12.07.2019 Views

BenchmarkAugust2019

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TECHNOLOGICAL INNOVATION & SMART SOLUTIONS<br />

Smart Solutions: Enhanced Integrations<br />

Technology: Video Cloud Services<br />

12 to Try: Network Infrastructure<br />

AI Developments: Business Use Cases<br />

August 2019<br />

BENCHMARK<br />

Visual Verification<br />

Does the OPTEX Bridge offer a cost-effective solution?<br />

Tested: Mainstream VMS Software<br />

Assessment: Dynamic Encoding


BENCHMARK<br />

BENCHMARK<br />

Technological Innovation & Smart Solutions<br />

At Benchmark, we passionately believe that the future growth and<br />

development of the security sector depends upon the creation of<br />

flexible, scalable and effective solutions. As technology delivers<br />

ever increasing levels of functionality, so the ability to integrate<br />

elements such as business intelligence and smart management create a<br />

more valued proposition for all concerned. This brings together<br />

enhanced security with truly beneficial solutions.<br />

We believe that by embracing the new and emerging technologies,<br />

and by adopting a more holistic approach to encompass the inherent<br />

flexibility they offer, credible solutions that deliver enhanced protection,<br />

security and business benefits can be realised.<br />

Through independent testing, system and technology assessments,<br />

field-based analysis, educational articles and informed debate,<br />

Benchmark provides vital information to those seeking to create best-inclass<br />

solutions. The editorial materials included in the magazine and its<br />

on-line initiatives ensure that those who offer bespoke advanced<br />

solutions have access to honest, independent and relevant reporting<br />

that aids and supports them in their work. All editorial content is<br />

exclusive to Benchmark and is based upon real-world field trials, not on<br />

theoretical documents produced by manufacturers.<br />

Benchmark delivers its content via a monthly print-based<br />

publication, as well as a number of interactive electronic initiatives. By<br />

realising the potential that new technologies offer, enhanced solutions<br />

that deliver security and business benefits can be realised.<br />

Benchmark Independent Testing<br />

Benchmark Recommended<br />

Status is awarded to<br />

products that undergo the<br />

independent testing and<br />

assessment process and are considered<br />

to deliver genuine benefits in the<br />

design and creation of innovative and<br />

smarter solutions. Products which<br />

receive Recommended status have<br />

undergone testing and have reached a<br />

high standard.<br />

Benchmark Outstanding<br />

Status is awarded to<br />

products that undergo the<br />

independent testing and<br />

assessment process and are considered<br />

to deliver invaluable benefits to those<br />

designing and installing innovative and<br />

smarter solutions. Products which<br />

receive this status have undergone<br />

application-specific testing and have<br />

reached the very highest standards.<br />

Because products and<br />

systems in the electronic<br />

security industry are varied,<br />

there are inevitable price<br />

differences. Benchmark always<br />

considers the price/performance ratio,<br />

and makes adjustments to ratings to<br />

reflect value for money. In group tests,<br />

the product which delivers the best<br />

price/performance ratio receives the<br />

award of Benchmark Best Buy.<br />

3


VISIT US AT STAND F410<br />

Inner Range’s Integriti<br />

High Security System is<br />

a complete Hardware/<br />

Software solution designed<br />

<br />

installations.<br />

Our range includes:<br />

All Software<br />

Hardware Controllers<br />

End of Line Modules<br />

Power Supplies<br />

Keypads<br />

Enclosures<br />

Communications Devices<br />

Access Control Readers<br />

Credentials<br />

WHY TAKE CHANCES?<br />

FULL END TO END DATA ENCRYPTION EXTERNALLY CERTIFIED<br />

T: +44 845 470 5000 | E: ireurope@innerrange.co.uk innerrange.co.uk


AUGUST 2019<br />

Contents<br />

Editor<br />

Pete Conway<br />

E-mail: pete.conway@benchmarkmagazine.com<br />

Advertisement Manager<br />

Nick Tiday<br />

Tel: 020 8295 8302<br />

E-mail: nick.tiday@benchmarkmagazine.com<br />

Production<br />

Matt Jarvis<br />

Tel: 020 8295 8300<br />

E-mail: matt.jarvis@proactivpubs.co.uk<br />

Administration<br />

Tracey Cole<br />

Tel: 020 8295 8306<br />

E-mail: tracey.cole@proactivpubs.co.uk<br />

ISSN: 1750-1040<br />

Editorial and Advertisement Office<br />

PO Box 332<br />

Dartford<br />

DA1 9FF<br />

© Pro-Activ Publications Ltd 2019<br />

All rights reserved. No part of this publication may<br />

be reproduced or transmitted in any form or by any<br />

means, electronic or mechanical, including<br />

photocopy, recording, or any information storage and<br />

retrieval system, without permission in writing from<br />

the publisher.<br />

Benchmark reserves the right to alter, abridge or<br />

edit any submissions prior to publication. The views<br />

published in Benchmark are not necessarily those of<br />

the publisher.<br />

While every care has been taken to ensure<br />

accuracy in the preparation of material included in<br />

Benchmark, the publishers cannot be held responsible<br />

for the accuracy of the information contained herein,<br />

or any consequence arising from it. In the case of all<br />

product reviews, tests and assessments, judgements<br />

have been made in the context of the equipment<br />

supplied at the time of the review. Any judgements are<br />

based upon situations relevant at the time of writing,<br />

and comments relating to cost are based upon<br />

published prices available from major distributors.<br />

Comments are based upon products and systems<br />

currently available in the UK market-place.<br />

7 Editorial<br />

The evolving technological landscape can be good<br />

news for integrators and installers.<br />

8 Test: VMS for Mainstream Sites (Part 2)<br />

Benchmark looks at VMS packages which are<br />

ideal for mainstream applications, with Axis<br />

Communications’ AXIS Camera Manager and<br />

XProtect from Milestone Systems.<br />

15 SiX Event<br />

For integrators and installers, the SiX event in<br />

Manchester represents an opportunity to find out<br />

more about new and emerging technologies.<br />

17 Get Connected, Take Control<br />

Service-based solutions offer the potential to earn<br />

recurring revenue and deliver enhanced systems.<br />

18 Innovation Focus<br />

Benchmark takes a close look at the OPTEX<br />

Bridge powered by CHeKT, which offers costeffective<br />

visual verification.<br />

20 Smart Solutions: Enhanced Integrations<br />

Integrations offer power when creating bespoke<br />

solutions, and a dedicated platform can add value.<br />

22 Cloud-based Video Services<br />

The time has come for integrators and installers<br />

to reconsider cloud-based video services to<br />

enhance their solutions.<br />

26 Bulletin<br />

New products and news of interest of integrators<br />

and installers seeking to create smart solutions.<br />

29 Time-of-Flight Detection<br />

Time-of-Flight technology can be cost-effective,<br />

and enhances detector catch performance.<br />

30 Sign up for Benchmark E-News<br />

Stay updated with the Benchmark E-News service<br />

and keep informed about tests, assessments,<br />

innovation and smart technologies.<br />

32 Smart Technology: AI Trends<br />

The focus of AI implementations is starting to<br />

deliver some credible business use cases, making<br />

the technology more viable.<br />

35 Service-based Alarms<br />

With end users seeking a more service-based<br />

offering, can next generation intruder alarm<br />

systems meet their needs?<br />

38 12 To Try: Network Infrastructure<br />

Benchmark looks at a dozen products and<br />

services which will be of interest to those<br />

delivering networked solutions.<br />

44 Dynamic Encoding<br />

Can dynamic encoding offer a credible solution to<br />

bandwidth management?<br />

50 Benchmark Innovation Awards 2019<br />

The finalists for the 2019 awards are announced,<br />

with a look at the various products.<br />

58 Benchmark Online<br />

Benchmark’s website is a valuable resource for<br />

those seeking to deliver smart solutions.<br />

20<br />

28<br />

38<br />

5


Start<br />

your free<br />

trial today!<br />

Manage, configure and control your<br />

alarm system portfolio<br />

• Manage access by system<br />

• Control by individual engineer<br />

• Fully audited access records<br />

Managed Access<br />

Texecom Cloud gives you complete control over your alarm system portfolio,<br />

including safeguards to ensure only the right people have access to the right data.<br />

Intelligent and dynamic system labelling tools make controlling, recording and<br />

removing engineering access rights to systems simple and straightforward.<br />

Sales:<br />

+44 (0)1706 212524<br />

Start your free trial today<br />

www.cloud.texe.com


COMMENT<br />

Editorial Comment...<br />

During IFSEC, a number of interesting<br />

conversations highlighted how the<br />

relationship between integrators or<br />

installers and their end user customers can be<br />

enhanced thanks to emerging technologies<br />

and changing working practices. Several<br />

engineers explained how their business has<br />

grown, simply due to the fact that customers<br />

are increasingly receptive to proposals that<br />

target their businesses or organisations.<br />

For a lot of companies, the way they decide<br />

on security budgets is formulaic. Their insurer<br />

informs them the annual premiums will rise by<br />

£X,000 unless they increase security, and that<br />

figure then becomes the maximum they will<br />

invest in systems or upgrades. There are<br />

exceptions, but this scenario happens in a lot<br />

of cases. Integrators and installers then bid,<br />

knowing others will come in under that cost.<br />

This gives the perception that end users only<br />

care about price and are unwilling to pay the<br />

price for a system which delivers more.<br />

The integrators and installers I spoke to<br />

faced a very similar situation. The potential<br />

customer had a fixed budget and a general<br />

idea of what they wanted to achieve. However,<br />

it soon became clear that any system meeting<br />

the budget would include compromises, yet<br />

for a small amount more a credible and<br />

effective solution could be put in place. It’s a<br />

scenario many of you will be familiar with.<br />

The four of five engineers I spoke to, all in<br />

separate conversations, took a very similar<br />

approach. Firstly, the put together a tender<br />

which created a system within the customers’<br />

budgets. Then they added another document<br />

which outlined the compromises which had to<br />

be made to meet the budget, and put forward<br />

a second proposal which not only removed<br />

those compromises, but also added extra<br />

benefits of a non-security nature. The<br />

proposal focused on the total cost of<br />

ownership over the lifetime of the system, the<br />

potential return on investment created by<br />

efficiencies which the system could provide,<br />

and the potential for future upgrades and<br />

scalability should the need arise.<br />

Interestingly, all presented different<br />

additional benefits, based upon the needs of<br />

There can be no denying the entire solutions-based<br />

security industry is undergoing change. The<br />

technological landscape is developing at a rapid<br />

pace, communications, AI and processing are<br />

creating opportunities, the end user is aware of<br />

smart technologies and bespoke solutions are in<br />

demand. Customers’ expectations are changing,<br />

and that can only be a good thing.<br />

the individual sites. One offered power<br />

management, another monitoring of fridges<br />

and freezers, and one proposed tracking of<br />

company assets.<br />

One integrator told me the facilities<br />

manager at the site called him personally to<br />

point out how the second proposal made<br />

sense, and clearly illustrated why he would be<br />

their choice for a trusted partner. The others<br />

also reported a positive reaction from the<br />

customer, with one actually being asked if<br />

additional services could be added.<br />

The bottom line is simple: all won contracts<br />

at a higher value than the initial budget,<br />

because they offered benefits the user could<br />

understand, and which offered security and<br />

business efficiencies.<br />

The proposal focused on the total cost of ownership, the potential<br />

return on investment created by business efficiencies, and the<br />

potential for future upgrades and scalability should the need arise.<br />

7


BENCHMARK TEST<br />

TEST: VMS for Mainstream<br />

Applications (Part 2)<br />

Milestone: XProtect<br />

Axis: AXIS Camera Station<br />

AXIS Camera Station (ACS) is a VMS package from<br />

Axis Communications. It is aimed at small- to<br />

medium-sized applications and has been optimised<br />

for use with Axis’ own cameras. However, it also supports a number of devices which utilise<br />

ONVIF’s Profile S. This requires a higher licence level and compatibility might be limited in terms<br />

of which camera features are supported by the VMS.<br />

The GUI has been optimised for systems with lower camera counts. The VMS works with all<br />

video resolutions up to 20 megapixels (including 4K UHD) and frame rates of up to 120fps.<br />

Supported video formats include H.264 , H.265 and M-JPEG.<br />

ACS is available pre-loaded onto appliances, or as a service-based subscription model.<br />

The XProtect series of VMS software packages from Milestone Systems<br />

range from an entry-level free-of-charge package right up to an enterpriselevel<br />

edition for multiple sites. When considering packages for<br />

mainstream applications, there are three main choices: Essential+,<br />

Express+ and Professional+. There are Express and Professional versions,<br />

but we’d expect those to be retired in the near future. The ‘+’ versions use<br />

an enhanced code base which includes a number of benefits over the basic versions.<br />

The Essential+ version is free of charge, but only supports 8 cameras on a single server.<br />

Express+ supports up to 48 cameras on a single server, while Professional+ supports unlimited<br />

cameras and unlimited servers. Unlimited users are supported via the free-of-charge Smart<br />

Client on all versions.<br />

The software is compatible with the majority of video formats including H.265, H.264, M-JPEG<br />

and MPEG-4; it can also support 4K devices. The software supports a wide range of cameras,<br />

encoders, I/O devices and other systems including access control.<br />

All XProtect versions include an advanced rules engine for AND/OR programming, hardwarebased<br />

acceleration for decoding, maps functionality and Microsoft Active Directory support.<br />

