br />

Assistant App from Bosch Building<br />

Technologies can help and cuts down time on<br />

site.<br />

Bosch Building Technologies has developed<br />

a smart software solution designed to assist<br />

system integrators and security installers: the<br />

Project Assistant App. Previously, the<br />

planning, configuration, installation and<br />

documenting of a video security project<br />

involved a range of different (and often<br />

separate) tools and extensive man-hours to<br />

complete, making it difficult for system<br />

integrators to manage and keep track of<br />

various projects during each phase through to<br />

the final reporting.<br />

With the Project Assistant App,<br />

transparency and efficiency can be applied to<br />

every part of a video-based security project.<br />

From set-up of secure passwords for cameras,<br />

through the assignment of IP addresses, the<br />

pre-configuration of cameras, installation and<br />

configuration on-site, and delivering details of<br />

the installation to the end-user, the process<br />

can be time consuming.<br />

Simple errors and poor communications<br />

during the commissioning process add time<br />

and costs, and can adversely impact on a<br />

clients’ satisfaction with the full security<br />

system.<br />

Project set-up and pre-configuration can<br />

start in the office, before the physical<br />

equipment is in place. Using the app and<br />

project plans, IP addresses and passwords<br />

can be entered prior to attending site. This<br />

can be done on a per camera basis, or<br />

multiple devices can be managed at once.<br />

The Project Assistant automatically enters<br />

the information for each device, without the<br />

need for the hardware to be physically<br />

present. Creating a set of virtual devices<br />

within the app eliminates the need for<br />

unboxing and re-boxing of products for<br />

labelling and pre-configuration.<br />

Bosch claims the app delivers significant<br />

time savings of up to 30 per cent.<br />

Once the devices are physically installed<br />

and connected to a network, the Project<br />

Assistant is also connected to the network via<br />

Wi-Fi or a physical link. By scanning QR codes<br />

on the cameras, the MAC address is identified<br />

and the camera is assigned to a specific<br />

virtual camera.<br />

The Project Assistant makes it possible for<br />

every camera in the project to be contacted,<br />

checked and reported in a matter of seconds,<br />

producing a final client-ready report complete<br />

with field-of-view snapshots.<br />

51


INNOVATION FOCUS<br />

InfiNet InfiLINK 2x2<br />

Advances in communications infrastructure enable<br />

smart security systems to use wireless connectivity<br />

in a point-to-point capacity. As a result, the<br />

implementation of wide area surveillance is<br />

becoming simpler and more cost effective. One<br />

such option is InfiNet’s InfiLINK 2x2.<br />

Wireless connectivity is something most<br />

end users use on a regular basis. They<br />

trust the technology and understand<br />

its benefits based on experience. For many,<br />

wireless connectivity is an expectation. While<br />

they may not have a full understanding of the<br />

issues surrounding the transmission of<br />

multiple high bitrate video streams, it is a<br />

hurdle if integrators and installers need to<br />

challenge those expectations.<br />

Wireless technology has become a<br />

cornerstone of many critical solutions in<br />

security and safety. High capacity links are<br />

available that can provide cost-effective<br />

transmission on campus-type sites or where<br />

‘last mile’ connectivity might prove to be too<br />

costly. In such applications, a growing number<br />

of options are available, and most require<br />

little or no telecoms training to install.<br />

One such option is InfiLINK 2X2 from InfiNet<br />

Wireless. InfiLINK 2X2 is a point-to-point<br />

wireless transmission solution, combining<br />

high-speed capabilities of<br />

up to 280Mbps<br />

throughput, with features<br />

as leading-edge radio<br />

protocols providing<br />

spectral efficiency and<br />

wireless transmissions<br />

over distances in excess<br />

of 90 kilometres.<br />

While the InfiLINK 2X2<br />

has an impressive range,<br />

that doesn’t mean it is<br />

limited to use in city<br />

centre applications. The<br />

wireless solution can be<br />

deployed by many<br />

organisations to provide<br />

Ethernet extensions, such<br />

as simple LAN-to-LAN<br />

connectivity, between two<br />

locations. These could be<br />

separate sites or<br />

buildings on a single site. The application<br />

becomes increasingly cost-effective is there is<br />

a need to cross an obstacle such as a road,<br />

railway or river.<br />

In its most advanced configuration, the<br />

InfiLINK 2x2 provides complete<br />

communications and transmission<br />

infrastructure, enabling businesses and<br />

organisations of various sizes to connect<br />

remote or satellite sites, allowing the<br />

simultaneous transmission of multi-protocol<br />

services such as video, alarm data, voice<br />

communications and other data.<br />

The solution is available in two options:<br />

InfiLINK 2x2 Pro and InfiLINK 2x2 Lite. The<br />

latter has restrictions on throughput which<br />

are governed by the software license. It also<br />

has some performance limitations and does<br />

not support power via PoE.<br />

The solution is available in 4.9–6GHz and<br />

6–6.4 GHz frequency bands and uses MIMO<br />

2x2 (Multiple Input; Multiple Output)<br />

technology. Software is upgradeable<br />

dependent upon licensing, which adds<br />

features and capacity. The solution offers 5,<br />

10, 20 and 40MHz channel widths.<br />

Other features include a gigabit Ethernet<br />

port, flexible uplink/downlink reallocations,<br />

line-of-sight and non-line-of-sight<br />

deployments and advanced Quality-of-Service<br />

(QoS) support. The manufacturer claims that<br />

the solution is an out-of-the-box plug and play<br />

option.<br />

52


INNOVATION FOCUS<br />

FLIR Saros<br />

The linking of multiple technologies to achieve<br />

superior performance is an approach well<br />

understood by integrators and installers<br />

looking to deliver high quality solutions.<br />

Often this involves configuring disparate<br />

devices to work in unison,but<br />

manufacturers now offer combined<br />

devices, such as the Saros range from FLIR<br />

When it comes to security applications,<br />

there is no one perfect technology. If<br />

such a thing existed, it would make<br />

everyone’s lives easier. As a result, while<br />

single technology solutions can offer a degree<br />

of risk mitigation, all have some degree of<br />

compromise. For a critical solution, any level<br />

of compromise can introduce vulnerabilities<br />

that potentially negate the protection on offer.<br />

Saros is a single device that combines a<br />

number of technologies to deliver a solution<br />

which maximises catch performance while<br />

minimising the level of compromise.<br />

Saros devices make use of high definition<br />

video cameras, thermal imaging cores,<br />

integral illuminators, intelligent video<br />

analytics, alarm inputs and outputs and twoway<br />

audio. This enables a high degree of<br />

flexibility and permits numerous combinations<br />

to be deployed, enhancing the level of<br />

protection on offer.<br />

The Saros range utilises its perimeter<br />

protection technologies to deliver accurate<br />

and actionable alarm notifications backed by<br />

verified alarm data. The devices include<br />

multiple Lepton thermal sensors, along with<br />

up to three HD1080p or 4K video modules,<br />

dependent upon the product specification.<br />

The units additionally incorporate IR and<br />

white light LED illuminators, with auto<br />

selection based upon the operating mode and<br />

site conditions.<br />

Both the video and thermal imaging<br />

streams incorporate advanced onboard<br />

analytics. These have the ability to<br />

differentiate between people and vehicles,<br />

ensuring alarm classifications are accurate.<br />

The Saros range enables users to<br />

implement reliable outdoor intrusion<br />

detection in a cost-effective manner by<br />

minimising equipment requirements and<br />

reducing false alarms.<br />

With the<br />

growing focus on<br />

cybersecurity, FLIR<br />

has ensured its Saros<br />

range incorporates<br />

cybersecure design and<br />

engineering to reduce the risk of<br />

remote security attacks. The devices<br />

incorporate end-to-end encryption for set-up,<br />

web connectivity and video stream<br />

transmission. The configurations eliminate the<br />

need for port-forwarding, and device<br />

configurations can be ‘locked down’ when the<br />

initial set-up is completed to deliver a high<br />

degree of tamper prevention.<br />

The Saros range includes six models. The<br />

DH-390 2TB and DH-390 8MP models feature<br />

a single HD1080p video sensor and a 4K UHD<br />

video sensor respectively. Both variants<br />

incorporate two thermal imaging sensors with<br />

a 320 x 120 pixel array with a 90 degree field<br />

of view.<br />

The MH-6180 4MP and MH-6180 16MP<br />

models feature dual HD1080p video sensors<br />

and 4K UHD video sensors respectively. Both<br />

variants incorporate two thermal imaging<br />

sensors with a 640 x 120 pixel array with a 180<br />

degree field of view.<br />

Finally, the MH-9270 6MP and MH-9270<br />

24MP cameras feature three HD1080p video<br />

sensors and 4K UHD video sensors<br />