The growth in VMS deployments for video<br />

surveillance and security management has grown<br />

significantly in recent years, and for good reason.<br />

Many VMS providers take an open platform<br />

approach, ensuring third party devices can be easily<br />

supported. This enables the creation of ‘best of<br />

breed’ solutions. While often considered as an ideal<br />

solution for large and complex sites, VMS systems<br />

have increasingly won favour with integrators and<br />

installers for mainstream applications due to their<br />

highly flexible capabilities.<br />

In the past the mainstream video<br />

surveillance market was very much<br />

hardware-centric when it came to recording<br />

and system management. However, with<br />

today’s evolving technological landscape, the<br />

case for open platform VMS solutions is<br />

becoming ever more compelling.<br />

The leading VMS packages often combine<br />

video management and recording, IVA<br />

implementations, as well as integrations with<br />

access control, perimeter protection, intruder<br />

detection, building management, business<br />

intelligence and a host of other sub-systems.<br />

In many cases, a VMS can provide an<br />

advanced and flexible security management<br />

solution which is highly cost-effective. The<br />

depth of flexibility and the ability to create<br />

8


BENCHMARK TEST<br />

truly bespoke solutions can be deployed in<br />

many different ways.<br />

There are a number of driving factors when<br />

specifying a VMS-based system for<br />

mainstream applications. The systems deliver<br />

simple installation and integration of a wide<br />

range of third party devices. Open platform<br />

VMS packages support the majority of devices<br />

from professional security manufacturers,<br />

with the market-leaders boasting thousands<br />

of supported products. This eliminates<br />

frustrations associated with single-brand<br />

hardware options.<br />

Often hardware-based recorders have<br />

limitations with regards to third party<br />

compatibility. Many NVRs only support the<br />

manufacturer’s own cameras and codecs,<br />

sometimes along with a few models from a<br />

limited number of partner companies. In some<br />

cases, future firmware upgrades don’t support<br />

new camera models from other<br />

manufacturers, so systems cannot be<br />

upgraded as technologies advance.<br />

Not only will an open platform VMS offer a<br />

vast array of supported third party models,<br />

but because drivers have been created<br />

specifically for the individual devices, all<br />

features should be supported.<br />

Another driver for the deployment of VMS<br />

solutions is the fact that they are scalable and<br />

upgradable. As the system is software-based,<br />

new developments can be quickly<br />

implemented, ensuring end users can realise<br />

the full potential from their investment.<br />

Many integrators and installers who switch<br />

to VMS platforms find the functionality and<br />

flexibility on offer is far in excess of what is<br />

available from similar hardware solutions.<br />

Additionally, they discover the available<br />

features are also superior to those available<br />

from higher cost hardware-based options.<br />

Axis: AXIS Camera Station<br />

AXIS Camera Station (ACS) is a VMS package<br />

from Axis Communications. It is aimed at<br />

small- to medium-sized applications and has<br />

been optimised for use with Axis’ own<br />

cameras. However, it also supports a number<br />

of devices which utilise ONVIF’s Profile S. This<br />

requires a higher licence level and<br />

compatibility might be limited in terms of<br />

which camera features are supported by the<br />

VMS.<br />

The GUI has been optimised for systems<br />

with lower camera counts. The VMS works<br />

with all video resolutions up to 20 megapixels<br />

(including 4K UHD) and frame rates of up to<br />

120fps. Supported video formats include<br />

H.264 , H.265 and M-JPEG.<br />

The two licensing options are Core and<br />

Universal. The Core licence allows the use of<br />

devices from Axis Communications only. The<br />

Universal licence is required if any third-party<br />

devices are used. It is worth noting that ACS<br />

used to be limited to 32 Core licences,<br />

meaning a higher amount of Axis devices still<br />

required the more expensive licence.<br />

However, from version 5.17, this has been<br />

changed. The VMS is also supported by AXIS<br />

Site Designer, which simplifies the task of<br />

specifying a system.<br />

ACS is available pre-loaded onto<br />

appliances, or as a service-based subscription<br />

model.<br />

9


BENCHMARK TEST<br />

ACS is supplied as a single .exe file; the file<br />

size is slender in comparison with some other<br />

VMS packages, and this makes the download<br />

and installation fast and simple. On starting<br />

the installation wizard, the installation<br />

executable file will check if the server<br />

hardware has the required version of the .NET<br />

framework. If it cannot detect the presence of<br />

the appropriate version, the package will<br />

install it automatically.<br />

With the VMS installed, the software<br />

searches for connected devices. The only<br />

interaction needed is to apply the correct<br />

passwords. Where multiple devices are added<br />

together and all have the same secure<br />

password, it is a simple task to apply the<br />

entered password to all devices which do not<br />

have a known password.<br />

In reality, if you’ve set some base<br />

configurations before attaching the cameras,<br />

Axis’ secure password policy will have forced<br />

a change from the default. It is possible to<br />

change camera configurations from within the<br />

VMS, but most installers will prefer to do this<br />

via the camera interface.<br />

Another option is to use the AXIS Site<br />

Designer tool. While not part of this test, we<br />

have seen a demo of the software and it<br />

greatly simplifies the design and configuration<br />

of the system. Config files can then be loaded<br />

into ACS, making initial set-up a simple and<br />

quick task. For many engineers looking to<br />

implement Axis-specific solutions, it will be a<br />

benefit.<br />

The installation and discovery process is<br />

very simple, as you’d expect with a<br />

predominantly own-brand VMS. Working with<br />

ONVIF devices doesn’t actually change the<br />

process, but the Site Designer tool is Axis<br />

specific.<br />

Once the cameras are discovered and<br />

authorised, adding them to the system gives a<br />

choice of a quick configuration or using a Site<br />

Designer configuration from the already<br />

mentioned Site Designer tool. The quick<br />

configuration option sets retention time,<br />

recording storage and recording mode, which<br />

allows the system to be up and running before<br />

you fine-tine the configurations.<br />

The GUI has menu options for Device,<br />

Storage, Recording and Events, Client,<br />

Connected Services, Server, Licenses and<br />

Security. The layout has a clean, modern<br />

design and is easy to follow. After some of the<br />

established VMS packages which still have<br />

their GUI design rooted in the days when<br />

Windows Servers were considered the<br />

pinnacle of software aesthetics, it’s a<br />

refreshing look.<br />

Much of the functionality of ACS will be selfexplanatory<br />

for integrators and installers who<br />

have worked with any VMS before. Playback<br />

utilises timeline scrubbing, time and date<br />

search and smart search options, and<br />

recordings of interest can be locked to<br />

prevent overwriting.<br />

Alarms and events are managed by Action<br />

Rules. These are simple relationships based<br />

upon trigger events and subsequent actions<br />

to manage incidents.<br />

Implementing Action Rules is a simple way<br />

to create advanced flexibility, allowing smart<br />

control over several system attributes.<br />

Action rules are created by specifying a<br />

trigger event, a subsequent action and a<br />

schedule period during which the rule is live.<br />

Available triggers and actions are shown in<br />

drop-down menus, making the process<br />

relatively fool-proof. If, for example, a camera<br />

has inputs and outputs, these are shown as<br />

options. If it does not, the choice will not<br />

appear in the menu.<br />

ACS is an intuitive VMS, and all the<br />

functionality is easy to access. While it does<br />

favour Axis-only applications, the option is<br />

there to add licensing for ONVIF devices. The<br />

latest changes have elevated it in terms of<br />

performance, but it remains an option best<br />

suited to Axis-centric sites.<br />

Milestone: XProtect<br />

The XProtect series of VMS software packages<br />

from Milestone Systems range from an entrylevel<br />

free-of-charge package right up to an<br />

enterprise-level edition for multiple sites.<br />

When considering packages for mainstream<br />

applications, there are three main choices:<br />

Essential+, Express+ and Professional+. There<br />

are Express and Professional versions, but<br />

we’d expect those to be retired in the near<br />

future. The ‘+’ versions use an enhanced code<br />

base which includes a number of benefits over<br />

the basic versions.<br />

The Essential+ version is free of charge, but<br />

only supports 8 cameras on a single server.<br />

10


Save<br />

the<br />

Date...


BENCHMARK TEST<br />

Express+ supports up to 48 cameras on a<br />

single server, while Professional+ supports<br />

unlimited cameras and unlimited servers.<br />

Unlimited users are supported via the free-ofcharge<br />

Smart Client on all versions.<br />

The software is compatible with the<br />

majority of video formats including H.265,<br />

H.264, M-JPEG and MPEG-4; it can also<br />

support 4K devices. The software supports a<br />

wide range of cameras, encoders, I/O devices<br />

and other systems including access control.<br />

All XProtect versions include an advanced<br />

rules engine for AND/OR programming,<br />

hardware-based acceleration for decoding,<br />

maps functionality and Microsoft Active<br />

Directory support.<br />

For the purposes of the test we are focusing<br />

on XProtect Expert+, but much of the core<br />

functionality is similar.<br />

XProtect Expert+ software is supplied as a<br />

single .exe file, which is downloaded from the<br />

Milestone website. The file is pretty hefty,<br />

because Milestone offers a single software<br />

executable file which is used for all versions<br />

of XProtect, including the enterprise variants.<br />

Which version is installed depends on the<br />

licence added at the start of the installation<br />

process. The XProtect package does include a<br />

copy of the Smart Client, but even with that<br />

included the file is large.<br />

You will need to ensure that the server has<br />

the appropriate version of the Microsoft .NET<br />

framework installed before adding Expert+.<br />

This is a free Microsoft software package and<br />

is simple to add; unlike many VMS packages,<br />

the XProtect installer doesn’t add it, but<br />

instead shows an error message and closes.<br />

XProtect has never been the swiftest<br />

installation for a VMS: it can take around 20<br />

minutes to complete the install, but<br />

it must be said aside from a few<br />

basic selections at the start the<br />

process is automatic.<br />

The two main elements of XProtect<br />

are the Management Client and the<br />

Smart Client. There are other<br />

elements such as the Mobile Client,<br />

but the Management and Smart<br />

Client are key to configuring the<br />

system. The former is used by the<br />

integrator or installers to set up and<br />

configure the system, while the<br />

latter is the user interface for day-today<br />

operations. The Smart Client is<br />

necessary for the engineer to view<br />

feeds and check displays, etc..<br />

Discovering devices is<br />

straightforward, and is carried out<br />

by adding hardware to the Recording<br />

Server. Hardware is automatically<br />

discovered; there is an option to update<br />

authentication details. Individual devices can<br />

also be added manually.<br />

For some who are new to the Milestone<br />

interface, the Management Client may seem<br />

complex. It borrows it look from the treestructure<br />

of Windows Servers. There are a lot<br />

of options, but if configured one section at a<br />

time it makes sense. Have no doubt about it,<br />

XProtect is flexible, allowing a huge number of<br />

parameters (including those of supported<br />

cameras) to be adjusted from the VMS. It does<br />

take longer than many other VMS software to<br />

configure, but it’s hard to complain when the<br />

functionality has a high degree of<br />

adjustability.<br />

Once you get used to the menu flow, you<br />

start to appreciate just how engineer-friendly<br />

XProtect is. A great example is how the<br />

system deals with alarm events and<br />

subsequent actions. This is done via Rules,<br />

which make use of AND/OR logic. Trigger<br />

events can be simple or complex, but all are<br />

simple to set via drop-down menus and<br />

clickable links. Not only are rules easy to<br />

implement, but errors don’t happen as only<br />

available functions for each device are shown.<br />

Multiple triggers can be set, allowing events<br />

to be filtered by a whole variety of criteria.<br />

The Smart Client interface is intuitive and<br />

simple to use, and does what is required with<br />

regard to video management. At first glance it<br />

may appear to be somewhat minimalist, but it<br />

uses a number of contextual menus, and once<br />

you become accustomed to how the menus<br />

work there is a depth of easy-to-access<br />

functionality and control on offer.<br />

The Smart Client is very different to the<br />

Management Client in terms of appearance,<br />

12


BENCHMARK<br />

...The Event of 2019<br />

5/6 November<br />

SiX<br />

19<br />

2 November 5/6<br />

Dedicated to Installers & Integrators<br />

In Association with:<br />

sixevent.co.uk<br />

ORGANISED BY Pro-Activ<br />

CONTACT: David Lewis on 0208 295 8309 (david.lewis@proactivpubs.co.uk) or Nick Tiday 0208 295 8302 (nick.tiday@benchmarkmagazine.com)


BENCHMARK TEST<br />

and offers a sleek and modern HTML5-type<br />

feel, echoing many user-facing software<br />

packages. Performance is stable, and if you’re<br />

viewing multiple high resolution streams, it’s<br />

best to use hardware acceleration to ensure<br />

smooth displays. Otherwise, there’s little to<br />

fault with the interface.<br />

XProtect works well. There aren’t any<br />

features you’d need for a mainstream<br />

application which are missing, it delivers a<br />

high level of flexibility, and is a very robust<br />

platform. During the test it didn’t miss a beat,<br />

and delivered the advanced functionality you<br />

will expect from a VMS solution.<br />

BENCHMARK VERDICT<br />

Axis: AXIS Camera Station<br />

AXIS Camera Station (ACS) is unashamedly biased towards systems which use Axis devices,<br />

and much of the functionality – such as support for Zipstream, Lightfinder and other Axis<br />

technologies – is a benefit to those who’ve opted to use the cameras. Being aimed at small- to<br />

medium-sized applications, and optimised for use in such applications, does make it stand<br />

out from the crowd. It can be used with third party devices, but most integrators will select<br />

ACS for the additional benefits, such as AXIS Site Designer. ACS has been well thought out,<br />

and offers a high level of value. As such, it has to be given Recommended status, albeit with<br />

the proviso there are better choices if you don’t have an estate of Axis devices.<br />

Milestone: XProtect<br />

The XProtect series of VMS software packages from Milestone Systems has pretty much<br />

become the standard VMS against which all others are judged. It has flexibility in spades, the<br />

performance is high and operation is reliable and as expected from a leading product. At the<br />

enterprise end of the market, it’s consistently one of the outstanding VMS choices for<br />

integrators looking to create a bespoke solution. For mainstream applications where less<br />

bespoke functionality is required, the VMS is still impressive, and it’s hard to knock the<br />

software, but some integrators and installers might find it overkill. Despite this, it does<br />

elevate security system design and as such it has to ge given Recommended status.<br />

Cathexis: CathexisVision 2019<br />

CathexisVision 2019 is an ideal VMS for mainstream applications, and one which we think<br />

more integrators and installers should consider. At first it does have a strange almost minimal<br />

feel, despite offering a full range of functions and features often only found on more costly<br />

high-end products. It includes some high-end flexibility with regard to event management,<br />

and together with an ease of customisation, it as a management option which will be of<br />

interest to integrators and installers creating smarter solutions. The implementation is very<br />

installer-friendly, which aides fast configuration, and because the software is relatively lean it<br />

runs smoothly, delivering consistent performance. Because of this, CathexisVision 2019 is<br />

rated as Recommended for use in mainstream applications.<br />

Hanwha Techwin: Wisenet Wave<br />

When Wisenet Wave first appeared, it had a few rough edges which were only to be expected<br />

as it was a new implementation of a VMS, albeit one where the core code was based upon a<br />

previously established product. Hanwha Techwin has since added some refinements and<br />

generally overhauled much of the operational side of the product, and as such it is a more<br />

dependable choice than before. It is easy to work with, but it could be further improved. It<br />

would churlish to pick fault, as it has come a long way, but it still lacks some of the<br />

refinements which other longer established products have. That said, the installation and<br />

configuration process are straightforward, although we did have a few early freezes during<br />

the licensing stage. The event management options have improved, but still lack some of the<br />

more advanced features of other VMS products. Because of this, Wisenet Wave is rated as<br />

Recommended for mainstream applications, with the proviso that it is suitable for those with<br />

a need for basic alarms.<br />

14


SiX<br />

SiX: an essential event for<br />

integrators and installers<br />

For many system integrators and security<br />

installers, the future of the security<br />

industry is dependent upon the delivery<br />

of enhanced flexibility. Increasingly, end users<br />

are seeking features and functionality which<br />

fits with their vision of a smarter future. As a<br />

result, intelligent technologies which provide<br />

advanced capabilities, scalable systems and<br />

bespoke solutions are not just expected; they<br />

are demanded by many businesses and<br />

organisations.<br />

Today’s technologies allow integrators and<br />

installers to not only deliver higher than ever<br />

levels of security and protection to businesses<br />

and organisations, but also enable them to<br />

offer a high level of benefits and added value<br />

which create business efficiencies. By<br />

ensuring end users enjoy a greater return on<br />

investment, integrators and installers taking a<br />

smart approach to business can enjoy an<br />

increased willingness by their customers to<br />

invest in smarter systems and solutions.<br />

Demand for smart and more efficient<br />

systems is high, and everyday there are more<br />

customers seeking such solutions. With many<br />

of the new and emerging technologies having<br />

a significant impact on the security arena, the<br />

flexibility and scalability of systems is<br />

constantly being enhanced. Security is not<br />

just about reducing the risk of crime. It now<br />

includes provision of a range of benefits such<br />

as compliance, asset management, building<br />

control, business intelligence and duty of care<br />

monitoring.<br />

It is vital that system integrators and<br />

security installers realise the value in these<br />

systems and ensure they offer solutions that<br />

meet customer expectations. Developments<br />

in other technology-based sectors are raising<br />

the bar in terms of performance, and end<br />

users expect the same from security.<br />

Attending Six in Manchester later this year<br />

will enable integrators and installers to<br />

network with innovative, market-leading<br />

manufacturers and service providers. SiX<br />

SiX<br />

19<br />

On 5-6 November 2019, SiX, an event specifically<br />

targeted at system integrators and security<br />

installers interested in the design, delivery and<br />

implementation of smarter solutions will take place<br />

at Event City in Manchester. Given the rapidly<br />

evolving technological landscape in today’s security<br />

sector, and the emerging technologies which add<br />

value for end users, this event promises to link<br />

forward-thinking engineers with similarly minded<br />

manufacturers and service providers.<br />

will create the only event dedicated to the<br />

delivery of efficient and value-added<br />

solutions.<br />

The event will include a conference<br />

programme, hands-on sessions and the<br />

ability to meet with manufacturers and<br />

service providers to discuss technology,<br />

implementations, integrations and other<br />

needs when creating and delivering best-ofbreed<br />

security solutions. Registration to<br />

attend is free-of-charge.<br />

2 November 5/6<br />

For event registration, visit: sixevent.co.uk<br />

15


ADVERTISEMENT FEATURE<br />

Axis Communications IFSEC<br />

Show highlights<br />

Learn more at www.axis.com<br />

With no shortage of headlines around the<br />

globe in the last year that serve to<br />

highlight the growing importance of<br />

security, Axis welcomed the start of IFSEC<br />

International in London. Kicking off the<br />

exhibition were a number of exciting<br />

announcements including new products,<br />

partner initiatives and the launch of a Smart<br />

Cities and Smart Buildings whitepaper that<br />

demonstrates how Axis continues to innovate<br />

for a smarter, safer world. The Axis Daily Report<br />

captured on film the highlights of each day as it<br />

unfolded, with discussions on topics ranging<br />

from cybersecurity, sustainability, analytics and<br />

the rise in cloud-based ‘as-a-service’ security<br />

solutions.<br />

Cybersecurity topped the agenda, with<br />

cybersecurity expert Steve Kenny involved in<br />

several speaker events including delivering a<br />

keynote on the topic, being involved in a panel<br />

debate on biometrics, while leading discussions<br />

on the subject at the Axis-hosted consultants’<br />

lunch. Visitors learned about what Axis is doing<br />

to improve its cyber credentials, the importance<br />

of a trusted supply chain and how security<br />

accreditations, such as Cyber Essentials Plus,<br />

demonstrate Axis’ ongoing commitment to<br />

being the best it can be.<br />

New product announcements were as much a<br />

part of the fabric of IFSEC this year as years<br />

past. Axis’s new 7th generation ARTPEC chip is<br />

optimised for network video and delivering new<br />

capabilities including better imaging, enhanced<br />

security, powerful compression and the ability<br />

to run analytics at the edge. Axis also launched<br />

the Axis Camera Station System-as-a-Service,<br />

an exciting opportunity to access the proven<br />

video management software based on a<br />

recurring monthly payment model. Also on the<br />

stand was Axis’ range of integrated IP audio<br />

solutions that add features including public<br />

address, background music and scheduled<br />

announcements to an existing surveillance<br />

system.<br />

Two of Axis’ partners had a presence on the<br />

stand, with Morphean announcing its<br />

technology partnership with Simons-Voss, to<br />

enable its Access Control-as-a-Service, a<br />

solution that utilises door controllers from Axis<br />

Communications. The AXIS A1001 and the AXIS<br />

A1601 serve as the interface between the cloud<br />

and the SimonsVoss’ SmartIntego door locking<br />

system. Milestone Systems presented<br />

demonstrations of Axis Optimiser for Milestone<br />

XProtect, a suite of plug-ins and features that<br />

optimise the usability of Axis cameras in<br />

XProtect.<br />

Axis’ sustainability agenda, along with ethics<br />

and values, was again one of the main<br />

prevailing themes. The ethics and values behind<br />

Axis’ technology are as important as the<br />

technology itself, and the company has a<br />

continuing commitment to put purpose beyond<br />

profit.<br />

The strength of the Axis Communications<br />

brand relies on the strong relationship between<br />

customers, partners and employees. In an era of<br />

heightened conscious capitalism, Axis’ focus on<br />

safeguarding the welfare of people and planet<br />

is key. This was confirmed by Great Place to<br />

Work who recognised Axis as one of the UK’s<br />

Best Workplaces in 2019. Axis Communications<br />

ranked 10th in the Small Business category.<br />

Axis is immensely proud of its people, and<br />

the confidence and camaraderie between Axis<br />

and its partners is evident. Axis’ employees<br />

continue to surprise by their commitment, not<br />

only to each other, but to benefit others as part<br />

of a responsibility to society.<br />

On the final day, the UK Surveillance Camera<br />

Commissioner announced the first voluntary<br />

cybersecurity standard and compliance<br />

certification mark for the manufacturers of<br />

surveillance cameras. Axis played a part in the<br />

development of the standard and wholly<br />

welcomed its introduction.<br />

Whether developing and implementing new<br />

technologies and services or doing its bit to<br />

help the planet and support others, Axis<br />

remains committed to its central focus:<br />

innovating for a smarter, safer world.<br />

16


TECHNOLOGY<br />

Get Connected, Take Control<br />

For many professional system integrators<br />

and security installers, the evolving<br />

technological landscape is creating<br />

additional opportunities when it comes to the<br />

delivery of added-value solutions. Customers<br />

not only expect seamless and immediate<br />

service; they demand it. If user expectations<br />

are to be met, then engineers need to be both<br />

flexible and agile.<br />

SaaS (Software-as-a-Service) allows a high<br />

degree of flexibility, allowing users to pick<br />

and choose which elements of a system are<br />

important to them, prioritising on receiving<br />

the features and support they require. The<br />

solutions are also cost-effective. This is<br />

because the provision is from experts who<br />

maintain, update and deliver the software<br />

functionality. There is no need for dedicated<br />

server space running programs, and<br />

maintenance issues are taken by the service<br />

provider. Finally, the solutions are benefitsrich,<br />

adding value to everyday operations and<br />

increasing business efficiency.<br />

For integrators and installers, the fact that<br />

end users understand and appreciate the<br />

benefits of SaaS is a bonus. When offering<br />

SaaS-enabled systems, the customer will<br />

immediately understand the benefits in terms<br />

of cost-savings, lack of disruption and the<br />

advantage of a subscription-based model.<br />

However, there are a number of other<br />

advantages to this approach for engineers.<br />

Software set-up and configuration is<br />

simplified, and updates occur automatically in<br />

the cloud, so the software is always up to<br />

date. Maintenance and health-checks on the<br />

system can be carried out remotely, and<br />

issues can be identified and dealt with before<br />

a problem arises. The SaaS approach also<br />

generates recurring revenue for the integrator<br />

or installer.<br />

Enhanced control<br />

SaaS can deliver an enhanced level of control<br />

for integrators and installers. This is<br />

evidenced by considering SPC Connect from<br />

Vanderbilt. SPC Connect is a cloud-based<br />

SaaS solution which connects with SPC<br />

control panels to deliver a wealth of benefits<br />

and proactive control over an entire estate of<br />

systems. The intuitive software allows<br />

integrators and installers to manage and<br />

maintain all SPC panels from any location.<br />

The benefits are immediately obvious,<br />

allowing integrators and installers to better<br />

manage their field<br />

personnel. Specific<br />

roles and<br />

permissions can be<br />

granted to individual<br />

engineers, ensuring<br />

a secure hierarchy is<br />

in place, and control<br />

panels can be<br />

grouped to improve<br />

management.<br />

Groups can be<br />

geographical, or by<br />

customer, thus ensuring the right engineers<br />

can access relevant systems.<br />

Remote maintenance and health-checks<br />

allow engineers to carry out regular<br />

assessments of systems, identifying any need<br />

for maintenance and often identifying<br />

potential issues before they become a<br />

problem for the customer. This ensures the<br />

installation company is seen as being on the<br />

front foot by the end user. Also, as systems<br />

become smarter and offer additional benefits<br />

to customers, an engineer can react to<br />

requests for configuration changes<br />

immediately, without visiting the site.<br />

As is the nature with technical devices,<br />

problems will sometimes arise. Using SPC<br />

Connect, the latest configuration file can be<br />

downloaded by the engineer and saved.<br />

Should an error occur, the last correct<br />

configuration file can be remotely uploaded to<br />

the control panel, usually resolving any<br />

problems in a very short time. This is also a<br />

benefit where several sites require the same<br />

or very similar configurations, such as with<br />

chain retail stores of multi-tenanted offices.<br />

Finally, SPC Connect is used to power<br />

mobile apps for end users, ensuring<br />

customers have access and control over their<br />

systems in a way they prefer.<br />

In summary<br />

SaaS is continuing to grow in other sectors,<br />

and as such many business and organisations<br />

expect the approach from their security<br />

providers. Using a cloud-based option such as<br />

SPC Connect delivers the benefits end users<br />

are demanding, and also offers value to<br />

integrators and installers.<br />

Get connected and take control with Vanderbilt’s award-winning SPC Connect<br />

service-based solution. https://vanderbiltindustries.com/spcconnect<br />

17


INNOVATION FOCUS<br />

INNOVATION FOCUS: OPTEX<br />

Bridge Powered by CHeKT<br />

Increasingly, visual<br />

verification of events<br />

and incidents is a<br />

sought-after function.<br />

While sequential<br />

confirmation has its<br />

place, the reality is that<br />

video delivers<br />

information which<br />

provides a higher<br />

degree of certainty as to<br />

what has caused an<br />

alarm event. For sites<br />

which don’t have the<br />

budget to implement a<br />

full video surveillance<br />

system to link to<br />

intruder alarms, the<br />

OPTEX Bridge, powered<br />

by CHeKT, offers a costeffective<br />

solution.<br />

Ever since<br />

the demand grew for<br />

verified alarm activations, integrators<br />

and installers have had two credible choices:<br />

visual verification or sequential verification.<br />

The use of audio as a verification tool was<br />

called into doubt many years, and even now it<br />

remains an option few would consider.<br />

It has to be remembered that the goal<br />

of verification is to allow a remote<br />

operator, who will usually not be<br />

familiar with the site, to assess whether<br />

or not an alarm is genuine or a nuisance<br />

event.<br />

In the intruder alarm sector,<br />

sequential verification became<br />

established as the first choice, not because it<br />

was better than visual verification, but<br />

because it was more cost-effective and<br />

simpler to implement. At the time, video was<br />

predominantly analogue, and creating a<br />

seamless integration with intruder alarms was<br />

costly and time-consuming.<br />

18


INNOVATION FOCUS<br />

In today’s security sector, visual verification<br />

is not only simple to implement, but it also<br />

allows the creation of smarter solutions.<br />

However, it is often dependent upon the<br />

implementation of a digital video surveillance<br />

system. While there is no doubting the<br />

flexibility and scalability available from VMS<br />

software, integrators and installers are often<br />

constrained by budgetary considerations.<br />

Where an end user has limited funds, they<br />

will typically opt for an intruder alarm system<br />

as it represents a good level of protection in a<br />

cost-effective package. While many intruder<br />

detection systems allow the addition of video<br />

cameras, these are usually viewed by the<br />

user, via an app, and are designed for either<br />

self-monitoring or for life-style applications.<br />

The issue is where a commercial or<br />

industrial business or organisation requires a<br />

graded alarm system, along with visual<br />

verification which can be used by a (often<br />

third party) control room or monitoring centre.<br />

OPTEX offers a solution in the form of its<br />

OPTEX Bridge powered by CHeKT.<br />

What is it?<br />

The OPTEX Bridge powered by CHeKT is a data<br />

bridge which can be connected to zones on<br />

any professional quality intruder detection<br />

control panel. It is effectively ‘invisible’ to the<br />

alarm system. It also connects to ONVIF<br />

Profile S-compatible cameras, allowing<br />

images from zones in alarm to be sent to an<br />

ARC or central control room when an event<br />

takes place.<br />

By bridging the two separate systems, it<br />

allows an intruder detection system to be<br />

supplemented by a single camera, a basic<br />

video surveillance system or a combination of<br />

devices, ensuring legacy equipment can be<br />

reused and cost-effective upgrades are always<br />

possible.<br />

The OPTEX Bridge powered by CHeKT also<br />

includes a cloud service which enables<br />

interaction between the site, the ARC and the<br />

user.<br />

Installation of the Bridge is claimed to be<br />

quick and easy. It requires looping of the zone<br />

wiring through the bridge hardware device.<br />

The next step is to add an ONVIF Profile S-<br />

compatible camera, and this is then linked to<br />

the relevant zone. There is no need for port<br />

forwarding or firewall configurations, and<br />

mapping between alarm panel zones and<br />

video devices has been designed to be<br />

intuitive.<br />

Because the Bridge is used for visual<br />

verification rather than monitoring,<br />

transmission of data is quick and simple. This<br />

ensures the delivery of relevant images do not<br />

cause a delay in the handling of alarm events.<br />