respectively. Both variants incorporate six<br />

thermal imaging sensors with a 960 x 120<br />

pixel array with a 270 degree field of view.<br />

All devices include real-time video and<br />

backlight compensation. A 16GB SSD is used<br />

for edge storage.<br />

The video cameras use 3-9mm lenses with<br />

autofocus and motorised zoom.<br />

Saros delivers a range of complementary<br />

benefits while ensuring installations are<br />

simple and cost-effective.<br />

53


INNOVATION FOCUS<br />

SAST IoT Platform<br />

For forward-think integrators<br />

and installers, IoT is not a<br />

technology of the future.<br />

Today, many businesses and<br />

organisations have embraced<br />

IoT, and is using it to good<br />

effect. SAST seeks to link it<br />

with security-centric video<br />

surveillance technology.<br />

Many in security think IoT is a peripheral<br />

set of technologies, systems and<br />

devices which they can decide<br />

whether or not to embrace. This blinkered<br />

thinking is very far from the truth. A number of<br />

business es and organisations are reliant on<br />

IoT technology, so integrators and installers<br />

face a simple choice: if they want to win<br />

contracts, they have to integrate with IoT.<br />

The inertia IoT has gathered means, like it<br />

or not, it is increasingly becoming a part of<br />

the smart security sector. If the industry<br />

attempts to side-step its influence, it will<br />

quickly see business being lost to those who<br />

embrace IoT and deliver the benefits and<br />

added value it offers.<br />

Security and Safety Things (SAST), a spinoff<br />

from Robert Bosch, has announced its<br />

vision for a new IoT platform focused on the<br />

security video camera segment.SAST<br />

describes its project as a ‘global platform for<br />

the next generation of security cameras’. The<br />

start-up, which is a subsidiary of Bosch but<br />

operates as an independent business, has<br />

been created to harness the potential<br />

available from innovative IP-connected<br />

security cameras.<br />

Changes in the way surveillance is deployed<br />

includes an increase in internet connectivity<br />

and processing at the edge. Both of these are<br />

results of the increased use of next generation<br />

processing, advanced video compression and<br />

stream management. The impact is that edgebased<br />

video analytics are becoming<br />

increasingly viable for business applications.<br />

Within the evolving surveillance market,<br />

SAST claims specialised software applications<br />

will represent a significant growth segment,<br />

with accelerated implementations during the<br />

next five years.<br />

One of the drivers for growth will be<br />

enhanced processing power. This has already<br />

played a significant part in enabling the<br />

introduction of intelligence at the edge for<br />

video surveillance, and given the drive to<br />

implement even faster processing in the<br />

future, including increased use of GPUs and<br />

neuron chip sets, the smart functionalities will<br />

become more prevalent.<br />

Whilst the initial focus of the IoT platform<br />

willbe the video surveillance sector, the<br />

platform is being built to embrace open<br />

connectivity, and will be ready to support<br />

additional IoT systems.<br />

SAST has outlined four stages which it<br />

defines as core to the creation of its IoT<br />

ecosystem. These are a new camera OS, tools<br />

for developers, ready-to-use AI-enabled<br />

applications and an integrator portal.<br />

SAST intends to create a universal camera<br />

operating system (OS) based on the Android<br />

Open Source Project. A single OS will simplify<br />

tasks, as a single API and codec can be used.<br />

Developers and designers will be aided by a<br />

set of tools such as analytics and performance<br />

tests available via SAST, making use of<br />

common KPIs.<br />

An app store will present a front-end for the<br />

platform, enabling integrators and installers<br />

to download specific applications. Apps will<br />

be AI-based and tested for conformity.<br />

54


INNOVATION FOCUS<br />

OPTEX LiDAR<br />

Enhancements<br />

The rise of LiDAR detection is<br />

growing in the security<br />

systems sector, with an<br />

increasing number of<br />

integrators and installers<br />

embracing the accuracy and<br />

flexibility on offer. OPTEX has<br />

enhanced its long range RLS-<br />

3060 series via a new<br />

firmware upgrade which<br />

boosts performance.<br />

OPTEX, the manufacturer of detection<br />

solutions, has launched enhanced<br />

versions of the product firmware and<br />

configuration software for its REDSCAN RLS-<br />

3060 laser scanner series. The upgrades bring<br />

greater functionality to the existing models,<br />

ensuring that they offer advanced<br />

performance with additional flexibility for a<br />

variety of applications.<br />

Version 8.0 of the RLS-3060 series firmware<br />

and REDSCAN Manager feature a number of<br />

upgrades for the long-range, 190 degrees 2D<br />

LiDAR series. Both the RLS-3060L and RLS<br />

3060SH (the latter includes an integral heater<br />

for harsh environments) now offer more<br />

flexibility in managing dry contacts with the<br />

option to switch from normally open (N.O) to<br />

normally closed (N.C).<br />

The new firmware version also brings a<br />

number of features to the standard model 30<br />

metre radius RLS-3060L that were previously<br />

only available in the higher-end RLS-3060SH<br />

model. Four detection areas can now be<br />

independently adjusted on an analogue<br />

connection, while up to eight areas can be<br />

adjusted on an IP connection. The shape of<br />

the detection area can also be customised to<br />

better match the layout of the site. The Area<br />

Allocation or Masking function will enable<br />

users to precisely define a number of<br />

independent detection zones to allow for<br />

varied needs.<br />

Another feature which has been made<br />

available for the standard laser scanner model<br />

with the upgraded firmware is the<br />

Indoor/Outdoor Loitering Detection Mode.<br />

This function detects loitering and similar<br />

suspicious behaviour by monitoring people<br />

and objects, generating an alarm condition if<br />

they stay in the selected detection area for a<br />

longer period that the user-defined time<br />

window.<br />

For the more advanced RLS-3060-SH laser<br />

scanner model, which is designed to operate<br />

in harsher environments, the upgrades enable<br />

a Detection Range Expansion mode. This<br />

extends the detection range from a 30 metre<br />

to a 50 metre radius.<br />

When used in horizontal mode, this setting<br />

allows the creation of a pre-warning zone from<br />

30 metres to 50 metres radius, in which larger<br />

objects such as vehicles can be detected.<br />

When the LiDAR detector is set up in a<br />

vertical detection mode and mounted at 3.6<br />

metres, the laser scanner can detect a<br />

standing or squatting person over a range of<br />

100 metres, giving benefits when the sensor<br />

has been deployed for perimeter protection.<br />

The RLS-3060L and RLS-3060SH are<br />

certified as integrated with a number of<br />

leading VMS solutions.<br />

55


INNOVATION FOCUS<br />

TDSi GARDiS<br />

With remote control and management<br />

becoming an expectation of many users,<br />

emphasis is on the delivery of stable,<br />

intuitive interfaces that enable simpler<br />

configuration, monitoring and control. TDSi<br />

claims to deliver all of this with its GARDiS<br />

software package.<br />

Access control<br />

differs from<br />

other security<br />

technologies, in that user<br />

interaction with the system is<br />

more common during periods<br />

when events or incidents are not being<br />

managed. Because the collection and<br />

management of real-time data delivers<br />

information about personnel status, the data<br />

can be used for other applications alongside<br />

security. Indeed, the flexibility of the data<br />

collected and managed by access control can<br />

be of great value in terms of site management.<br />

In order to realise the benefits of this data,<br />

access control systems need to facilitate easy<br />

processes for integrators and installers, as<br />

well as enabling simple management of<br />

authorised persons and departments. For the<br />

end user, the generation of reports and ability<br />

to track activity across a site ensures full<br />

flexibility at all times.<br />

GARDiS access control management<br />

software improves accessibility to connected<br />

systems. Suitable for use by integrators and<br />

installers, as well as end users and IT<br />

managers, it boasts ease of installation across<br />

a number of Windows versions, with a<br />

graphical user-friendly interface developed to<br />

accommodate the needs of users.<br />

TDSi states it answered demands for a<br />

simple and straightforward platform requiring<br />

minimal training. In recognition of this, the<br />

software’s installation wizard reduces<br />

complexity during the set-up.<br />

GARDiS is a web-based application which<br />

runs as a service, ensuring it is always<br />

operational. The software has been followed<br />

by a selection of hardware products designed<br />

to integrate with the Cloud-hosted solution.<br />

Aiming to deliver a different approach to<br />

security system operation, GARDiS provides a<br />

core Security-as-a-Service (SaaS) model,<br />

which delivers opportunities with regard to<br />

recurring revenue.<br />

The user interface has been designed to<br />