There is also an option for a designated user<br />

to receive the images, allowing them to accept<br />

or reject an event cause.<br />

How does it work?<br />

When an alarm activation occurs, the alarm<br />

data is sent to the ARC or control room as<br />

normal. The ARC operator can then view the<br />

associated images, via a cloud portal, within a<br />

matter of seconds. It is important to note that<br />

ARCs will not require additional software or<br />

dedicated hardware to do this. They will then<br />

be presented with images which show the<br />

cause of the event.<br />

Based on the visual verification, they can<br />

either action a police response or close the<br />

alarm.<br />

It has to be accepted that whilst visual<br />

verification is significantly more effective than<br />

sequential verification, it’s not always perfect.<br />

If the operator is unsure as to whether or not<br />

the alarm event is valid, they can access video<br />

devices at the site via a monitoring portal if<br />

authorised to do so.<br />

If there remains any doubt about the<br />

validity of an event, the operator can push the<br />

images and alarm data to the user, via an app.<br />

The operator receives a real-time notification<br />

if the user is viewing the information. This<br />

allows them to wait when they’re aware the<br />

images are being viewed. If there is no<br />

response from the user, they can proceed with<br />

passing the alarm to the police.<br />

When the user receives and views the<br />

images, they can then, via a single button<br />

press on their smart device, send a message<br />

to the ARC to either action the alarm or it clear<br />

it down.<br />

Features and functions<br />

The actual Bridge hardware is a small device,<br />

measuring approximately 82 x 100 x 36mm.<br />

The unit supports four alarm input zones and<br />

one trouble output. It includes a 10/100Base T<br />

LAN port and is powered by a 12V DC source.<br />

Manufactured from white polycarbonate,<br />

the device also includes an SDHC card slot<br />

and an audio output. LEDs are used for status<br />

updates (indicating power, status and alarm<br />

condition).<br />

The Bridge can be wired for zone<br />

passthrough or relay output, offering a range<br />

of options to suit various panels and sites.<br />

In summary<br />

OPTEX Bridge powered by CHeKT allows any<br />

professional intruder alarm panel to be<br />

upgraded to deliver monitored visual<br />

verification, quickly and cost-effectively.<br />

19


SMART SOLUTIONS<br />

Increasing Success with<br />

Expanded Integrations<br />

Increasingly, end users are seeking and investing in<br />

solutions which not only deliver credible and robust<br />

security functionality, but also ensure added value<br />

can be realised. With demand for greater levels of<br />

flexibility on the rise, it is no longer enough for a<br />

security solution to only offer protection for people<br />

and assets. While this will remain the core reason<br />

for specifying such a solution, integrators and<br />

installers must be able to offer additional benefits.<br />

In today’s rapidly evolving security sector,<br />

integration is the order of the day.<br />

Customers do not want disparate systems<br />

which operate independently of each other.<br />

The evolving technological landscape has<br />

relegated such systems to the past. In the<br />

vast majority of sectors, manufacturers are<br />

working tirelessly to bring systems together,<br />

sharing data and delivering seamless<br />

solutions, all controlled from a single intuitive<br />

interface.<br />

End user expectations are that any modern<br />

smart system will be the same, and this is<br />

increasingly true for security-centric systems.<br />

20


SMART SOLUTIONS<br />

People expect security technologies to<br />

integrate, and for good reason. Video<br />

surveillance complements audio-based<br />

technologies, and both are made more<br />

powerful by adding transactional data such as<br />

access control. A combination of real-time<br />

video with accurate and timely site status data<br />

enables a host of smart features to be<br />

implemented. Add in alarm data, and the<br />

system offers a considerably higher level of<br />

performance.<br />

However, where the real benefits of<br />

integration lie are when the security solution<br />

is combined with other business critical<br />

systems. These might enable power and<br />

energy control, to save the user ongoing costs<br />

in the management of their site. In certain<br />

industries such as retail or entertainment, the<br />

collection and reporting of customer<br />

behaviours could add value, for marketing or<br />

product placement purposes. Also, real-time<br />

data on occupancy and flow could ensure the<br />

site’s management is better able to deploy<br />

staff more effectively.<br />

These integrations can ensure the end user<br />

sees real value from their solution, which in<br />

turn increases the return on investment.<br />

Increasingly, integrators and installers who<br />

offer additional benefits are not only winning<br />

new business, but often see the budgets<br />

increase because the offered services are of a<br />

real value to the customer.<br />

Integrations for success<br />

COSMO PSIM+ is a software-based solution<br />

which adds functionality to security systems<br />

by simplifying integration with other<br />

technology-based systems. This is possible<br />

because COSMO PSIM+ has been developed<br />

at as ‘API-first’ product. Its application<br />

programming interface has been specifically<br />

created to allow the creation of advanced<br />

integrations which elevate security systems<br />

beyond the basic task of protection. However,<br />

the software achieves all this without<br />

compromising on fundamental security<br />

principles.<br />

By understanding the core functionalities of<br />

COSMO PSIM+, it is easier to consider how<br />

the solution can be best deployed to deliver<br />

added value efficiencies for end users. The<br />

first role of the software is the collection of<br />

relevant data, whether it is generated by the<br />

security system or other business or site<br />

management systems. Because of this data<br />

collection role, it is important COSMO PSIM+<br />

is GDPR compliant. For many end users, GDPR<br />

represents an area of importance, so<br />

integrators and installers will benefit from the<br />

fact the software addresses this issue.<br />

As the data is gathered, it is analysed by the<br />

software in real-time, ensuring important<br />

information can be identified and prioritised,<br />

based upon the criteria set by the user via the<br />

system configurations. For example, if the<br />

goal is energy and power management, the<br />

software might compare access control and<br />

intruder alarm data to identify when<br />

departments are unmanned, allowing power<br />

to be switched off.<br />

If an event occurs, the software can push<br />

relevant data and associated information,<br />

such as video streams, event logs,<br />

transactional data or other customised<br />

reports, to operators. They can then use the<br />

data to assess incidents and verify whether<br />

additional action needs to be taken. The value<br />

of real-time situational information is that the<br />

end user saves time and resources by being<br />

notified of issues rather than having to<br />

investigate once they discover something has<br />

happened.<br />

COSMO PSIM+ can also be used to assist<br />

operators, security staff, maintenance teams<br />

or any other authorised individuals to deal<br />

with situations and problems as they arise.<br />

Through the implementation of workflows, the<br />

software can provide guidance or deliver<br />

instructions to specified team members,<br />

ensuring compliance with operating<br />

procedures and best practice is always<br />

adhered to.<br />

Through automated real-time reporting, the<br />

notifications are recorded, along with details<br />

of any actions taken by operators or other<br />

team members. The software can even assess<br />

whether the actions meet requirements for<br />

compliance.<br />

Reports can provide valuable insight to<br />

enable a full and thorough investigation by<br />

the end user. A complete audit trail is also<br />

created, providing customers with evidence<br />

that appropriate processes and procedures<br />

have been followed.<br />

In summary<br />

COSMO PSIM+ simplifies integration and<br />

ensures the user experience is both effective<br />

and consistent. For integrators and installers<br />

looking to deliver smart solutions, it is<br />

effectively the ‘glue’ which brings disparate<br />

technologies into one seamless and efficient<br />

solution.<br />

COSMO PSIM+ is hardware agnostic and the<br />

software is modular. This makes it ideal for<br />

use in a wide range of applications, from large<br />

campus-type environments down to smaller<br />

systems in SMEs which require a specific<br />

feature to enhance the overall level of<br />

performance on offer.<br />

21


CLOUD SERVICES<br />

Cloud Video Services:<br />

Not Fluffy?<br />

When cloud services first appeared in the video<br />

surveillance sector, they didn’t exactly set the<br />

imaginations alight. Most of the services offered<br />

were limited to the storage of streams, and limited<br />

upload capabilities made the offering more costly<br />

than NVRs and DVRs, with less performance.<br />

However, in recent years things have changed, and<br />

increasingly the technology offers a wide range of<br />

benefits and cost-efficiencies.<br />

Across the commercial and industrial<br />

sectors, an increasing number of today’s<br />

critical business and process<br />

applications and associated technologies<br />

increasingly make use of the cloud and<br />

associated services. The growth of SaaS<br />

(software as a service) is accepted by the vast<br />

majority as the norm. Where once people<br />

wanted ‘ownership’ of their systems, today<br />

they prefer to offload the more labourintensive<br />

elements of solutions such as<br />

maintenance, managing upgrades and<br />

investing capital in upfront payments in<br />

exchange for a recurring cost which covers<br />

everything.<br />

In a growing number of sectors, cloud<br />

services are not only expected, but are<br />

demanded by customers. The tide of opinion<br />

and acceptability has turned very much in<br />

favour of cloud-based services, and the<br />

security industry cannot – and many will<br />

argue should not – attempt to buck the trend.<br />

If end users want cloud services, the<br />

traditional arguments such as unreliability,<br />

high costs and fragile infrastructure, could fall<br />

on deaf ears, because many businesses and<br />

organisations rely on cloud services for their<br />

core operations.<br />

While in the past it could have been argued<br />

that video surveillance wasn’t ready for<br />

migration to the cloud, today there are many<br />

arguments for the use of cloud services with<br />

video solutions. While these by far outweigh<br />

arguments against a cloud-based approach, it<br />

doesn’t necessarily mean all cloud services<br />

will be suitable for all sites. As with any<br />

technology, every application needs to be<br />

22


CLOUD SERVICES<br />

considered individually, to assess how and<br />

where cloud services could add value.<br />

When debating the validity of cloud services<br />

in video surveillance, it must be remembered<br />

that much like video technology, cloud-based<br />

services and their associated benefits do vary<br />

considerably.<br />

This variation even extends as far as<br />

considering what providers mean when they<br />

refer to ‘the cloud’. In common parlance, it is<br />

a catch-all term for remote hosting of software<br />

and services which may be provided by a third<br />

party, or could be under the control of the<br />

system operator. As communications<br />

technologies improve, so the notion of<br />

‘private clouds’ are becoming more popular<br />

with many end users.<br />

Private clouds can make use of secure and<br />

dedicated infrastructure, providing a solution<br />

that has many of the benefits of cloud<br />

services – centralised management, real-time<br />

accurate status reporting, simpler<br />

management and maintenance of software<br />

and other IT resources – whilst also providing<br />

the security and assurance of having a wholly<br />

owned and maintained infrastructure firmly<br />

within the user’s control.<br />

However, more often than not, cloud<br />

services in the video surveillance sector are<br />

provided by third parties, and the benefits<br />

very much depend upon the functionality<br />

being offered.<br />

Cloud functionality<br />

Cloud services vary in functionality dependent<br />

upon the level of provision being offered.<br />

Systems can be fully cloud-based, but most<br />

offer a hybrid solution, where a local<br />

hardware-based system is supplemented with<br />

additional services and/or features which are<br />

accessed via a cloud service. In some cases,<br />

the system might operate as expected on a<br />

local level, but additional tools<br />

of tweaks are achieved<br />

through cloud<br />

connectivity.<br />

If that<br />

sounds<br />

vague, it’s because it is! The cloud is merely<br />

the infrastructure used for delivery, a remote<br />

network which can be connected to in order to<br />

add features and functions to a system.<br />

Many integrators and installers will already<br />

be using cloud-based services across their<br />

portfolio of sites, even if they are unaware of<br />

it. Many systems will offer a simple interface<br />

enabling users to remotely manage the basic<br />

configurations of their systems. The interface<br />

will inevitably be cloud-based. Equally, if the<br />

user receives notifications or can generate<br />

reports to share with other authorised<br />

persons, again this will usually be cloudbased.<br />

The cloud is ideal for such purposes as<br />

those accessing the information or managing<br />

system parameters have no need to interact<br />

with the core operational security system<br />

itself. User error is reduced, and site security<br />

is enhanced. With the growing focus on<br />

cybersecurity, cloud services also ensure any<br />

rogue users cannot interact directly with the<br />

system’s OS or software.<br />

By way of an example, if a site has video<br />

surveillance in place to protect loading bays<br />

at a warehouse, the video might be used out<br />

of hours for security purposes. However, while<br />

the site is open for business, the video<br />

streams could offer efficiencies to a logistics<br />

manager. The images would show at a glance<br />

which loading bays are empty, and how many<br />

vehicles are waiting in a holding area.<br />

Restricting access to such footage detracts<br />

from the overall value of the system for an<br />

end user, but equally allowing various<br />

personnel to log in to the security system to<br />

view the footage is a risk. A client-based<br />

connection could be used, but this relies on<br />

the user having access to a device with the<br />

relevant software loaded. Instead, it is easier<br />

and more cost-effective for them to log in to a<br />

23


CLOUD SERVICES<br />

cloud-based service, using any browser, to<br />

see the footage and related data.<br />

Cloud services can also be used to share<br />

information gathered from metadata. This can<br />

be associated with video analytics, enabling<br />

alarm and incident reports to be shared, but<br />

the insights might not have a security<br />

relevance. For example, many cameras<br />

support business intelligence-based analytics,<br />

such as people counting, heatmapping, flow<br />

analysis, etc.. This data has great value for<br />

many users such as retailers, hospitality and<br />

entertainment providers, etc., but having to<br />

interrogate cameras or VMS packages to<br />

access it invariably means it doesn’t get used<br />

as often as it could be. By delivering<br />

supplementary data in push notification<br />

reports via a cloud service, the user enjoys a<br />

simple and automated benefit from their<br />

system.<br />

While considering video analytics, a<br />

growing area is SaaS: software as a service.<br />

With surveillance, this is sometimes referred<br />

to as VSaaS, video surveillance as a service.<br />

While video is streamed and archived locally,<br />

a metadata stream is also sent to a cloud<br />

server where analytics algorithms are applied.<br />

If alarms occur, the data is pushed back to the<br />

locally recorded stream, flagging events.<br />

The benefit of cloud-based analytics is that<br />

the video stream itself is not transmitted,<br />

which on sites with multiple cameras would<br />

soon impact on upload speeds. Instead, a<br />

local appliance – usually supplied by the<br />

service provider – creates a metadata stream.<br />

As this is comprised of alphanumeric data, the<br />

network load is minimal and transfers are fast<br />

and reliable.<br />

With a good implementation, there is little<br />

difference between using a VSaaS IVA service<br />

and localised servers for content analysis. The<br />

bonus for integrators and installers is that<br />

updates, maintenance and licensing all takes<br />

place in the cloud and is managed by the<br />

provider. The capital outlay is also reduced as<br />

the service is paid for on a subscription<br />

model, which also equates to recurring<br />

revenue for the engineer.<br />

The final common option for cloud services<br />

is storage, and this is one that often creates<br />

the biggest debate. Theoretically, video<br />

storage in the cloud is possible. However, in<br />

reality, most properties have limited upload<br />

resources, and as a result relying on the cloud<br />

as a storage solution for anything other than<br />

one of two cameras isn’t a credible option.<br />

However, where small amounts of footage<br />

showing exceptions or alarms needs to be<br />

shared, such as for visual verification, the<br />

cloud offers a realistic and cost-effective<br />

choice.<br />

Typically, such systems are hybrid, with full<br />

resolution streams being captured and<br />

archived locally on servers or NVRs, and<br />

event-based clips for sharing are transmitted<br />

to the cloud, allowing easy access for remote<br />

users.<br />

While these examples of how cloud services<br />

can add value cover most applications, there<br />

are other more specialist cloud applications.<br />

For example, some suppliers use cloud<br />

connectivity to deliver configurations or to<br />

implement additional services, such as DDNS,<br />

without intervention for the integrator or<br />

installer. Another use is the ‘locking down’ of<br />

cybersecurity measures once configurations<br />

are complete. By simplifying installation<br />

procedures and assisting with advanced<br />

system configurations, the cloud services can<br />

enhance system delivery for engineers.<br />

In summary<br />

Judging cloud services is difficult, because<br />

many of the provisions are specific to<br />

individual manufacturers and service<br />

providers. Like most things in technologybased<br />

security, the offerings are constantly<br />

evolving, and the benefits can be significant if<br />

the services are used in the right way.<br />

It has to be accepted that whilst cloud<br />

services aren’t suited to every video<br />

surveillance application, there will inevitably<br />

be a cloud solution of some type which can<br />

deliver benefits. When cloud services are<br />

selected and deployed correctly, in relevant<br />

applications, a credible solution can be<br />

created which will enhance the user’s return<br />

on investment.<br />

24


DEEP LEARNING ADDS VALUE<br />

TO VIDEO SOLUTIONS<br />

Uri Guterman<br />

Alessia Saggese<br />

In this article Uri Guterman, Head<br />

of Product & Marketing for Hanwha<br />

Techwin Europe and Alessia Saggese,<br />

Ph.D., Co-Owner at A.I Tech and<br />

Assistant Professor at the University of<br />

Salerno, provide an overview of Deep<br />

Learning and how the two companies<br />

are working together to introduce<br />

solutions which will add to the value of<br />

video surveillance systems by offering<br />

real-life practical benefits.<br />

Progress in the development of artificial<br />

intelligence and computer vision has been<br />

advancing at such a dramatic rate, that doyens<br />

of the technologies, such as computer scientist<br />

Yann LeCun, have been known to jokingly refer<br />

to work done on the subjects before 2012, as<br />

‘prehistoric’. In terms of object recognition, the<br />

algorithms available at that time were only 75%<br />

accurate. Nowadays, thanks to a deep learning<br />

based approach, we can expect accuracy to be<br />

much higher. In fact, the advances made in the<br />

last 12 months means, we are close to being in<br />

a position to seriously consider incorporating<br />

the technologies into the majority of video<br />

surveillance systems.<br />

It would be wrong to look at Deep Learning as<br />

some kind of advanced video analytics software<br />

platform, as it represents a paradigm shift within<br />

the security sector as to how incidents can be<br />

detected and responded to.<br />

What is Deep Learning?<br />

Unlike most forms of video analytics, the Deep<br />

Learning application developer does not have<br />

to write complicated algorithms for recognising<br />

objects. Instead, a Deep Learning solution has the<br />

ability to ‘learn from examples’. During an initial<br />

training phase, the application is supplied with<br />

large amounts of data representing correctly solved<br />

examples of the challenge at hand, e.g. classifying a<br />

person by age or gender.<br />

A deep network analyses the relationship between<br />

inputted data and the expected output, such as<br />

the gender of a person, and learns how to solve the<br />

problem by analogies. As an example, being able to<br />

correctly establish the gender of a person requires<br />

an AI expert to design, train and validate a deep<br />

network which during the training stage, uses a<br />

database of millions of suitably selected faces, each<br />

of which is tagged with its known true gender. After<br />

several days of learning, the neural network is ready<br />

to be put to work and is likely to have an accuracy of<br />

approximately 98%, which is about the same as the<br />

ability of human beings to do the same thing.<br />

The Challenge<br />

Deep Learning needs the expertise of machine<br />

learning experts together with massive computing<br />

resources, as the Application needs to be able to<br />

cope with ‘in the wild conditions’, such as changing<br />

lighting conditions, shadows, the position of a<br />

face, etc. As a result, anything other than the most<br />

basic of Deep Learning solutions, will need to be<br />

run on servers which have adequate amounts of<br />

computing power and memory. For Deep Learning<br />

to be a practical addition to the majority of video<br />

surveillance systems, it is generally accepted that it<br />

will require an optimised software architecture so<br />

that it is possible for it to be run at the edge. By this<br />

we mean onboard cameras, in the same way Apps<br />

are run on smartphones and tablets.<br />

The Hanwha Techwin Partnership<br />

Reducing the processing requirements of Deep<br />

Learning so that it can be operated at the edge<br />

is no mean feat, which is why Hanwha Techwin<br />

is championing the concept of manufacturers of<br />

video surveillance solutions working closely with<br />

experts in this specialised field, in order to have<br />

access to the latest innovations and research.<br />

For Hanwha Techwin, this means working in<br />

partnership with A.I. Tech - a spinoff of the<br />

Computer Engineering Department – DIEM of<br />

the University of Salerno (UNISA), which has<br />

a dedicated ‘Intelligent Machines for Video<br />

Recognition’ Lab research group. A.I. Tech’s CEO,<br />

Mario Vento, is listed as one of the top ranked<br />

Italian scientists in engineering and is also among<br />

the most cited authors in Italy in the field of<br />

Computer Vision and Artificial Intelligence.<br />

A.I. Cameras<br />

Hanwha Tecwhin is also working on introducing new<br />

Wisenet cameras during the latter part of 2019 which<br />

will incorporate a computer vision chipset allowing<br />

Deep Learning applications to be run onboard the<br />

cameras. These new 4K and 5MP cameras, which<br />

will be additions to our existing Wisenet P premium<br />

camera series, will initially offer more accurate forms<br />

of existing types of video analytics. However, they<br />

will also provide a platform for our technology<br />

partners to use our APIs to introduce ground<br />

breaking Deep Learning applications that integrate<br />

seamlessly with the new cameras.<br />

Do you have some questions about Deep Learning? Email Uri Guterman at u.guterman@hanwha.com<br />

or Alessia Saggese, Ph.D. at saggese@aitech.vision


BULLETIN<br />

Bulletin<br />

Benchmark looks at news and product<br />

launches of interest to those involved in the<br />

design and implementation of smart solutions<br />

Vaion System<br />

Vaion has launched an end-to-end video<br />

solution which features embedded AI<br />

technology to deliver benefits including<br />

smart analytics and enhanced intelligent<br />

search functionality. Vaion's product line<br />

includes cameras, a software-based VMS<br />

and dedicated server hardware.<br />

The devices incorporate embedded video<br />

and audio analytics powered by machine<br />

learning algorithms, along with intuitive<br />

interfaces to simplify operational and<br />

installation processes. The system detect<br />

threats at an early stage to enable timely<br />

and effective responses.<br />

The Vaion product portfolio includes<br />

cameras ( Vaion v cam) with integrated<br />

directional audio analytics, a VMS ( Vaion<br />

vcore) with embedded video analytics,<br />

security appliances ( Vaion v server) and a<br />

hybrid cloud service ( Vaion v cloud).<br />

The system creates instant alerts about<br />

exceptions, and can track people and<br />

objects throughout the site. Analytics are<br />

performed in real-time from all cameras<br />

(including third-party models) at the VMS.<br />

The hybrid cloud approach enables<br />

remote configuration and access, simplified<br />

firmware and software upgrades, and<br />

license pooling.<br />

Paxton10 roadshows<br />

Paxton is to host a series of interactive<br />

roadshows during September and October<br />

2019 to preview the release of Paxton10,<br />

its next generation access control and<br />

video management solution. Attendees will<br />

get a first look at the single platform<br />

solution, which utilises advanced<br />

technology to deliver powerful features in<br />

a simple to use and install system.<br />

Paxton Chief Executive Adam Stroud<br />

stated, ‘We’re really excited to meet our<br />

installers in person to showcase the<br />

Paxton10 system. Access control and video<br />

make up the vast majority of the electronic<br />

security market. The two work best when<br />

combined into a single platform, but most<br />

systems don’t get integrated due to<br />

associated complexity. The time for<br />

Paxton10 is here.’<br />

The nine events will take place at high<br />

prestige venues across the UK.<br />

Attendees will be among the first to see<br />

Paxton10 in action and get hands-on<br />

experience.<br />

TDSi acquired<br />

TDSi has announced it has agreed to be<br />

acquired by Vitaprotech Group, a European<br />

leader in access control and security systems<br />

for critical sites. This acquisition continues<br />

Vitaprotech’s growth strategy, which has<br />

included several acquisitions in the market<br />

over the last two years.<br />

The acquisition aligns with Vitaprotech<br />

Group's and TDSi’s growth strategy to<br />

develop export sales of security solutions. It<br />

will enable Vitaprotech to expand its portfolio,<br />

strengthening the Group's export presence<br />

and to access international distribution<br />

networks in the security sector.<br />

Pelco acquired<br />

Transom Capital Group, a private equity<br />

firm, has announced it has acquired Pelco<br />

from Schneider Electric.<br />

Russ Roenick, Managing Partner at<br />

Transom, stated, ‘The journey toward<br />

creating the next great breakthroughs in<br />

video security begins today through our<br />

investment in Pelco. We have conviction<br />

that the work done over the past several<br />

years to transform the company into a<br />

digitally-savvy security leader with<br />

innovative hardware, software, and service<br />

solutions is nearly complete.’<br />

26


BULLETIN<br />

Hanwha announces<br />

Cortech integration<br />

Wisenet NVRs have been successfully<br />

integrated with Cortech Developments’<br />

Datalog MV. Datalog MV provides local and<br />

remote site monitoring and control of<br />

building, fire, security and energy systems,<br />

and enhances the ability of operators to<br />

manage surveillance systems as part of an<br />

integrated security solution.<br />

Integration with the NVRs means operators<br />

can view live or recorded images on the<br />

Datalog graphical user interface.<br />

When an alarm occurs, images from<br />

Wisenet cameras are automatically displayed,<br />

allowing operators to verify events. Live<br />

images can also be triggered by any number<br />

of user defined events.<br />

ProxyClick achieves<br />

Lenel accreditation<br />

ProxyClick has announced it has received<br />

LenelS2 factory certification and joined<br />

the Open Access Alliance Program<br />

(OAAP). ProxyClick’s secure visitor<br />

management system interfaces with the<br />

OnGuard access control system and helps<br />

companies better regulate visitor access<br />

into and around their buildings.<br />

The integration alleviates<br />

administrative strains for companies<br />

performing manual tasks across<br />

platforms, and also increases the<br />

accuracy in reporting user data. Card<br />

holder management can be streamlined<br />

with specified access-level lifecycles<br />

based around meeting times, for flexible<br />

user provisioning.<br />

Controlsoft integrates<br />

with Aperio<br />

Controlsoft has integrated its Identity Access<br />

platform with the Aperio wireless locking<br />

technology. By upgrading its Identity Access<br />

platform, integrators can add mechanical<br />

doors to existing access control systems.<br />

Aperio requires minimal additional hardware<br />

to upgrade systems to include wireless access<br />

control.<br />

A communications hub provides wireless<br />

connection with up to eight doors, and<br />

delivers a 25 metre transmission range.<br />

Suitable for interior doors, the hub is practical<br />

for hallways with a number of adjacent<br />

corridors.<br />

Johnson Controls<br />

PowerSeries Pro<br />

Johnson Controls has launched the EN Grade<br />

3 compliant PowerSeries Pro intrusion alarm<br />

system for commercial properties of any size.<br />

The PowerSeries Pro completes the<br />

manufacturer’s intrusion product portfolio.<br />

Key features include a high-current<br />

capability, making it suited for large-scale<br />

buildings where high numbers of contacts and<br />

sensors need to be installed.<br />

All the communication, whether internal<br />

between the system components or external<br />

with the monitoring centre, is claimed to be<br />

cybersecure, meeting the highest standards<br />

with AES-128 bit encryption.<br />

The hybrid system can include a<br />

combination of hardwired and wireless<br />

detectors and sensors to provides a Grade 2<br />

system which uses PowerG technology,<br />

enabling multi-channel frequency hopping<br />

with two-way wireless communication.<br />

Traka Body Worn<br />

Camera Lockers<br />

Traka’s body worn camera lockers have<br />

been developed to meet the growing<br />

demand for such devices. With a duty of<br />

care for remote and lone workers, along<br />

with regulation in some sectors, body worn<br />

cameras are becoming common devices<br />

which must been managed effectively.<br />

Enhanced device management results in<br />

a need for fewer cameras needed. The<br />

automated system negates the need for a<br />

dedicated staff member to manually issue<br />

and return devices. Controlled access to the<br />

cameras offer protection and ensures they<br />

are only issued to authorised personnel.<br />

RFID tagging allows each asset to be<br />

individually tagged, enabling the user to<br />

know the status of cameras.<br />

27


BULLETIN<br />

VIVOTEK 360 Degree IVA Cameras<br />

VIVOTEK has introduced<br />

two new H.265 deep<br />

learning-enabled fisheye<br />

cameras, the FE9191 and<br />

FE9391-EV. The two<br />

day/night 12 megapixel<br />

fisheye cameras provide<br />

360 degree views and<br />

include deep learning<br />

technology and smart video<br />

content analysis.<br />

The IVA options include<br />

intrusion detection, crowd detection and loitering detection. These<br />

capabilities transform the cameras from image capture devices to advanced<br />

notification solutions.<br />

Intrusion detection protects any specific area against unauthorised entry.<br />

Crowd detection can calculate how many persons occupy a given space,<br />

triggering an alarm when a defined capacity is reached. Finally, loitering<br />

detection identifies people remaining in a selected area beyond a preset period.<br />