ensure switching between the various<br />

functions is a simple process with minimal<br />

load times. Supported by a help system<br />

including short video demos, it reduces the<br />

time spent contacting customer support.<br />

The Dashboard is the default opening<br />

screen, and provides a view of events. Basic<br />

icon-based controls simplify actions and<br />

settings.<br />

The People menu is where users are added<br />

and details or permissions are edited. The<br />

information includes departmental<br />

designations, vehicle registration, periods of<br />

employment, along with information about<br />

the credential and access permissions.<br />

Access tags and tokens are managed via the<br />

Credentials screen. Adding and deleting<br />

credentials is straightforward.<br />

The next two screens, Organisations and<br />

Sites, allow configurations about the<br />

customer business.<br />

Field devices are managed via the<br />

Equipment screen. This uses a wizard to<br />

simplify the addition of ACUs, and adds these<br />

to the system, allowing door control<br />

information and communications options to<br />

be established.<br />

Door options include setting open times,<br />

enabling free access and/or egress, and<br />

control of the strike. Access Levels allows<br />

permission groups to be established.<br />

The Event Management screen allows a<br />

range of system events to be selected, either<br />

as live system events or as notifiable alarms.<br />

These can be linked with alarms.<br />

Finally, the Reports menu allows<br />

customisable reports to be generated,<br />

enabling users to quickly create audit trails or<br />

data for muster lists, along with a host of<br />

other reports.<br />

56


INNOVATION FOCUS<br />

HGH Cyclope Hypervisor<br />

An increasing number of high<br />

risk sites are seeking the<br />

earliest possible warning of<br />

intrusion. Where sites cover<br />

large areas with lengthy<br />

perimeters, the complexity of<br />

solutions can be an issue.<br />

HGH offers CYCLOPE<br />

Hypervisor, a GUI designed to<br />

simplify the management of<br />

more advanced solutions.<br />

With the evolving threat landscape<br />

faced by many commercial and<br />

industrial sites, the concept of wide<br />

area surveillance has never been more critical.<br />

If large and open sites are at risk of multiple<br />

intrusions, it is important security teams and<br />

the relevant authorities are alerted as quickly<br />

as possible. Often, an early warning is the<br />

best way to ensure effective actions are taken.<br />

Sites which represent significant challenges<br />

for integrators and installers include critical<br />

infrastructure sites, prisons, ports and<br />

maritime facilities, airports and airfields,<br />

remote utility plants, border areas, etc.. The<br />

combination of large areas and lengthy<br />

perimeters makes protection costly and<br />

difficult to implement.<br />

HGH Infrared Systems offers the Spynel<br />

range of 360 degree infrared sensors, and<br />

these make use of CYCLOPE automatic<br />

detection software. CYCLOPE Hypervisor is a<br />

GUI enabling remote management and<br />

supervision of devices from a single operatorfriendly<br />

display.<br />

CYCLOPE Hypervisor makes use of the<br />

functionality inherent in the CYCLOPE<br />

intrusion detection software provided with the<br />

SPYNEL 360-degree IR security cameras.<br />

Offering management for distributed sites,<br />

CYCLOPE Hypervisor centralises data from the<br />

security sensors over a network to offer a<br />

global geolocation-based interface.<br />

CYCLOPE Hypervisor is ideal for use in large<br />

critical infrastructure applications with<br />

complex security architecture, including if<br />

multiple Spynel sensors are located on one or<br />

several sites.<br />

All detected threats are listed and shown<br />

with geolocation data on maps, displayed on<br />

a single screen. By merging relevant<br />

information from various devices, the GUI<br />

enables early warning of security breaches for<br />

faster and more effective reactions.<br />

Collected information includes geolocation<br />

data related to threats and connected sensors<br />

on vector smart maps. This assists remote<br />

operators who may not be familiar with all<br />

sites. Each map can be centered on a selected<br />

Spynel sensor, ensuring a focus can be<br />

maintained on areas of interest.<br />

Data is displayed in a tabular format, listing<br />

the recent detected events with information<br />

such as the incident ID, location and a timestamp.<br />

Threats can include infrared<br />

thumbnails of activity.<br />

Bookmarks can be created, enabling rapid<br />

investigations of relevant data. Incident<br />

information can be filtered, and targets and<br />

field devices are shown on the map. Operators<br />

can configure audible alerts based upon<br />

predefined detection criteria.<br />

CYCLOPE Hypervisor delivers 360-degree<br />

surveillance without dead zones, enabling<br />

situational awareness.<br />

CYCLOPE Hypervisor can be used with the<br />

range of Spynel sensors. The Spynel X has a<br />

detection range of eight kilometres and offers<br />

360 degree coverage. The Spynel-S offers<br />

panoramic coverage, with a detection range of<br />

six kilometres. The Spynel-C sensor has an<br />

image resolution of 12 megapixels, and<br />

delivers full panoramic coverage. The Spynel-<br />

U features a range of two and one half<br />

kilometres. A panoramic video camera can be<br />

fitted as an optional extra. Finally, the Spynel-<br />

M is a cost-effective panoramic option with a<br />

detection range of 700 metres.<br />

57


INNOVATION FOCUS<br />

3xLOGIC Vigil VMS<br />

The VMS is a cornerstone of<br />

smart security solutions, and<br />

despite the roots of the<br />

software being video<br />

surveillance, today’s<br />

packages can manage the<br />

whole range of security<br />

technologies. Vigil from<br />

3xLOGIC combines VMS and<br />

access control to deliver<br />

added value for users.<br />

The flexibility and scalability of VMS<br />

software has been proven, and the fact<br />

that the vast majority of foward-thinking<br />

integrators and installers are using the<br />

technology as the basis of bespoke and smart<br />

solutions speaks volumes about the power it<br />

can deliver.<br />

Where once security technology was<br />

restricted in terms of potential due to<br />

hardware-based technological limitations,<br />

today the industry is capable of delivering<br />

solutions which not only protect businesses<br />

and organisations, but also make their<br />

operations more efficient and help them<br />

reduce waste and enforce compliance.<br />

VMS is considered a video-specific offering<br />

(the V does stand for Video) but today, VMS is<br />

a misnomer. While the software does offer<br />

video management, that is one part of the<br />

functionality available from these systems.<br />

VMS systems offer flexibility and scalability,<br />

allowing smart functionality and advanced<br />

alarm management to be supported.<br />

VMS packages allow integration with access<br />

control, alarm and detection equipment, plus<br />

a whole host of business intelligence and IoT<br />

sensors and solutions.<br />

One example is Vigil from 3xLOGIC, which<br />

combines video management with access<br />

control functionality. 3xLOGIC has made Vigil<br />

available in the UK and Europe. Vigil is an<br />

enterprise grade VMS which is linked with the<br />

manufacturer’s range of NVRs and PoEenabled<br />

cameras. To simplify installation, the<br />

VMS uses wizard-based guides to define<br />

network parameters, system identification<br />

information and camera profiles.<br />

There is an increasing demand from<br />

businesses for integrated VMS and access<br />

control. Recognising this trend, Vigil can be<br />

integrated with 3xLOGIC’s Infinias access<br />

control system, which has been designed to<br />

be easily scalable.<br />

Connections between the Vigil and Infinias<br />

are wireless. System configuration is carried<br />

out through the software with a cloud-based<br />

programming tool. Video is automatically<br />

linked with access events and alarms.<br />

The combined technologies offer a high<br />

level of functionality. A result of its intuitive<br />

set-up process is reduced technical resources.<br />

As a result, Vigil opens up a new revenue<br />

stream for integrators and installers who work<br />

with small to medium-sized enterprises.<br />

Vigil enables users to monitor server<br />

connectivity, camera status, storage details<br />

and server settings, and the RapidStream<br />

technology and SubStream motion detection<br />

functionality ensures high resolution video<br />

streams with reduced bandwidth demands.<br />

Users can identify points of interest within<br />

recorded streams by creating a SmartSearch<br />

mask. Data can be archived automatically.<br />

The Infinias range includes Infinias CLOUD,<br />

a cloud-based management application,<br />

delivering security features to enable<br />

seamless management. Scalable to manage<br />

anything from single door control to campuswide<br />

installations, Infinias CLOUD is designed<br />

to deliver flexible security.<br />

58


INNOVATION FOCUS<br />

Reconeyez PIR Cameras<br />

As wireless connectivity and cloud service<br />

provision grows in other commercial<br />

sectors, so end users in the security<br />

market are seeking simple-to-deploy, flexible<br />

solutions to their risk-based problems.<br />

Whether seeking protection for temporary<br />

threats or in locations which lack essential<br />

infrastructure, the appetite for batterypowered<br />

cloud-connected systems is evident.<br />

Reconeyez is launching into the security<br />

market with a battery-powered alarm system<br />

that provides video verification. Claimed to<br />

provide a new high quality and flexible<br />

solution for outdoor security applications, the<br />

company has stated it places a particular<br />

emphasis on mobile and temporary security,<br />

as well as permanent outdoor-based asset<br />

and infrastructure protection.<br />

The new PIR with integral camera delivers a<br />

standalone system. It has been designed to<br />

be used where there is no available mains<br />

power, as the PIR cameras work with a<br />

battery-powered 2G/3G/4G bridge to send<br />

alarms and images back to a control room.<br />

These can then be used for visual verification<br />

purposes.<br />

Some of the key features of the standalone<br />

system include high quality images streamed<br />

from the PIR cameras. The devices make use<br />

of integrated Artificial Intelligence (AI) to<br />

reduce false alarms and differentiate between<br />

target objects. The devices makes use of<br />

predefined image classification categories,<br />

and only flag footage as an alarm event if the<br />

images contain people, cars, trucks, bicycles<br />

or buses.<br />

The detection range is quoted as being up<br />

to 35 metres.<br />

The wireless transmission is carried out<br />

over a proprietary mesh network which the<br />

manufacturer states improves radio<br />

communications between the PIR cameras<br />

and the transmission bridge. Making use of<br />

Cloud-based alarm monitoring and<br />

maintenance software, the devices can have<br />

optional integration into other software<br />

platforms.<br />

Battery life is quoted as 400 days or up to<br />

50,000 events.<br />

The PIR Cameras incorporate separate<br />

camera sensors for day and night image<br />

capture, with a bank of IR illuminators to<br />

provide high image quality regardless of the<br />

ambient illumination levels.<br />

Verification of alarms is increasingly demanded by<br />

end users, and as such integrators and installers<br />

can secure more contracts by delivering a simple<br />

but effective system to meet those needs.<br />

Reconeyez is a new name in the security sector and<br />

is seeking to provide a system that assists in terms<br />

of visual verification of alarm incidents.<br />

Reconeyez is promoting the PIR cameras as<br />

being installable in two minutes. The<br />

manufacturer states integrators and installers<br />

simply need to insert the battery and the<br />

system starts to monitor the protected area.<br />

As devices use proprietary low power mesh<br />

technology, this simplifies the installation<br />

process.<br />

Estonian-based Reconeyez’s parent<br />

company, Defendec, has been supplying the<br />

same technology since 2009, with<br />

deployments in 24 countries.<br />

59


ARTIFICIAL INTELLIGENCE<br />

The Importance of GPUs for<br />

Artificial Intelligence<br />

The benefits on offer from Artifical Intelligence,<br />

Machine Learning and Deep Learning are<br />

numerous, but performance is often dependent<br />

upon the use of suitable hardware. Using GPUs<br />

(graphics processing units) is increasingly common,<br />

with many hardware providers offering devices with<br />

enhanced processing, and the chipsets can also be<br />

added to legacy systems. What is a GPU, and why<br />

do they matter?<br />

For many integrators and installers, the<br />

developments being made in Artifical<br />

Intelligence, Machine Learning and Deep<br />

Learning enable the creation of ever more<br />

innovative and bespoke solutions. The<br />

potential is limitless, and as processing power<br />

increases further (as it inevitably will), the<br />

opportunities which will be opened up by<br />

these technologies can only increase.<br />

Faster computational speed and resources<br />

equates to the ability to run more processes<br />

and algorithms simultaneously, which in turn<br />

enables the creation of more ‘intelligent’<br />

systems. However, smart systems only make<br />

sense – and appeal to customers – if they<br />

have a convincing use-case. Without a<br />

demand from businesses and organisations,<br />

the best technologies will not impact on the<br />

security solutions market.<br />

The technologies in question will<br />

predominantly be added into products and<br />

systems at the manufacturing level.<br />

Integrators and installers are unlikely to ever<br />

have to work with the coding or processors on<br />

offer. Their challenge is to understand the<br />

benefits on offer, and to sell those to the end<br />

user.<br />

Sadly, simply stating that a system uses<br />

Artifical Intelligence or Deep Learning isn’t<br />

going to persuade an end user to increase<br />

their budget, as these generic terms mean<br />

little to them. As with most emerging<br />

technologies, the real-world benefits which<br />

can be realised for businesses and<br />

60


ARTIFICIAL INTELLIGENCE<br />

organisations are what will excite the<br />

mainstream market-place.<br />

End users won’t buy AI or Deep Learning<br />

because it’s something ‘new’. The benefits are<br />

what the customer will pay for. However, this<br />

does not mean integrators and installers<br />

should not bother about gaining an<br />

understanding of how the technologies work<br />

in harmony with appropriate hardware.<br />

Indeed, a level of knowledge is important to<br />

ensure that benefits and features are not<br />

under-utilised or oversold.<br />

Which technology?<br />

To understand why GPUs are important, it is<br />

worth considering the various technologies.<br />

Often the terms Artifical Intelligence, Machine<br />

Learning and Deep Learning will be used<br />

interchangeably. Whilst the technologies are<br />

linked, they are different.<br />

Artifical Intelligence (AI) is the overarching<br />

technology. Both Machine Learning and Deep<br />

Learning are part of the AI landscape. AI<br />

seems to have risen to prominence in recent<br />

years, but the pursuit of AI has been on-going<br />

since the 1950s.<br />

AI is simply the delivery of systems and<br />

solutions which can apply intelligence to a<br />

problem. That sounds vague, because it is!<br />

The clearest definition of AI is where a<br />

machine uses all available and relevant data<br />

to maximise its chances of success in a given<br />

task. By using reasoning and probability, AI<br />

allows a machine, system or solution to<br />

participate in the decision making.<br />

AI relies on the system ‘learning’ about its<br />

environment and the various actions which<br />

take place, either normally or as a part of<br />

‘exceptional’ activity. There are two main<br />

types of learning associated with AI: Machine<br />

Learning and Deep Learning.<br />

Machine Learning is very common in the IT<br />

world, and many systems are based upon this<br />

approach. Machine Learning is used by social<br />

media, search engines, on-line services and<br />

data management systems. It works by<br />

running data through a variety of algorithms<br />

and uses the results to ‘predict’ things in a<br />

given environment.<br />

Deep Learning is superior to Machine<br />

Learning, and uses numerous layers of<br />

algorithms (which is where the ‘deep’<br />

reference comes from). It can understand an<br />

environment and make decisions based upon<br />

what it has learned.<br />

A good way of understanding the difference<br />

between the two is that Machine Learning<br />

systems will search through millions of<br />

options to quickly find a solution in a given<br />

environment, based upon what it has been<br />

programmed to do. Deep Learning systems<br />

will use gained knowledge and experience to<br />

61


ARTIFICIAL INTELLIGENCE<br />

understand the environment, and will filter<br />

past events to decide how to act accordingly.<br />

It is important to realise both processes<br />

require a high level of computational power.<br />

Machine Learning involves a high degree of<br />

searching and filtering, and Deep Learning<br />

runs multiple processes, simultaneously, to<br />

ensure it ‘understands’ the status data from a<br />

given site or system.<br />

Not only does the hardware require the<br />

capacity to manage these computational<br />

tasks, but it also needs to ensure it has the<br />

processing power to carry out everyday tasks<br />

too: video processing, data recording and<br />

searches, access control transactions, alarm<br />

and event handling, etc..<br />

The cost-effective way of delivering such<br />

performance is via hardware acceleration. This<br />

is a process whereby the server ‘offsets’ some<br />

of the tasks to additional hardware elements,<br />

thus freeing up its core resources to other<br />

tasks. GPUs are well suited to this role and<br />

ensure the CPU (central processing unit)<br />

manages a reduced workload.<br />

CPUs and GPUs<br />

The CPU has, for a long time, been the driving<br />

force in servers and PCs. Over the years, CPU<br />

performances have increased, and while that<br />

does mean today’s servers have higher<br />

performance levels, the workload we expect<br />

them to manage has also increased<br />

significantly.<br />

If you consider video, the servers of the<br />

past managed PAL video streams with much<br />

lower resolutions than is standard today.<br />

However, in order to ensure the video footage<br />