Both cameras are embedded with Trend Micro’s anti-intrusion software to<br />

provide higher levels of network protection.<br />

NorParc<br />

Nortech<br />

NorParc is a Windows-based<br />

counting and parking guidance<br />

system from Nortech, which<br />

provides centralised count<br />

management, monitoring and<br />

guidance control for parking<br />

facilities which) have multiple<br />

entry and exit points.<br />

Nortech’s counting solution<br />

includes a comprehensive range<br />

of high-intensity RGB variable<br />

message signs that use low<br />

profile LED matrices offering<br />

bright, clear messages indicating<br />

available spaces and status<br />

messages.<br />

Each panel can display count<br />

values of up to 5 digits and,<br />

depending upon the sign variant,<br />

there are options to display FULL, OPEN or<br />

SPACE and direction arrows.<br />

The range includes single level internal and<br />

external signs plus self-contained multilevel<br />

information signs.<br />

External signs meet the EN 12966 standard<br />

for visual, physical and durability, and provide<br />

high optical performance. External models are<br />

housed in robust weatherproof aluminium<br />

housing (IP65). Signs are available as single<br />

count displays or multilevel displays with<br />

additional information such as headings,<br />

logos, symbols and individual titles.<br />

Videx GSMPRO<br />

Videx has added new functionality to its<br />

GSMPRO intercom system. GSMPRO is now<br />

expandable to an eight-door access control<br />

system, and enables users to answer calls<br />

from their mobile phone or landline.<br />

GSMPRO is now available with an<br />

integrated backlit coded keypad, supporting<br />

up to 400 access codes and 32 temporary<br />

codes, which can be programmed to expire<br />

after a number of hours. Codes can also be<br />

programmed via a PC or SMS. A new app is<br />

also available for both Android and iOS<br />

devices which simplifies the process of<br />

sending SMS messages.<br />

Vanderbilt Web-shop<br />

Vanderbilt has launched its new webshop,<br />

shop.vanderbiltindustries.com, which<br />

offers thousands of products and is a<br />

practical solution to enable existing<br />

customers to browse and purchase<br />

content. Mobile responsive and<br />

integrated with the company’s main<br />

website, users can view all of Vanderbilt’s<br />

products, news, and resources.<br />

The new webshop includes additional<br />

resources like manuals, software<br />

downloads and technical descriptions.<br />

Morphean offers ACaaS<br />

SimonsVoss Technologies has entered a<br />

technology partnership in Europe with<br />

Morphean. The partnership will utilise<br />

SimonsVoss’ access control system<br />

SmartIntego to extend Morphean’s cloudbased<br />

capabilities beyond video surveillance.<br />

The Morphean platform drives efficiencies<br />

by generating actionable insights from a<br />

multitude of data sources.<br />

The combination of an integrated security<br />

system hosted in the cloud promises greater<br />

security with two factor authentication, along<br />

with a wealth of rich data to help businesses<br />

optimise operations and processes and<br />

realise additional benefits.<br />

28


TECHNOLOGY<br />

Enhanced Protection with Time-of-Flight<br />

One of the most reliable, effective and costefficient<br />

external detection options is the<br />

photoelectric beam. The technology is<br />

well proven and has an impressive track record.<br />

Manufacturers have developed a number of<br />

innovative technologies which enhance catch<br />

performance, reduce nuisance activations and<br />

make life simpler for integrators and installers.<br />

As user demand for the earliest possible<br />

warning of intrusions grows, the role of<br />

photoelectric beams has become more<br />

prominent. While the professional products<br />

available deliver solutions for every type of<br />

application, there are circumstances where<br />

photoelectric beams are found wanting.<br />

Photoelectric beam sensors typically include a<br />

transmitter and receiver. As a result, both<br />

elements must be powered. In many<br />

applications this isn’t an issue, but in some the<br />

receiver might be in a remote location, away<br />

from easy access to power. Whilst there are<br />

some very good battery-powered beam sensors,<br />

at times limited budgets may force integrators<br />

and installers to seek other less costly options.<br />

Reflector-based beams have been around for<br />

some time, but are not used as often as<br />

transmitter/receiver pairs. There is a slight issue<br />

with these sensors, in that if the beam is broken<br />

by an object with a highly reflective surface,<br />

there is a chance the unit will receive the<br />

reflected infrared light and assume the beam<br />

has not been broken.<br />

Reflector-based devices do have positives:<br />

they are quick to install, cost-effective and can<br />

eliminate the need for civil works. However, the<br />

risk of missed activations is too problematic for<br />

many applications. The launch of the PR-30BE<br />

from TAKEX changes things, in that it is a<br />

reflector-based photoelectric beam which uses<br />

Time-of-Flight technology.<br />

Enhanced performance<br />

Time-of-Flight technology accurately measures<br />

the time it takes for a signal (in this case an<br />

infrared beam) to return to the unit once it has<br />

been transmitted. The device ‘learns’ the time<br />

taken for the beam to be reflected and returned<br />

to the receiving element of the detector under<br />

normal conditions. If the signal is not returned,<br />

or if it is returned in a different timescale, then<br />

an alarm is generated.<br />

Time-of-Flight technology is already used in<br />

the sensing sector, usually with laser-based<br />

devices. These typically cost a significant<br />

amount more than photoelectric beams, but the<br />

fact the sensing technology is used for high risk<br />

applications proves its<br />

suitability for security<br />

applications. With typical<br />

reflector-based sensing, a<br />

white van (for example)<br />

passing through a beam<br />

might reflect enough light<br />

back for the sensor to not<br />

detect a beam break.<br />

However, with Time-of-Flight<br />

technology, the shortened<br />

time window in which the<br />

light is reflected will indicate<br />

an alarm condition has<br />

occurred.<br />

The PR-30BE has a 30<br />

metre range. It determines<br />

the distance of any beam<br />

break with a high degree of<br />

accuracy as it measures the<br />

light reception level and<br />

timing, ensuring that<br />

genuine alarms are not<br />

missed. This eliminates problems with<br />

unintended reflections caused by gloss or white<br />

surfaces, while ensuring integrators and<br />

installers still enjoy the benefits of a reflectorbased<br />

sensor.<br />

Because the sensor does not require power at<br />

both ends of the link, installation costs are kept<br />

low. If links need to cross waterways, roads or<br />

runways, this can be achieved with greater costefficiency.<br />

The sensor retains the look and size<br />

of a typical twin beam device, and incorporates a<br />

number of the innovative features from the PB-<br />

IN and PXB flagship quad series.<br />

Environmental monitoring dynamically<br />

optimises performance to match changing<br />

conditions, with a dedicated output enabling a<br />

pre-alarm warning if required. Other features<br />

include response time adjustment, horizontal<br />

and vertical adjustment, and a redesigned<br />

reflector assembly allowing a minimum<br />

operational distance of 0.5 metres.<br />

For simplicity of installation, the PR-30BE<br />

makes use of an audible alignment tone function<br />

together with a dual-ring viewfinder and monitor<br />

output voltage options.<br />

In summary<br />

Reflector-based photoelectric sensors offer a<br />

number of benefits to integrators and installers.<br />

With the use of Time-of-Flight technology, the<br />

PR-30BE from TAKEX also delivers increased<br />

levels of security to ensure there is no<br />

compromise in terms of catch performance.<br />

For more information,<br />

contact TAKEX<br />

www.takex.com<br />

E: sales@takex.com<br />

Tel: 01256 475555<br />

29


Register for regular<br />

updates, free-of-charge!<br />

Benchmark E-News<br />

Benchmark is the security<br />

industry’s only magazine<br />

that targets security<br />

installers and system<br />

integrators who are<br />

delivering bespoke and<br />

innovative solutions.<br />

Written to help those who<br />

are designing, specifying<br />

and installing best-ofbreed<br />

systems,<br />

Benchmark helps its<br />

engineer-based<br />

readership by seeking out<br />

the most flexible and<br />

effective smart solutions.<br />

Every week Benchmark sends<br />

registered readers e-mail-based<br />

content including new<br />

independent tests and technology<br />

assessments, informative articles,<br />

news and technical bulletins to<br />

ensure you are kept up to date.<br />

Registration to receive<br />

Benchmark’s E-News service is<br />

free-of-charge and ensures you<br />

stay ahead of the crowd by having<br />

access to the latest industry<br />

information. Because the<br />

dedicated Benchmark team<br />

generate all of the editorial<br />

content, you can read tests and<br />

assessments that simply are not<br />

available elsewhere.<br />

Visit www.benchmarkmagazine.com<br />

today and sign up<br />

30


ADVERTISEMENT FEATURE<br />

How Ajax Systems develops the<br />

market of wireless security systems<br />

With its radically simplified installation<br />

process and a user-friendly interface, the<br />

Ajax security system stands out on a<br />

market of intricate professional security<br />

equipment. On the one hand, the Ajax products<br />

are easy to maintain over the air and<br />

straightforward to sell together with the security<br />

subscription services. On the other hand, endusers<br />

love Ajax for its clean design, use-case<br />

versatility, and powerful management apps. 67%<br />

of Ajax users purchase additional security devices<br />

within the first six months.<br />

The results are remarkable: over 200,000 clients<br />

in more than 80 countries around the world protect<br />

their houses, apartments, and offices with the Ajax<br />

equipment. And more than 700 response<br />

companies connect Ajax systems to their Central<br />

Monitoring Stations (CMS).<br />

Control center<br />

Hub is the main control panel of the Ajax security<br />

system. It coordinates all of the connected<br />

devices and processes commands. OS Malevich is<br />

the hub’s real-time operating system. It is<br />

protected from any viruses and cyber attacks. It<br />

updates regularly over the air to expand the<br />

functionality.<br />

The control panel communicates with the<br />

detectors on a distance of up to 2000 m using<br />

Jeweller radio protocol. The coverage area can be<br />

expanded with the ReX signal extender to up to<br />

16 km² for protecting large sites. Jeweller is a<br />

proprietary technology featuring radio hopping<br />

and AES encryption. It is resistant to jamming<br />

and code grabbing.<br />

The hub can be controlled on any distance<br />

from the secured object using the Ajax apps:<br />

Ajax Security System, Ajax PRO: Tool for<br />

Engineers, and Ajax PRO Desktop. The Ajax Cloud<br />

service transmits the commands to the system. It<br />

keeps track of the state of all of the devices in<br />

the system by continually pinging the hub. Ajax<br />

Cloud servers are located in three different AWS<br />

data centers and are GDPR compliant.<br />

In cases of emergency, the system transmits<br />

alarm signals using push-notifications (via Ajax<br />

Cloud service), SMS, and calls. Alternatively, you<br />

can manage the hub with the SpaceControl key<br />

fob or the KeyPad keyboard when it is nearby.<br />

Wireless detectors<br />

Extensive range of Ajax wireless devices allows<br />

us to build indoor and outdoor security systems<br />

that react to a variety of triggers: door and<br />

window openings, glass breaking, motion on site,<br />

smoke, temperature, and water leaks. Ajax<br />

detectors ignore pets, they self-diagnose and<br />

operate up to 7 years on the pre-installed<br />

batteries.<br />

The most reliable grade a<br />

wireless security system can get<br />

After testing in five<br />

accredited<br />

laboratories, Ajax<br />

devices<br />

successfully earned<br />

Grade 2<br />

certification for<br />

compliance with<br />

the requirements of<br />

the international<br />

standard EN 50131-<br />

1:2006. Today Ajax<br />

is the most<br />

awarded wireless<br />

security system in<br />

Europe holding the<br />

major awards from the professional conferences:<br />

IFSEC, MIPS Securika, Intersec.<br />

Advantages of Ajax versatility<br />

Ajax security systems cover a large spectrum of<br />

commercial and residential cases worldwide. To<br />

illustrate:<br />

In the Kingdom of Saudi Arabia<br />

The owners of a large franchise of pharmacy stores<br />

needed to protect 70 locations across the country<br />

at once. Each system installation had to be clean.<br />

The devices had to fit the interior seamlessly. The<br />

company’s security department reached out to Ajax<br />

Systems for a solution. As a result, each store was<br />

equipped with a hub, a KeyPad, two MotionProtect<br />

Plus motion detectors, DoorProtect Plus opening<br />

detectors, and two third-party security cameras.<br />

In Ukraine<br />

A prime developer has integrated Ajax security<br />

system into a new residential high-rise. Each<br />

apartment features the Ajax StarterKit connected<br />

to the central monitoring station of an internal<br />

security service. They use Ajax PRO Desktop<br />

application to monitor the premises. So in cases of<br />

emergency, the response is prompt. The building<br />

features several levels of physical security and the<br />

biometric authentication check-points. The<br />

intruders have a hard time breaking in and no<br />

chance to escape.<br />

In Russia<br />

An online retailer used Ajax to build a centralized<br />

security system to control over 400 distribution<br />

centers. Each location features a hub, a<br />

CombiProtect motion detector, a door opening<br />

detector DoorProtect, and a KeyPad keyboard.<br />

Additionally, the internal security department has<br />

installed Hikvision cameras at each spot to<br />

integrate their video streams into the Ajax apps.<br />

For more information please<br />

contact Ajax Systems:<br />

Dominic Watson-Hayes<br />

07954 210645 (North)<br />

Sam Griffiths<br />

07547 520198 (South)<br />

www.ajax.systems<br />

31


SMART TECHNOLOGY<br />

TECHNOLOGY TRENDS:<br />

A Smarter Future<br />

Visit a security event or look through the product<br />

offerings across the industry and you’ll spot a trend:<br />

everyone is talking about AI and deep learning.<br />

Whilst it’s true AI, machine and deep learning offer<br />

a significant number of benefits when creating<br />

bespoke smart solutions, the suitability of those<br />

solutions is dependent upon how the technology is<br />

implemented. Benchmark considers how the<br />

emerging technologies can add real value.<br />

It is not unusual when emerging<br />

technologies surface for manufacturers and<br />

developers to do things for no other reason<br />

than that they can be done. While many of the<br />

resulting systems are clever, they’re not<br />

always practical or even useful. Technologists<br />

love to play, and while we can be impressed<br />

by their creativity, we’re unlikely to spend<br />

money on something that doesn’t in some<br />

way enhance or improve some element of our<br />

lives. This thinking is not only true of<br />

individuals: businesses and organisations<br />

think the same way too.<br />

It’s interesting that when a new technology<br />

comes to prominence, the early stages of<br />

development are often based upon some<br />

vision of the future. Take AI as an example. AI,<br />

and the closely associated technique of deep<br />

learning, aren’t new. However, advances in<br />

processing have made them realistically<br />

affordable, and as a result the technologies<br />

are appearing in mainstream systems.<br />

The future vision for AI development<br />

remains in the robotic realm, and as a result<br />

many of the early commercial projects using<br />

the technology are aimed at that sector: selfdriving<br />

vehicles, robot workers, automaton<br />

processing plants, etc.. However, the<br />

development of any technology accelerates<br />

when a solid business case is made for its<br />

use. Once business and organisations see a<br />

way to harness real-world efficiencies,<br />

demand grows and actual products of value<br />

are created.<br />

In the security sector, the use of AI sparked<br />

a number of ‘projects’, many of which were<br />

clever, but few of these had a realistic chance<br />

of commercial success. In other words, there<br />

was no solid business case.<br />

As an example, at one of the US exhibitions<br />

last year, a well known manufacturer showed<br />

its ‘AI engine’. Using basic object recognition,<br />

it placed a bounding box on moving objects<br />

and gave them a classification: text reading<br />

Person or Vehicle appeared next to the box.<br />

When asked what the technology did once the<br />

object was identified, the answer was they<br />

didn’t know. Such was the race to<br />

demonstrate they had an AI solution, it wasn’t<br />

important it didn’t actually do anything of<br />

value.<br />

AI and security<br />

In the past few years, security manufacturers<br />

started to talk about AI and deep learning. It<br />

was hailed at the core technology for future<br />

developments, with many developers<br />

focussing on how systems would become<br />

autonomous with regard to decision making<br />

and implementing actions.<br />

While much of what was being discussed<br />

certainly fell under the classification of<br />

‘intelligent’, a solid business use case could<br />

not be made for it in today’s market. Many of<br />

the proposals relied on advances in other<br />

32


SMART TECHNOLOGY<br />

sectors which had yet to happen. As a<br />

statement of intent, the ideas made for good<br />

reading, but the use case was lacking.<br />

One area where deep learning could be<br />

applied was for facial recognition. The<br />

analytics involved need to recognise a face<br />

from other objects in a scene (something IVA<br />

can already do quite well, with minimal need<br />

for advanced processing), before comparing<br />

the captured face to large databases of facial<br />

images to identify persons on a whitelist or<br />

blacklist. This latter part of the analytics rule<br />

needs to be completed very quickly to allow<br />

action to be taken. There’s no benefit in<br />

finding out a few minutes after a person has<br />

left that an alarm should have been created.<br />

Because of restrictions in processing<br />

capacity and search technologies, facial<br />

recognition gained a reputation for being<br />

inaccurate. The technology was<br />

underpowered, and as such checks weren’t as<br />

thorough because of time limits. With the<br />

introduction of AI and deep learning, powered<br />

by GPUs, many of these issues have been<br />

resolved.<br />

GPUs maybe more limited than CPUs in<br />

terms of the tasks they can perform, but their<br />

huge amount of cores are ideal for repetitive<br />

tasks, such as matching facial templates.<br />

Deep learning also allows the systems to<br />

learn more about facial features, eliminating<br />

issues when the angle of capture might be<br />

different to a template.<br />

While it is true that AI and deep learning<br />

can significantly improve the performance of<br />

facial recognition, the problem remains that<br />

the bad reputation gained by the technology<br />

is still holding back adoption. This is added to<br />

by pressure from privacy groups who use the<br />

performance of older systems as a reason to<br />

oppose the technology. AI will improve facial<br />

recognition, and increased accuracy will<br />

eventually drive many to reconsider the<br />

technology, but right now the business use<br />

case isn’t strong enough.<br />