wasn’t degraded by limitations in the<br />

hardware, the streams were often forced to<br />

limited frame rates, or quality was restricted<br />

by a bitrate overhead.<br />

Because the cameras were only used for<br />

security surveillance, the numbers of devices<br />

were often kept to a bare minimum, and<br />

additional processing was typically limited to<br />

motion detection.<br />

Despite these elements resulting a low load<br />

on the server hardware, restrictions were<br />

required to ensure consistent performance.<br />

Since then, processing capabilities have<br />

increased and modern servers provide a lot<br />

more power in terms of processing. However,<br />

HD1080p has become the de facto standard<br />

for video, and the increased use of 4K UHD,<br />

multi-megapixel and 360 degree video has<br />

further impacted on loads. Increasingly,<br />

cameras are being deployed with higher levels<br />

of IVA, adding to the work a server must do.<br />

Video is used not only for security, but also<br />

for safety, site management, traffic control,<br />

process management, etc.. The result of this<br />

is increased camera counts, which in turn<br />

creates more video data. Additionally, these<br />

higher numbers of cameras are using<br />

advanced video analytics in order to automate<br />

management tasks, which again increases the<br />

load on the server’s processing capacity.<br />

Mobile viewing is another task which has<br />

grown significantly in popularity. However, it<br />

also can create a lot of processing load, as<br />

video inevitably needs to be transcoded to<br />

make it suitable for remote viewing. In some<br />

systems, mobile viewing can have such an<br />

impact that essential core services become<br />

unstable or fail, compromising on the<br />

credibility of the entire security solution. By<br />

offsetting much of this processing work,<br />

modern systems remain stable and efficient.<br />

The emphasis placed on GPUs needs to be<br />

considered in a balanced way. While it is true<br />

they offer a remedy to systems which might<br />

otherwise grind to a halt, the CPU remains<br />

very important to a server’s suitability for<br />

security use.<br />

The CPU contains millions of transistors<br />

which perform a variety of calculations.<br />

Standard CPUs have up to four processing<br />

cores. The benefit of CPUs is that they can<br />

carry out a huge range of tasks, very quickly.<br />

The GPU is more specialised, and is<br />

designed to display graphics and carry out<br />

specific computational tasks. GPUs have a<br />

lower clock speed than CPUs, but have<br />

significantly more processing cores. This<br />

allows it to carry out mathematical operations<br />

62


TAKE CONTROL<br />

OF YOUR CCTV ADMINISTRATION<br />

SECURE PASSWORDS WITH EMAIL RECOVERY<br />

With a powerful CMS for effective maintenance and planning,<br />

immediate fault diagnostics and administrative management without<br />

having to go to site; the Aspect Central Management System is 100%<br />

license free and allows for unlimited CCTV systems to be connected.<br />

CALL US ON 01924 258000<br />

OR REGISTER ONLINE AT WWW.VIDECON.CO.UK


ARTIFICIAL INTELLIGENCE<br />

over and over again. The processing cores run<br />

simultaneously, making it ideal for handling<br />

repetitive tasks.<br />

GPUs might lack the diverse abilities of a<br />

CPU, but they make up for it in terms of<br />

speed. A CPU can perform up to four<br />

computations per clock cycle, while a GPU can<br />

perform thousands.<br />

GPUs were designed for 3D game rendering,<br />

but the performance can harnessed to<br />

accelerate computational workloads. A GPU<br />

can manage huge batches of data, performing<br />

basic operations very quickly. NVIDIA, the<br />

leading manufacturer of GPUs, states the<br />

ability to process thousands of threads can<br />

accelerate software by 100x over a CPU alone.<br />

GPUs excel in carrying out multimedia<br />

tasks: transcoding video, image recognition,<br />

pattern matching, content analysis, etc..<br />

These are therefore tasks which are better<br />

passed to the GPU than managed by the CPU.<br />

While much of this might sound like the<br />

GPU has arrived just in time to save the<br />

struggling CPU, the reality is that GPUs have<br />

nowhere near the flexibility of CPUs. Indeed,<br />

they were never designed as a replacement.<br />

The best value in terms of system<br />

performance, price, and power comes from a<br />

combination of CPUs with GPUs. Indeed, many<br />

of the tasks which a GPU carries out are done<br />

because the CPU makes the decision to hand<br />

them over. Some explanations of the<br />

difference between CPUs and GPUs neglects<br />

to point out that with CPUs, most hardware<br />

would be very limited. The two types of<br />

processors co-exist in order to ensure optimal<br />

performance in an advanced hardware set-up,<br />

and matching the two components is best left<br />

to the experts.<br />

A legacy option?<br />

Is there any option of an upgrade if an end<br />

user has invested in hardware for their<br />

security project, but because there was no<br />

need at the time, hadn’t allowed for the<br />

introduction of GPUs to accelerate<br />

performance? There is, but caution is<br />

required.<br />

It’s already been mentioned that GPUs were<br />

designed for the gaming industry, where the<br />

ability to render accurate high-quality<br />

graphics is necessary. Serious gamers have,<br />

for many years, invested heavily in high<br />

performance PCs, and as the performance of<br />

games increased, so the upgrades market<br />

also blossomed.<br />

The most common way to add GPUs to PCs<br />

was via graphics cards. These simple PCI<br />

cards can be added to hardware, boosting<br />

graphics performance. The same is true of<br />

security servers. By adding an upgraded<br />

graphics card, the GPU performance can be<br />

used for hardware acceleration. Implementing<br />

this is usually very easy. Many VMS of other<br />

software packages include a simple ‘use<br />

hardware acceleration’ tick box.<br />

If adding a GPU via a graphics card is very<br />

simple, and switching on hardware<br />

acceleration is often a case of simply checking<br />

a box in a menu, why do integrators and<br />

installers need to exercise caution if going<br />

down the route of upgrading a legacy server?<br />

The answer is one of expectations. If a<br />

system is lagging when under load, it stands<br />

to reason that deploying a GPU upgrade will<br />

boost performance, and it probably will.<br />

However, the question mark is over how much<br />

it will boost the performance by.<br />

Any enhancements can be affected by other<br />

hardware components. For example, if the<br />

CPU is extremely overloaded, not because the<br />

system is throwing too much work at it but<br />

because it is woefully inadequate for the job,<br />

then adding a GPU might not make a<br />

significant difference, because the CPU will<br />

still be struggling. If memory limitations are<br />

causing issues, then adding a GPU might not<br />

have a significant result.<br />

CPUs and GPUs work together and rely on<br />

other hardware components too. If the various<br />

elements are mismatched, the benefits of<br />

GPUs might not be obvious.<br />

In summary<br />

AI, Machine Learning and Deep Learning are in<br />

their infancy in security, but the technologies<br />

promise much. The important point for<br />

integrators and installers is to ensure they<br />

have the right hardware to cope with the high<br />

workload.<br />

64


INNOVATION AWARDS<br />

Rewarding Innovation<br />

INNOVATION<br />

AWARDS 2019<br />

At Benchmark, we passionately believe that the<br />

future of the electronic security sector lies in the<br />

creation of innovative and smart solutions. In order<br />

to allow installers and integrators to create such<br />

solutions, it is vital that manufacturers deliver<br />

innovation that both enhances the technological<br />

capabilities of their products, and allows those<br />

developments to be implemented in a realistic<br />

fashion. In order to highlight such advances,<br />

Benchmark runs its Innovation Awards scheme,<br />

which recognises and rewards innovative thinking.<br />

Here we highlight the finalists in the 2019<br />

Benchmark Innovation Awards.<br />

The security industry has never before<br />

enjoyed the sheer breadth of<br />

technological options that it does today.<br />

The security systems market is advancing on a<br />

daily basis, and alongside developments from<br />

security innovators we can also benefit from<br />

the constant advancements being made in the<br />

IT, communications, AV and consumer sectors.<br />

The impact of these innovations is immediate,<br />

and we can leverage what is on offer as and<br />

when they happen. In short, innovation has<br />

become our watchword.<br />

As advances in technology deliver ever<br />

greater levels of functionality, so the ability to<br />

integrate security elements increases. This is<br />

further added to by interoperability with other<br />

functions such as business intelligence and<br />

smart management. The result is that security<br />

systems offer a more valued proposition for<br />

all concerned, bringing together enhanced<br />

security with truly beneficial solutions.<br />

Through on-going innovation, and by<br />

embracing the new and emerging<br />

technologies, manufacturers can assist<br />

installers and integrators who wish to adopt a<br />

more holistic approach to system design. This<br />

allows the solutions to encompass the<br />

inherent flexibility that new technologies<br />

offer.<br />

Defining innovation<br />

The Benchmark Innovation Awards scheme<br />

recognises and rewards innovations which<br />

deliver real benefits to installers, integrators<br />

and end users.<br />

Innovations must bring value; it’s not<br />

enough for a manufacturer to add features<br />

simply to expand a list of functions. If there is<br />

no tangible benefit for installers and<br />

integrators, or their customers, developments<br />

cannot be considered as innovative!<br />

Devices or systems must either deliver a<br />

new concept or different approach which is<br />

both effective and realistic, or should include<br />

a specific feature or function which ranks as<br />

innovative.<br />

Also, with an increasing focus on<br />

integration and interoperability, devices or<br />

software which add functionality and bring<br />

together other established systems are<br />

coming to the fore.<br />

Innovation is the lifeblood of the security<br />

systems sector, and is vital for a credible and<br />

profitable future.<br />

66


INNOVATION AWARDS<br />

Video Hardware<br />

FLIR: Saros<br />

DH-390<br />

FLIR’s Saros<br />

dome cameras<br />

include patented<br />

and patentpending<br />

technologies to<br />

deliver accurate,<br />

actionable alerts,<br />

and verified<br />

alarm data for<br />

outdoor<br />

commercial perimeters. The cameras integrate multiple<br />

technologies in one device, including two thermal sensors<br />

supported by onboard analytics, plus the choice of an<br />

HD1080p or 4K UHD video camera, IR and visible LED<br />

illuminators, two-way audio and digital input/outputs. The DH-<br />

390 features a thermal resolution of 320 x 120 with a 90-<br />

degree field-of-view.<br />

Hikvision: Thermal Smart Linkage Tracking<br />

Hikvision’s Thermal Smart Linkage Tracking Systems makes<br />

use of a single fixed thermal imaging camera and a videobased<br />

PTZ camera. The PTZ camera uses smart processing to<br />

track multiple moving targets, triggered by the fixed thermal<br />

camera which delivers an overview of the protected area. There<br />

are a number of models with differing detection ranges.<br />

Edesix: VB-300<br />

The VB-300 series of body-worn cameras are WiFi-enabled<br />

devices. With a 130 degree horizontal field of view, day/night<br />

recording capability, RFID touch-assign enabled and integrated<br />

pre-record functionality, the VideoBadges can record footage of<br />

ongoing incidents. Video and audio footage is kept securely on<br />

the camera with no removable media card, and is encrypted.<br />

Hanwha Techwin: Wisenet XNP-6550RH<br />

The Wisenet XNP-6550RH PTZ camera features a 55x optical<br />

zoom, gyro sensing for accurate stabilisation, optical Defog and<br />

integral IR LEDs with an effective range of up to 500 metres. The<br />

optical Defog uses an optical low pass filter which accepts a<br />

higher light range in front of the camera’s image sensor in order to<br />

reduce the influence of fog. Other features include adaptive IR<br />

technology, auto-tracking, integral video analytics, dynamic<br />

streaming and dual SD/SDHC/SDXC memory slots.<br />

IDIS: Super Fisheye 5MP Compact<br />

The Super Fisheye 5MP Compact camera (DC-Y6513RX) is a<br />

compact 360 degree camera designed for wide area protection<br />

applications. Features include Smart UX Controls for high<br />

accuracy and ease-of-use, smooth de-warping on the camera<br />

as well as on desktop applications, protection against video<br />

loss via built-in Smart Failover technology, and an intelligent<br />

codec. Intelligent video and event trigger functions utilise<br />

motion detection, active tampering and trip zones.<br />

Video Software<br />

Milestone: XProtect+ 2019<br />

XProtect+ 2019 extends the usability of the Smart Client, with<br />

support for one- and two-way audio in the Mobile and Web<br />

clients. This includes communication directly from a phone<br />

with the Push-To-Talk function. All software packages in the<br />

XProtect+ range include Milestone’s Rules Engine, support for<br />

H.265 video formats, hardware-accelerated video decoding,<br />

centralised management and Active Directory support.<br />

Bosch: BVMS Pro 9<br />

BVMS Professional provides seamless management of digital<br />

video, audio and data. The network-based system offers<br />

optimum results with Bosch devices, leveraging the proprietary<br />

capabilities of the cameras and recording solutions. The<br />

system is equipped with embedded resilience, allowing day-today<br />

operations to continue should the management server or<br />

recording servers fail. Edge-based video content analysis and<br />

advanced recording technology reduce the cost of ownership.<br />

Johnson Controls: TrickleStor<br />

The VideoEdge TrickleStor feature provides an integrated<br />

camera-NVR connectivity solution protecting against video loss<br />

by recording video locally . By recording directly onto SD cards<br />

when a connectivity failure to the VideoEdge NVR takes place,<br />

video is protected. TrickleStor automates the process of media<br />

database repair, reducing the risks when a network<br />

communication failure event occurs.<br />

Mobotix: Mx6 Second Generation Platform<br />

MOBOTIX offer its second generation Mx6 camera line with a<br />

new platform that includes the integrated MxBus functionality.<br />

The MxBus technology is based on an extended camera board.<br />

This two-wire cable system is encrypted against cyberattacks<br />

and expands camera functions by including practical additional<br />

modules such as the MX-GPS-Box, a reliable time server for a<br />

complete video system. Mx6 cameras without MxBus can also<br />

process and use the data from an MxBus module connected to<br />

a camera within the same network.<br />

IPS: VideoManager 3D VMS<br />

VideoManager VMS makes use of 3D technology, which<br />

enhances the management suite’s operational feature-set.<br />

The software’s 3D technology automates tracking and camera<br />

handover, meaning operators can follow suspects without a<br />

need to manually control PTZ-enabled cameras. The cameras<br />

automatically use IVA to track suspects, and if the target<br />

moves from one<br />

camera’s protected<br />

area to another, the<br />

system automatically<br />

hands over.<br />

VideoManager includes<br />

VMD and sabotage<br />

detection, and IPS<br />

intelligent video<br />

analytics can be added<br />

via licence upgrades.<br />

67


INNOVATION AWARDS<br />

Access Control Hardware<br />

Paxton: PaxLock Pro<br />

PaxLock Pro is Paxton’s third generation of electronic door<br />

handle, offering a robust, wireless and aesthetically pleasing<br />

product suitable for a wide range of sites. It can be installed to<br />

operate as part of a networked access control system or as a<br />

standalone device. It is available in two options for internal<br />

and external facing doors. Simple to install, it is compatible<br />

with DIN standard locks so replacement of an existing door<br />

handle creates minimal disruption.<br />

Nortech: FeeMaster Smart Range<br />

The FeeMaster Smart system provides a simple, cost effective<br />

means of managing revenue collection while simultaneously<br />

controlling short-stay, long-stay and seasonal parking access.<br />

The FeeMaster system is also ideal for controlling access for<br />

staff, long stay and seasonal parkers due to the ability to<br />

validate smart cards for any given duration of time.<br />

Pacom: 8003 Controller<br />

The 8003 controller is an intelligent IP-enabled hybrid<br />

controller that provides flexible intrusion detection and access<br />

control for up to eight doors. As an access control device, the<br />

8003 can support up to 8 doors, each with an IN and OUT<br />

reader, enabling anti-passback. The 8003 controller can<br />

operate standalone for smaller or remote environments or can<br />

be easily incorporated as part of a fully integrated access<br />

control system for larger buildings or multi-site applications.<br />

Comelit: VIP Mini HF WiFi<br />

The VIP Mini HF WiFi features an integral WiFi port and gateway<br />

for forwarding video entry phone calls to smartphones and<br />

tablets running the Comelit app. All functions and<br />

programming can be performed from a graphic menu, using<br />

eight soft-touch keys. The unit is powered by PoE, and includes<br />

an induction loop with T position for users of hearing aids.<br />

ASSA Abloy: Aperio H100<br />

The H100 door handle offers integration with a number of<br />

third-party systems. Available in online and offline versions, it<br />

can be retrofitted without drilling for doors with a thickness of<br />

30–80mm. The H100 is battery-operated and supports iCLASS,<br />

Mifare, Mifare Plus, Desfire SE and EV1 card technologies.<br />

Access Control Software<br />

Vanderbilt: ACT Enterprise<br />

The latest release of ACT Enterprise includes a number of<br />

updates to enhance the solution. To help with integration, ACT<br />

Enterprise integrates seamlessly with the company’s SPC<br />

intrusion system. ACT Enterprise is also supported by intuitive<br />

smartphone apps delivering real-time monitoring, system<br />

management and user administration. To facilitate smart<br />

functionality, one of the headline additions is rules mapping,<br />

allowing triggers to implement actions.<br />

Qognify: Qognify ACI<br />

Access Control Insights (ACI) is designed to analyse access<br />

control system data to deliver operational insights, detecting<br />

abnormal behaviours and identifying critical events.Utilising<br />