Moving forwards<br />

Interestingly, since the start of 2019, many<br />

providers of AI- and deep learning-based<br />

systems have switched their focus to using<br />

the technology to solve genuine problems,<br />

and as a result interest from end users has<br />

spiked. While some of the applications might<br />

not be as ‘intelligent’ as the headlinegrabbing<br />

robotics, the business case is<br />

certainly a lot stronger, and as a result the<br />

proposition is gaining traction.<br />

One area in which deep learning is solving a<br />

genuine problem is with regard to complex<br />

searching. Applications with multiple cameras<br />

can present a challenge when an operator<br />

tries to create an evidence trail after an event.<br />

Searching across multiple camera over a<br />

period of many hours or even many days is<br />

labour-intensive. Often the task is either<br />

abandoned or not done thoroughly because<br />

resources don’t allow it. AI- and deep<br />

learning-enabled systems can quickly and<br />

easily find numerous associated incidents,<br />

ensuring user can realise all the potential<br />

from their surveillance investments.<br />

Another area where deep learning excels is<br />

in identifying unknown exceptions. With IVA,<br />

the algorithms need to know the type of<br />

exception they are looking for, but with AI the<br />

system can ‘learn’ typical behaviours and flag<br />

exceptions to an operator. These can either be<br />

dismissed or highlighted as alerts, teaching<br />

the system which events are critical. The main<br />

benefit here is a reduction in configuration<br />

time for IVA deployments.<br />

Even simple tasks such as identification<br />

redaction for GDPR purposes can easily be<br />

handled by AI and deep learning, saving man<br />

hours while also delivering compliance with<br />

the regulations.<br />

These three examples might not be the<br />

smartest, but they each have a strong<br />

business use case, making them viable.<br />

In summary<br />

AI, machine learning and deep learning all<br />

offer significant benefits to the security<br />

sector, and well considered implementations<br />

will elevate what’s on offer to become true<br />

smart solutions. The only proviso is ensuring<br />

a credible business use case exists.<br />

End users won’t buy solutions because<br />

they’re AI-enabled. They’ll buy solutions<br />

which solve real problems which their<br />

businesses face every day. As such, the<br />

renewed focus in the industry has to be seen<br />

as a positive.<br />

33


ADVERTISEMENT FEATURE<br />

The Frontline of Security:<br />

Protecting Your Perimeter<br />

www.avigilon.com<br />

The perimeter of a site is<br />

often the first line of security - making<br />

the effectiveness of the solutions<br />

deployed at its edge crucial to its overall<br />

protection. To help protect your perimeter,<br />

Avigilon offers high resolution video security<br />

cameras and access control solutions, which<br />

enable you to accurately detect people and<br />

vehicles coming and going from your site<br />

while helping to restrict access to only<br />

authorised individuals.<br />

Seeing Is Securing<br />

Avigilon offers a full range of video security<br />

cameras that allow you to choose the<br />

resolution you need for clear viewing around<br />

your perimeter. The Avigilon H4Pro camera<br />

line starts at 4K (8MP) and goes up to the<br />

industry’s first single-sensor 7K (30MP)<br />

camera, which can capture high-detailed<br />

images across expansive distances while<br />

providing wide area coverage options, helping<br />

you cover more area with fewer cameras.<br />

For sites that struggle with visibility,<br />

Avigilon Thermal cameras can help you see<br />

beyond the visible spectrum. The H4 Thermal<br />

camera line is designed to detect the<br />

movement of people and vehicles even in<br />

areas with poor visibility, challenging lighting<br />

conditions, absolute darkness and partly<br />

camouflaged scenes - without the need for<br />

additional light sources. With patented<br />

Avigilon self-learning video analytics on<br />

board, H4 Thermal cameras are designed to<br />

help operators detect, verify and act on events<br />

in challenging environmental conditions.<br />

‘Clear video surveillance that can withstand<br />

challenging conditions is critical to our ability<br />

to protect the port from theft and other security<br />

threats,’ said Axel Humberto Perez Flores, Head<br />

of Information Technology for the Port of<br />

Guaymas. ‘With Avigilon HD cameras and ACC<br />

software, our operators can centrally monitor<br />

and verify port activities, helping to ensure we<br />

continue to provide secure transportation and<br />

storage services to our clients.’<br />

Control Traffic to and<br />

from Your Site<br />

Secure access is another crucial<br />

component of ensuring security at<br />

your perimeter. Restricting access<br />

to your site can have a significant<br />

impact on its safety, as well as your risk<br />

mitigation and loss prevention efforts. The<br />

Avigilon Access Control Manager system works<br />

together with Avigilon Control Center (ACC)<br />

video management software to produce<br />

action-based alarms and notifications when<br />

potential breaches occur, helping to ensure<br />

that only authorised individuals gain entry<br />

while also enabling expedited event<br />

correlation during investigations.<br />

The Avigilon H4 Video Intercom is another<br />

tool to verify visitor identity and authorise<br />

access at points of entry. The H4 Video<br />

Intercom integrates a 3MP camera with a highperformance<br />

intercom and features<br />

exceptional wide dynamic range, low-light,<br />

noise reduction and echo-cancelling<br />

technologies for clear viewing and two-way<br />

communication with visitors. Combined with<br />

ACC software, this secured entry system<br />

enables operators to quickly and easily<br />

identify and communicate with a visitor before<br />

remotely granting access.<br />

Perimeter Protection That<br />

Makes A Difference<br />

Securing your perimeter can be critical to the<br />

protection of your site. By deploying video<br />

security cameras that allow you to clearly see<br />

people and events at the edge of your site, as<br />

well as an access control system to limit entry<br />

to authorised individuals, you’ll gain greater<br />

situational awareness while mitigating the risk<br />

of intrusion.<br />

34


SMART TECHNOLOGY<br />

INTRUDER DETECTION: Delivering<br />

Smarter Systems<br />

Many people talk about disruptive<br />

technologies and their emergence in<br />

today’s technological world. Certainly<br />

the speed of change in current development<br />

has seen a significant number of disruptive<br />

technologies emerging simultaneously,<br />

predominantly as a result of enhanced<br />

capabilities being made available by modern<br />

processing options.<br />

The security sector, and specifically the<br />

intruder alarm sector, now faces a disruptive<br />

technology in the form of smart building<br />

systems which promise to provide security<br />

along with a host of management options.<br />

Adoption figures show that some end users<br />

are moving to these smart systems. The new<br />

adopters of these technologies include<br />

existing security system owners.<br />

A need for integration?<br />

For many years, the intruder alarm was, by<br />

design, kept separate from other systems in a<br />

building, regardless of the type of premises<br />

being protected. Standards were drafted<br />

which enforced that isolation and adherence<br />

to the standards was pushed partly by<br />

insurance industry requirements and partly by<br />

police first response restrictions.<br />

Just as much of the technology used in the<br />

security industry has changed in the past 25<br />

years, so have practices in the insurance and<br />

law enforcement worlds. While some end<br />

users still require graded alarm systems which<br />

are compliant with standards, many are<br />

looking at alternative solutions. They want to<br />

specify levels of protection based upon their<br />

own risk assessments.<br />

This isn’t bad news for the graded alarm<br />

market; many end users still consider<br />

professional systems, but importantly they<br />

want smarter systems which integrate with<br />

other devices and deliver specific business<br />

benefits.<br />

The big issue is when a user is seeking a<br />

smart security system with added benefits,<br />

they have plenty of choice. The arguments<br />

that traditional alarm systems meet standards<br />

and is installed an approved company doesn’t<br />

always sway the purchasing decision. This is<br />

not because standards and inspectorate<br />

Demand for smart systems is evident across a wide<br />

range of markets, and research underlines this isn’t<br />

going to slow down in the immediate future. When<br />

considering commercial or industrial applications,<br />

end users are ready and willing to invest in smarter<br />

technologies. Businesses and organisations have a<br />

hunger for flexible systems which offer integration<br />

and connectivity; all benefits available from the<br />

leading smart intruder detection systems.<br />

recognition have no value, but because the<br />

system on offer doesn’t meet their<br />

expectations!<br />

In a world where the IT and IoT giants are<br />

setting the technological agenda, going<br />

against what they are preaching will always be<br />

a difficult ask for a security company. This<br />

isn’t helped by the fact that as well as facing<br />

competition from other installers and<br />

integrators, there are also a whole host of<br />

other brand-name technology players that all<br />

claim to deliver security alongside other<br />

benefits for the user.<br />

35


SMART TECHNOLOGY<br />

On top of this, many utilities providers and<br />

cloud service companies have identified<br />

security is always on the wish-list of those<br />

seeking smart solutions and are subsequently<br />

bundling some level of protection in with their<br />

products. Users are attracted by the added<br />

value on offer from these systems, and if<br />

security is mentioned it’s another box ticked.<br />

Meeting demands<br />

Ignoring customer demands is often a trait<br />

that disrupted industries suffer from.<br />

Installers and integrators of intruder-based<br />

security systems must accept a growing<br />

number of customers aren’t making decisions<br />

based only on security; they’re making buying<br />

decisions based upon a recognition of smart<br />

system benefits. Security is one of those<br />

benefits, and at times it won’t be the one that<br />

really swings the buying decision. Businesses<br />

want to automate workplace devices and<br />

appliances, and they’d prefer a system that<br />

did that as well as protecting their property.<br />

It must be accepted hat many businesses<br />

don’t want to pay for security, because in<br />

effect they’re buying a system to stop them<br />

becoming a victim of crime. However, if the<br />

system also delivers business efficiencies, the<br />

idea of the system being a ‘grudge purchase’<br />

goes away.<br />

This might sound like bad news for the<br />

intruder alarm sector, but it’s not. It’s actually<br />

good news if installers and integrators<br />

present their product options in a way that<br />

appeals to the user.<br />

The critical difference<br />

There is a difference between a smart building<br />

system that includes security and a security<br />

system that includes smart functionality. This<br />

is very much down to the platforms upon<br />

which the systems are based.<br />

It is important to realise that despite the<br />

growing popularity and demand for smart<br />

building systems, users do have some<br />

concerns about the options. These are<br />

longevity of the various platforms, wireless<br />

connections being dropped, a requirement for<br />

multiple software packages or apps to<br />

manage different system elements, lack of<br />

technical support and complex installation<br />

and set-up procedures.<br />

Smart building systems are typically based<br />

upon a central hub which makes use of device<br />

apps, cloud services and various edge<br />

devices. They usually make use of WiFi and/or<br />

3G/4G links to communicate. The focus is on<br />

simplicity, ease of use and expandability.<br />

Security systems are typically based upon a<br />

graded intruder alarm panel which makes use<br />

of device apps, cloud services and edge<br />

devices. However, connectivity is usually via<br />

secure wireless or supervised hard-wired<br />

connections. The focus is on reliability,<br />

efficiency and consistent around-the-clock<br />

performance.<br />

The difference, while subtle, is actually<br />

important to many end users. They understand<br />

that security systems have a longer track<br />

record, more robust connectivity, a higher<br />

degree of reliability and offer consistent<br />

performance in a range of different conditions.<br />

One of the negatives they have about security<br />

systems is that the investment is in a solution<br />

that only does one thing: offer security.<br />

However, with the next generation alarm<br />

systems currently available, this isn’t the case.<br />

Today’s smart alarm systems offer a wealth<br />

of additional functionality, including features<br />

which increase business efficiency. If end<br />

users are aware of this, their opinion of<br />

intruder alarms as being a ‘grudge purchase’<br />

quickly changes.<br />

Smart security systems make use of robust<br />

and resilient proprietary signalling technologies<br />

to ensure that if, on a rare occasion,<br />

communication is affected, the user is made<br />

aware of that fact. Smart security systems<br />

handle all connected devices via the control<br />

panel, so there is only one interface required.<br />

Because all communication is handled by the<br />

control panel, the system is secure and informs<br />

the user if any attempt is made to tamper with<br />

it, either physically or electronically.<br />

Interestingly, when you compare the costs of<br />

smart building system peripherals with smart<br />

security system peripherals, the latter are<br />

competitively priced and often are lower cost<br />

than the alternatives.<br />

All these benefits, however, will not help<br />

persuade end users of the power of next<br />

generation alarm systems unless integrators<br />

and installers take the time to explain to them<br />

the added value benefits which are also<br />

available. Selling today’s smart systems as<br />

nothing more than alarms undersells their<br />

potential.<br />

In summary<br />

There is no doubt the technological landscape<br />

is evolving and businesses and organisations<br />

have demands that are very different to those<br />

of just a few years ago.<br />

Security systems are well placed to join the<br />

disruptive technologies in offering users<br />

greater choice, and currently offer a superior<br />

option to smart building systems.<br />

However, unless these systems are sold<br />

correctly installers and integrators could miss<br />

an opportunity to grow their businesses.<br />

36


PROMOTIONAL FEATURE<br />

Enhancing time-to-insight with IVA<br />

Video is a great enabler, delivering a rich<br />

depth of information which can be used<br />

intuitively by operators and those<br />

investigating incidents. However, the<br />

management of IVA- and alarm-related data is<br />

critical. Smart systems utilise a variety of data<br />

to filter events and apply criteria when making<br />

decisions on how to best handle a situation.<br />

As a result, partnering with HPE makes sense<br />

as the company has a wealth of experience in<br />

this sector.<br />

CUDO Communication, a video surveillance<br />

technology provider, delivers a range of<br />

intelligent video surveillance solutions. As an<br />

HPE OEM partner, CUDO was able to offer<br />

competitive differentiation and deliver the<br />

performance, scalability, reliability and<br />

support customers demanded from their<br />

security analytics systems.<br />

Additionally, HPE has committed to invest<br />

$4 billion in intelligent edge technologies and<br />

services over the next four years, cementing its<br />

place as an innovator in this growing sector.<br />

The goal is to drive development in sectors<br />

such as AI, machine learning, edge computing<br />

and smart automation.<br />

Turning data into intelligence requires<br />

serious processing power, which is why HPE<br />

entered into a joint venture with NVIDIA to<br />

help push the high-level analytical processing<br />

used by artificial intelligence (AI) and deep<br />

learning to the edge, thus creating video<br />

analytics which accelerate time-to-insight. This<br />

approach also reduces the need for data<br />

transfer, which can be bandwidth-hungry.<br />

Edge-based processing also mitigates the risks<br />

of data loss or corruption.<br />

The partnership with NVIDIA resulted in the<br />

high performance of HPE’s Edgeline Converged<br />

Edge Systems. These systems are designed<br />

specifically for high-level data acquisition,<br />

making use of enterprise class analytics to<br />

deliver appropriate control actions directly at<br />

the edge, in real-time. This is achieved by<br />

leveraging the full power of NVIDIA Tesla<br />

accelerated artificial neural networks to power<br />

AI and deep learning capabilities.<br />

HPE’s Edgeline Converged Edge System<br />

hardware processes video data in real-time at<br />

the edge, thus eliminating any data<br />

management issues which may be caused by<br />

network problems or bandwidth restrictions.<br />

The edge-based servers are more than capable<br />

of handling today’s advanced and complex<br />

intelligent video analytics solutions, including<br />

those which use AI-based technologies.<br />

Edge-based management and processing is<br />

a perfect solution for intelligent video analytics<br />

and AI-enabled processing as it negates any<br />

need for transfer of significant amounts of<br />

video data to a central location, ensuring a<br />

quick and consistent time-to-insight for users.<br />

The approach also delivers cost savings<br />

relating to networking and data storage,<br />

ensuring the solution is both effective and<br />

cost-efficient.<br />

The use of HPE’s Edgeline Converged Edge<br />

Systems enhances the performance of today’s<br />

more complex video analysis solutions,<br />

allowing the use of AI-enabled technologies<br />

through the provision of advanced processing<br />

options. This delivers a greater level of benefits<br />

for the user, significantly increasing their return<br />

on investment. By keeping the processing at<br />

the edge, potential system latency is<br />

eliminated, as are risks associated with data<br />

transfer including tampering and sabotage.<br />

To further assist its partners, HPE runs the<br />

Channel-to-Edge Institute (CEI), a partner<br />

program designed to support those supplying<br />

HPE solutions along with their own Edge<br />

products and services. In order to offer support,<br />

CEI has three elements. The first is training and<br />

support with regard to business use cases,<br />

delivering insights into how the technologies<br />

can be deployed. This is backed up by education<br />

about return on investment, highlighting how<br />

business outcomes can be improved. Finally,<br />

HPE works with its partners on joint go-tomarket<br />

campaigns and sales enablement.<br />

As the use of AI technologies and deep<br />

learning increases, the demands on<br />

infrastructure will intensify. Ensuring the<br />

hardware is both capable and robust is of<br />

increasing importance where video solutions<br />

perform critical roles.<br />

Accelerate actionable<br />

insights from video<br />

surveillance data with robust<br />

IT infrastructure, advanced<br />

services and deep industry<br />

expertise from HPE OEM<br />

Solutions. Partner with us<br />

and achieve faster time-toinsight<br />

with edge analytics:<br />

http://www.hpe.com/<br />

solutions/oem-cctv<br />

37


12 TO TRY<br />

12 TO TRY: Infrastructure<br />

Benchmark looks at 12 products and systems of interest for integrators and installers<br />