machine learning data analytics, Qognify ACI detects unusual<br />

card holder activities associated with potential fraud, theft or<br />

other risks, alerting the system operator of threats. All<br />

functionality is delivered without changing legacy access<br />

control systems.<br />

Evva: Xesar 3.0<br />

The Xesar system is an innovative electronic access system<br />

which is fully scalable, allowing use in residential<br />

developments, educational facilities and office buildings. Xesar<br />

can be simply and securely managed, either from within a<br />

locally installed network or via the cloud. The Xesar system can<br />

be created from a number of modules. These include cylinders,<br />

escutcheons, readers, door handles, cam locks and padlocks.<br />

BQT Solutions: Net2 Integration<br />

BQT offers a software integration between its miPASS Access<br />

TMS software and Paxton’s Net2 access control software. The<br />

integration enables the seamless addition of BQT biometric<br />

readers to new or legacy Net2 systems, facilitating a smooth<br />

transition from less secure card technologies to more robust<br />

options like fingerprint biometrics and BQT’s own miPASS<br />

credentials.<br />

TDSi: GARDiS<br />

GARDiS access control management software boasts ease of<br />

installation across a number of Windows versions, with a<br />

graphical user-friendly interface developed specifically to<br />

accommodate the needs of a wide variety of users. The<br />

software’s installation wizard reduces complexity during the<br />

set-up. GARDiS is a<br />

web-based<br />

application which<br />

runs as a service.<br />

This ensures that is<br />

always operational.<br />

The software will be<br />

enhanced with a<br />

selection of<br />

hardware products<br />

designed to fully<br />

integrate with Cloudhosted<br />

security<br />

solutions.<br />

68


INNOVATION AWARDS<br />

Site Protection Hardware<br />

Takex: PIR-<br />

T40NAM<br />

The PIR-T40NAM is<br />

a long-range<br />

external PIR with a<br />

maximum range of<br />

40 metres. The<br />

sensor boasts four<br />

selectable<br />

operational modes<br />

which allow<br />

flexibility when it<br />

comes to<br />

positioning the unit.<br />

With a mounting<br />

height range of<br />

between two and six<br />

metres, it allows freedom when finalising device locations. The<br />

PIR-T40NAM delivers vertical curtain protection. Other<br />

headline features include triple mirror optics and intelligent<br />

signal processing.<br />

OPTEX: OPTEX Bridge powered by CHeKT<br />

The OPTEX Bridge powered by CHeKT combines remotely<br />

monitored intruder alarm systems and ONVIF cameras to<br />

create a visual verification platform. The solution has been<br />

developed to be compatible with most intruder alarm systems,<br />

and any ONVIF camera, as well as being integrated with most<br />

ARCs’ monitoring software platforms. The Cloud hosted<br />

platform allows collaboration between the ARCs and the users<br />

by sharing video clips to confirm alarms.<br />

SICK: Visionary-T DT Sensor<br />

The Visionary-T DT sensor is a configurable, plug-and-play 3D<br />

detection sensor. The device makes use of single-snapshot<br />

Time of Flight technology for a range of detection, notification<br />

and security applications. The sensor uses integral image<br />

processing, ensuring it can be added to installations without<br />

additional IT-based infrastructure.<br />

InnoSent: iSYS-5021 with Tracker<br />

The iSYS-5021 is a 24GHz radar system. InnoSent has<br />

developed it with the aim of fusing together radar and<br />

cameras. The integrated Smart Tracker detects multiple<br />

moving objects within the detection area. It combines radar<br />

detections with tracked data and allows the anonymous<br />

monitoring of relevant events. The targets are recorded even if<br />

a person stops moving, changes postures or starts crawling.<br />

Raytec: Urban-X<br />

Urban-X is a range of high-performance general area<br />

luminaires designed for industrial applications. Urban-X<br />

delivers several performance advantages compared to<br />

traditional lighting, such as a lumen output up to 14,000lm.<br />

The range achieves powerful illumination through the use of<br />

Platinum SMT LED technology. High thermal performance<br />

ensures the luminaires run cool, providing long-life.<br />

Site Protection Software<br />

BT Redcare: Redcare Ultimate<br />

Ultimate is claimed to be BT Redcare’s best alarm signalling<br />

system yet, suitable for every level of risk. It uses a private IP<br />

connection on the Redcare network, backed up by two 4G<br />

SIMs. Resilience is ensured as the panel includes battery backup.<br />

Real-time monitoring means any problems with the<br />

connection can be notified in 90 seconds. The service can<br />

deliver alarm and fire signalling, as well as monitoring of<br />

business elements.<br />

Pyronix: ProControl+<br />

Pyronix has added voice push notifications to both the iOS and<br />

Android versions of the ProControl+ app. When an alarm<br />

occurs, if the system is set or unset, or if an event is triggered<br />

by any life safety devices integrated with the system, the user<br />

receives a voice push notification. The feature adds value<br />

without any additional cost. When combined with cameras for<br />

video verification, users can also see what is happening.<br />

Teleste: S-AWARE<br />

S-AWARE provides users with a smart platform to centralise<br />

system information and manage daily operations. Data from<br />

various sources can be collected, identified, analysed and<br />

distributed in a single, easy-to-use, web-based graphical user<br />

interface. S-AWARE can be deployed as a standalone product,<br />

or integrated with Teleste’s S-VMX video management<br />

solution. It stores and records information from all system<br />

components and tracks events to generate reports for analysis.<br />

Reconeyez: Video Verification System<br />

Reconeyez offers a battery-powered alarm system with video<br />

verification, providing a flexible solution for outdoor security,<br />

with a particular emphasis on mobile/temporary security. The<br />

standalone system can be used where there is no mains power<br />

and the PIR-managed cameras work with a battery-powered<br />

2G/3G/4G bridge to send alarms and images back to a control<br />

room for verification purposes.<br />

Texecom: Texecom Cloud<br />

Texecom Cloud delivers enhanced system management<br />

options to integrators and installers. The cloud platform<br />

enhances day-to-day remote management. Benefits include<br />

remote maintenance and healthchecks across the full portfolio<br />

of systems, remote access to systems via any web-connected<br />

device, access management, reduction in time of on-site<br />

configurations, flexible reporting and a number of additional<br />

benefits which enable additional value and add-on services.<br />

69


INNOVATION AWARDS<br />

Intelligent Systems<br />

Business Intelligence<br />

Herta: BioFinder<br />

BioFinder makes it possible to search for a specific subject,<br />

through facial recognition, in one or various recorded videos.<br />

By working with GPU architecture, it processes all the images<br />

at a high speed, making it possible to locate a specific subject<br />

more rapidly. BioFinder delivers forensic analysis and the<br />

classification of information.<br />

Avigilon: AI Appliance<br />

The AI Appliance adds patented Avigilon self-learning video<br />

analytics and Appearance Search technology to almost any IP<br />

camera. When connected to Avigilon Control Center (ACC)<br />

software, integrators and installers can create powerful AIbased<br />

solutions, with automatic alerts of potentially critical<br />

events and the ability to search for and locate a person or<br />

vehicle of interest across an entire site.<br />

Axis: AXIS Guard Suite<br />

AXIS Guard Suite encompasses motion, intrusion and loitering<br />

analytics for Axis network video products. It detect threats and<br />

instigates configured actions. The analytics are suitable for use<br />

in a range of locations. The analytics can be used with Axis<br />

network video products running firmware 7.x or higher. They<br />

are available at no extra cost for Axis Q-line products and at a<br />

low cost for other compatible products. The applications<br />

support multiple profiles, allowing trigger settings for different<br />

times of day.<br />

Davantis: Daview Mini<br />

Daview Mini offers a comprehensive security solution for small<br />

sites, centralising video analytics and alarm verification,<br />

enabling system operators to take immediate action. The<br />

appliance is quick and easy to install and features intuitive<br />

software. The system is compatible with devices using the<br />

ONVIF protocol. The appliance features relays for activating<br />

external devices, and perimeter protection is enhanced thanks<br />

to a SmartWalk function which aids configuration.<br />

Genetec: Streamvault Appliances<br />

Streamvault is a complete line of secure, ready-to-deploy<br />

security infrastructure solutions designed to help integrators<br />

and installers design a system that meets project<br />

requirements. With Security Center, the Genetec VMS product,<br />

pre-loaded, Streamvault appliances simplify deployment and<br />

maintenance, and unify a site’s security operations.<br />

Briefcam: Briefcam Protect<br />

BriefCam’s video content analytics platform adds value to<br />

video surveillance system investments by making captured<br />

video searchable, actionable and quantifiable. Using a fusion<br />

of computer vision technologies, together with patented Video<br />

Synopsis technology, Briefcam enables video system operators<br />

to review hours of video in minutes, rapidly identifying people<br />

and objects of interest. The software provides robust<br />

detection, classification and recognition.<br />

A.I. Tech: AI-PARKING-DEEP<br />

AI-PARKING-DEEP is a video analytics solution for parking<br />

management. Using deep learning techniques, it is able to<br />

analyse car parks, including indoor and outdoor areas, to<br />

assess if spaces are empty or occupied. The solution is aimed<br />

at parking management, and delivers occupancy rates for<br />

parking areas. It can operate in enclosed spaces or on streets,<br />

and can inform users about parking spaces.<br />

Allgovision: Flow Map<br />

The Allgovision analytics packages offer a diverse number of<br />

modules, including a host of business intelligence options. The<br />

AGV-VA-FLOW module implement flow mapping, allowing<br />

footfall traffic is a surveyed area to be quickly and easily<br />

mapped. The analytics module produces a movement trend<br />

map which highlights the percentage split for various<br />

movement paths taken by people in the monitored zone, over a<br />

defined time period.<br />

Anyvision: Better Tomorrow Platform<br />

Better Tomorrow is a state-of-the-art platform that enables<br />

one-to-many recognition on-demand. The platform can either<br />

be based in the local premises or in the cloud. It can be used<br />

for recognition of persons of interest, as well as recognition of<br />

humans or other specified objects. Other features include heat<br />

mapping. The technology can be applied across multiple sites,<br />

and results can be filtered by adding variants as required.<br />

SAST: IoT Platform<br />

SAST offers a global platform for the next generation of<br />

security cameras. It has been created to harness the potential<br />

available from emerging innovative IP-based security cameras<br />

and devices. With surveillance technologies being deployed<br />

using internet connectivity and processing at the edge, the<br />

increased use of next generation processing and advanced<br />

video<br />

compression<br />

and stream<br />

management<br />

requires a new<br />

approach. The<br />

SAST IoT<br />

platform is<br />

designed for<br />

edge-based<br />

video analytics<br />

as well as<br />

business<br />

applications.<br />

70


Available colours:<br />

White<br />

Black<br />

Internal or external version available<br />

PaxLock Pro<br />

Robust, Secure, Wireless Access Control<br />

Designed in black or white, with anti-scratch coating to maintain a high quality<br />

look and feel. PaxLock Pro is available for internal or external facing doors,<br />

making it suitable for a range of buildings and applications.<br />

Standalone<br />

or Networked<br />

Compatible with<br />

DIN Locksets<br />

IP55 Rated<br />

for External Use<br />

IK10<br />

Impact Rated<br />

5-Year<br />

Guarantee<br />

Full information:<br />

paxton.info/3599<br />

New and improved<br />

Net2Air Bridge<br />

• Improved aesthetics<br />

• Enhanced, low profile design<br />

• Easy to install


INNOVATION AWARDS<br />

Infrastructure<br />

Seagate: SkyHawk AI 14TB<br />

SkyHawk AI HDDs are available in 14TB<br />

variants and have been designed for use in AIcapable<br />

surveillance systems. Traditional<br />

SkyHawk drives are optimised for<br />

predominantly write-based performance but<br />

the AI models are configured for higher<br />

workloads, such as the in-depth searching<br />

and logging that AI-enabled systems perform.<br />

The drives also include data protection<br />

coverage as they are supplied with a two year<br />

Rescue Data Recovery Services plan bundled<br />

with every AI drive.<br />

ComNet: CTS24+2<br />

The CTS24+2 is a managed layer-2<br />

commercial grade Ethernet transport system<br />

and provides up to 24 ports of 10/100TX<br />

Ethernet and two ports of 10/100/1000TX or<br />

1000FX transmission. The CTS24+2 series<br />

allows for flexibility in combining standard<br />

copper, optical and extended distance<br />

Ethernet in one device. Optional PoE supplies<br />

of 400 or 720 Watts are available. Up to three<br />

8-channel modules can be fitted to each<br />

chassis: the modules are CAT5/6 10/100 Mbps<br />

Ethernet, 100FX optical SFP, or CopperLine<br />

Coax or UTP interfaces.<br />

D-Link: DIS-700G<br />

The DIS-700G Series Industrial Layer 2+<br />

Gigabit managed switches are designed to<br />

withstand temperature variations, vibrations<br />

and shocks, making them ideal for security<br />

applications. The rugged switches feature a<br />

hardened design combined with high<br />

availability network features which are vital<br />

when considering surveillance and wireless<br />

connectivity. The switches provide high<br />

throughput and reduced response time which<br />

is critical for security-based video, voice and<br />

data applications.<br />

NVT Phybridge: EC Extender Kit<br />

The NVT Phybridge EC Extender solution is<br />

designed to upgrade the downlink capabilities<br />

of a standard Ethernet switch, delivering<br />

10/100Mbps symmetrical (full duplex) data<br />

and PoE over coax. The solution offers<br />

enhanced range with distances of up to 1.2km.<br />

IP-based IoT devices can be connected to the<br />

existing coaxial infrastructure, delivering<br />

optimal performance while saving costs and<br />

time. Cost savings can enable system<br />

designers to transfer budget and resources<br />

towards higher-quality applications and<br />

devices.<br />

InfiNet: InfiLink 2x2<br />

InfiLINK 2X2 is a point-to-point wireless<br />

transmission solution, combining high-speed<br />

capabilities of up to 280Mbps throughput,<br />

with a range of features and benefits such as<br />

leading-edge radio protocols providing<br />

spectral efficiency and wireless transmissions<br />

over long distances. The wireless solution can<br />

be deployed to provide Ethernet extensions,<br />

such as simple LAN-to-LAN connectivity,<br />

between two locations where physical cabling<br />

might be cost-prohibitive.<br />

72


Trial the technologies shaping the future of security.<br />

<br />

<br />

<br />

Show Me How<br />

<br />

To register for free visit: ifsec.co.uk/benchmark<br />

Running alongside:


BENCHMARK – driving innovation<br />

and smart solutions in the security industry<br />

The Benchmark website is a supplement<br />

to the printed monthly magazine, and<br />

includes a variety of tests and<br />

assessments of the latest technologies,<br />

including videos where relevant, as well as<br />

guides to product selection, independent<br />

technology-based articles and information<br />

about the latest influential products and<br />

systems comprising security and smart<br />

technologies.<br />

TESTS AND ASSESSMENTS<br />

All tests and assessments are fully independent, and<br />

manufacturers have no involvement in the process.<br />

Additionally, Benchmark makes no charge, financially or of any<br />

other kind, for inclusion in tests. All products are selected by<br />

an independent team. In short, it’s the only way you can<br />

ascertain the truth about product and system performance in<br />

real-world applications! Tests are carried out by an<br />

independent team of experts, telling you the whole truth about<br />

the performance you can expect.<br />

DRIVING INNOVATION<br />

Benchmark believes that the future of the security sector lies<br />

in the creation of innovative solutions which deliver credible<br />

security, flexibility and smart value-added benefits. With<br />

unrivalled technical expertise, Benchmark ensures you are upto-date<br />

in an increasingly technical environment.<br />

LONG-TERM SYSTEM EVALUATIONS<br />

The Benchmark website now includes information from the<br />

newly launched long-term system evaluation. There are many<br />

theories about how systems can deliver added value;<br />

Benchmark sees what is and what is not possible by creating a<br />

long-term system to investigate the various possibilities.<br />

@benchmarkmag<br />

STAY UP TO DATE<br />

Benchmark is always testing and assessing<br />

new products and technologies. Keep up to<br />

date with the latest reports by following<br />

Benchmark on Twitter.<br />

www.twitter.com/benchmarkmag<br />

www.benchmarkmagazine.com


thepaper<br />

Business News for Security Professionals<br />

Pro-Activ Publications is embarking on a revolutionary<br />

launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />

latest financial and business information for<br />

professionals operating in the security sector<br />

The Paper will bring subscribers (including CEOs,<br />

managing directors and finance directors within the<br />

UK’s major security businesses) all the latest company<br />

and sector financials, details of business re-brands,<br />

market research and trends and M&A activity<br />

FOR FURTHER INFORMATION<br />

ON THE PAPER CONTACT:<br />

Brian Sims BA (Hons) Hon FSyI<br />

(Editor, The Paper and Risk UK)<br />

Telephone: 020 8295 8304<br />

e-mail: brian.sims@risk-uk.com<br />

www.thepaper.uk.com


Secure operations 24/7 to see all the details,<br />

all the time with Bosch FLEXIDOME IP starlight 8000i.<br />

With quick installation plus wireless and remote commissioning, camera<br />

adjustments can be corrected whenever needed plus up to 4k Ultra HD<br />

resolutions and starlight technology so you can see all the details all the time.<br />

Find out more at boschsecurity.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!