who are looking to implement smart solutions on network-based platforms.<br />

Promise Technology: Vess<br />

A6120 Servers<br />

Altronix: NetWay5B<br />

Altronix has expanded its range of<br />

networking products with the NetWay5B<br />

five port hardened switch. The compact<br />

switch is designed to mount in virtually<br />

any Altronix enclosure and combines<br />

multiple IP devices over a single Ethernet<br />

cable. It is especially suitable where<br />

multiple IP access controllers are<br />

deployed.<br />

NetWay5B switches feature five<br />

10/100/1000 data ports with<br />

speed/activity LED indicators, and are<br />

powered via PoE or 12V DC/24V DC<br />

power supplies.<br />

The BR1 mounting bracket enables the<br />

fixing of additional sub-assemblies to the<br />

enclosure’s side wall. It is compatible<br />

with the NetWay5B, PD4UL, PD8UL,<br />

PDS8, LINQ8PD, ACM4, MOM5 and VR6<br />

to allow more devices to share enclosure<br />

space.<br />

The NetWay series also includes<br />

switches with varied capacities.<br />

The Vess A6120 series of servers have been<br />

specifically designed as building blocks for<br />

the deployment of a complete video<br />

surveillance system. Claimed to be reliable<br />

and easy to configure, the series includes<br />

two main server specifications. Vess<br />

Orange servers are designed for running<br />

intelligent video analytics, while Vess Black<br />

servers have been designed for managing<br />

the whole surveillance system.<br />

The modular approach allows integrators<br />

and installers to design and build bespoke<br />

infrastructure for each application, ensuring<br />

the price/performance ratio is as specified.<br />

The Vess A6120 range is fully<br />

customisable, delivering a variety of<br />

performance criteria based on the<br />

individual needs of each user. The servers<br />

are supported by a range of PCI or PCM<br />

cards to enable a mix of data and network<br />

connections to suit specific applications.<br />

Add-ins include 1G Base-T, 10G Base-T, 10G<br />

SPF+, SAS expansion, extension RAID<br />

boards as well as graphic cards.<br />

Ogier Electronics: ESL3100-SC<br />

The ESL3100-SC is a compact point-to-point<br />

wireless bridge/repeater from Ogier<br />

Electronics. Operating in the 31GHz band, with<br />

a selectable choice of 16 operating channels,<br />

the links deliver interference-free operation<br />

over ranges stated to be in excess of eight<br />

kilometres using built-in antennas.<br />

Designed for use with IP-connected video<br />

surveillance systems, the links feature IP66<br />

protection from moisture and dust ingress,<br />

heatsinks and optional sunshields to allow<br />

operation in harsh environments.<br />

The link is based on 802.11g radio but<br />

operates in the interference-free 31GHz band.<br />

The link features data-rates up to 54Mbps in<br />

standard mode and includes configurable<br />

features for enhanced throughput. A number<br />

of encryption features are supported.<br />

38


12 TO TRY<br />

ComNet: ValueLine<br />

ComNet’s ValueLine selection of switches<br />

delivers cost-effective Ethernet and optical<br />

fibre transmission products delivering high<br />

levels of performance for applications where<br />

budgetary constraints are in place. The range<br />

includes managed switches, media convertors<br />

and video/data multiplexers.<br />

The CWGE26FX2TX24MS is a managed<br />

switch which supports 22 10/100/1000BASE-<br />

T(X) ports, along with 2 gigabit combination<br />

ports. The latter can be user-selected as either<br />

10/100/1000BASE-T(X) ports or 100/1000FX<br />

SFP ports. A further 2 100/1000FX SFP ports<br />

are also included. The SFP ports use ComNet<br />

SFPs for fibre and connector type.<br />

The CWGE26FX2TX24MS supports multiple<br />

Ethernet redundancy protocols to protect<br />

security applications from network<br />

interruptions or temporary malfunctions. It<br />

does this by redirecting critical transmissions<br />

within the network.<br />

Other variants of the switch are available,<br />

allowing the right capacity device to be<br />

specified for most application needs.<br />

Siklu: MultiHaul range<br />

The MultiHaul series of products from Siklu<br />

delivers a point-to-multipoint transmission<br />

solution for applications with a need for<br />

shorter range wireless video, audio and<br />

data transmission. The Siklu MultiHaul<br />

products operate in the widely available<br />

and license-exempt 60GHz V Band and<br />

deliver high data throughputs.<br />

Range for transmission is quoted as 400<br />

metres in point-to-multipoint<br />

configurations, and the MultiHaul series of<br />

links also make use of advanced beamforming.<br />

The link is made up of a Base Unit and a<br />

number of Terminal Units; up to eight<br />

Terminal Units can be connected to a single<br />

Base Unit. The throughput is 1.8Gbps.<br />

The devices make use of plug and play<br />

installation, which is combined with Siklu’s<br />

zero-touch configuration. The manufacturer<br />

claims that MultiHaul networks can be<br />

deployed rapidly and cost effectively by a<br />

single person.<br />

The products use narrow beams to<br />

provide virtually interference-free<br />

operation, and dynamically adjust upload<br />

and download capacities to balance the<br />

load, enhancing overall performance.<br />

AES encryption, port isolation and 802.1x<br />

deliver a secure connection.<br />

AMG Systems: Skywave III<br />

Skywave III is a digital IP transmission system<br />

based on 802.11 a/n WLAN technology,<br />

adapted for wirelessly transmitting video and<br />

telemetry data in the 5.5GHz to 5.8GHz bands.<br />

The system can support various<br />

configurations from basic point-to-point links<br />

through to multiple camera applications.<br />

AMG claims the system is easy to use, with<br />

simple installation and configuration<br />

procedures which require no specialist<br />

telecoms knowledge.<br />

Two system design options are available,<br />

using either network-based cameras or legacy<br />

analogue cameras with IP video encoders and<br />

decoders. If using IP-based cameras, no<br />

additional hardware is required. Both IPconnected<br />

and analogue devices can be used<br />

to create a hybrid system.<br />

The Skywave III AMG8150 point-to-point<br />

device has a 150Mbps data rate with 95Mbps<br />

data throughput and 70Mbps compressed<br />

video throughput. The link has a line of sight<br />

range of 1.2 kilometres.<br />

The links are PoE compatible, adding to the<br />

ease of installation, and are equipped with a<br />

wireless signal level indicator. With regards to<br />

security, the wireless devices support WEP,<br />

WPA and WPA2 encryption for secure<br />

transmission.<br />

The antenna are weatherproofed to IP66.<br />

39


12 TO TRY<br />

Barox: RY LPITE-802GBTME<br />

Switch<br />

Barox, the manufacturer of switches, media<br />

converters and IP extenders designed for use<br />

in security-related video applications, has<br />

released a new Layer 2/3 DIN rail-mounted<br />

industrial managed switch, which has been<br />

designed to meet the increased demands of<br />

PoE video applications.<br />

The Barox RY LPITE-802GBTME is a<br />

ruggedised, high-quality switch for use in<br />

10/100/1000Mbps Ethernet networks in<br />

compliance with IEEE802.x.<br />

The switch features eight ports with PoE,<br />

PoE + and PoE ++. One feature of the switch is<br />

that it enables the creation of more fault<br />

tolerant rings using two or more ports. For<br />

example, a two-port bundle can be used to<br />

provide 120W (Max), configured as Port 1<br />

60W/Port 2 60W, or Port 1 90W/Port 2 30W,<br />

etc..<br />

In the event of a network interruption, the<br />

ring closes automatically (in less than 20ms),<br />

to maintain the availability of the system.<br />

For the backbone, two SFP 100/1000Base<br />

SX/LX/ZX bays can be used for multimode or<br />

singlemode fibre. The switch can also be used<br />

as a standalone device for point-to-point<br />

connections or connection modules.<br />

The supplied management software allows<br />

the switch to be deployed in systems with<br />

high functionality demands, such as when<br />

used with PTZ dome<br />

cameras, LED illuminators,<br />

wipers and heaters, etc.,<br />

negating the need for a<br />

network injector.<br />

As well as active PoE<br />

performance management<br />

and reporting, an automatic<br />

camera reboot function<br />

allows problematic edge<br />

devices to be power-cycled<br />

to wake them.<br />

The switch features high<br />

backplane performance for<br />

smooth transmission at full<br />

port occupancy, and jumbo<br />

frames of up to 9600 bytes<br />

are supported at 100Mbps.<br />

Other functionality<br />

includes integrated network<br />

monitoring, graphical<br />

network overview, device<br />

discovery, error handling,<br />

network diagnostics and<br />

security protection to guard<br />

against unauthorised<br />

access.<br />

Secure Logiq: HA Servers<br />

Secure Logiq offers a cost effective<br />

‘Analytics Optimised’ range of servers. The<br />

HA Series fulfils the requirement for an<br />

Enterprise server range with improved<br />

processing capabilities, designed and<br />

optimised for video analytics. The Logiqal<br />

Benchmark software allows an accurate<br />

prediction of the processing benchmark<br />

points for each analytic to provide the best<br />

solution.<br />

Taking advantage of i7 Extreme edition<br />

processors enables a higher clock speed<br />

more suitable for intelligent video analysis,<br />

as opposed to Xeon processors which are<br />

more suited to high-end video processing.<br />

The HA series server range is optimised<br />

for video analytics as well as the video<br />

processing and storage function. An<br />

optional GPU upgrade adds additional<br />

processing functionality. GPU offload<br />

improves performance as well as adding<br />

multiple 4K monitor outputs for use as a<br />

workstation.<br />

Server based analytics have operational<br />

advantages over camera-based solutions.<br />

HA Series servers include the expected<br />

level of mission-critical resilience,<br />

including dual redundant PSUs, OS and<br />

application on two SSDs with RAID1,<br />

hardware RAID and healthcheck software.<br />

Seagate: Exos Enterprise HDDs<br />

While much of the focus in the security<br />

market is on surveillance-specific HDDs<br />

such as the SkyHawk and SkyHawk AI hard<br />

drives from Seagate, the company also<br />

offers enterprise level drives. As modern<br />

security solutions increasingly gather<br />

additional data which can be used to add<br />

value for business intelligence and site<br />

management, that data needs to be<br />

securely stored and managed. Surveillance<br />

specific HDDs are not the best tool for this<br />

task.<br />

When creating data-specific arrays,<br />

Enterprise level HDDs can deliver enhanced<br />

capacities, high performance and an<br />

expected level of reliability to ensure data<br />

is preserved and available when needed.<br />

The Exos X16 enterprise drive is designed<br />

for maximum storage capacity and rackspace<br />

efficiency. The 16TB HDDs are<br />

protected with Seagate Secure. This locks<br />

the drive and encrypts data if the hard drive<br />

is removed from the system.<br />

40


12 TO TRY<br />

NVT Phybridge: FLEX24<br />

The FLEX24 managed switch from NVT<br />

Phybridge makes the transition from legacy<br />

systems to IP-based surveillance and IoT<br />

devices a simple, secure and cost-effective<br />

option for integrators and installers. When the<br />

switch is paired with FLEX adapters, the<br />

enterprise-grade switch delivers fast Ethernet<br />

and PoE over multi-pair UTP cable with up to<br />

610 metres reach: the total distance is more<br />

than six times the achievable distance of<br />

standard Ethernet switches.<br />

This reduces the cost of installation as<br />

additional hardware, such as network<br />

extenders and associated PSUs and cabinets<br />

are not required.<br />

The FLEX24 delivers robust power<br />

management capabilities and a simple to use<br />

GUI interface, ensuring it is both simple to<br />

configure and use. The switch takes<br />

advantage of Modern LAN principles,<br />

protecting legacy infrastructure and<br />

eliminating the need to ‘rip and replace’ any<br />

established multipair UTP cabling.<br />

The FLEX24 switch allows greater flexibility<br />

with regard to network design and enables<br />

advanced interoperability and easy integration<br />

into the overall LAN. For integrators and<br />

installers, this assists with the creation of an<br />

independent secure, robust and easy to<br />

manage network for security and safety IP<br />

endpoints, along with any IP-connected edge<br />

devices such as VoIP telephony, process data<br />

collection, print servers, etc..<br />

Buffalo: TeraStation NAS<br />

Buffalo, a provider of network attached<br />

storage (NAS), USB storage, wired and<br />

wireless networking solutions, has launched<br />

additional models of its network attached<br />

storage rackmount devices. The new models<br />

are the TeraStation 51210RH and TeraStation<br />

5410RN.<br />

The 12-bay model (TS51210RH) is now<br />

available in a partially populated<br />

configuration with four 12TB NAS-grade hard<br />

drives for a total storage space of 48TB, or<br />

fully populated with twelve 12TB drives for a<br />

total capacity of 144TB.<br />

The 4-bay rackmount model (TS5410RN)<br />

can be supplied as a partially populated<br />

option with two 8TB hard drives for a total of<br />

16TB disk space and two free expansion slots.<br />

The Buffalo TeraStation 5010 range has<br />

been built for small and medium sized<br />

applications which require an easy to set-up<br />

and cost-effective 10GbE NAS solution. The<br />

TS5010 series supports iSCSI at enterprise<br />

level network speeds, and can run multiple<br />

concurrent services seamlessly with minimal<br />

performance degradation. The TeraStation<br />

5010 NAS series also supports hybrid cloud<br />

backup services.<br />

Allied Telesis: x930 Switches<br />

The x930 series is made up of Gigabit Layer 3 stackable switches. The high-performance<br />

and scalable devices have been designed to support demanding network requirements,<br />

delivering resilience and reliability for network core and distributed solutions. The switches<br />

offer the ability to stack up to eight units using VCStack, which enables multiple switches to<br />

appear as a single virtual chassis. In use, the virtual chassis acts as a single switch,<br />

simplifying network management.<br />

The x930 switches support load-sharing, and hot-swappable power supplies ensure<br />

maximum uptime while supporting minimal maintenance disruptions. Deployments can be<br />

with Gigabit copper and fibre with 10G and 40G uplinks. Network and device management<br />

can be automated with Autonomous Management Framework (AMF) functionality.<br />

PoE switches are included with the range.<br />

41


ADVERTISEMENT FEATURE<br />

Easy privacy masking, advanced<br />

analytics & powerful cybersecurity<br />

as standard with IDIS<br />

The latest video tech innovations from IDIS are<br />

designed to make life a lot easier for users and<br />

installers – most notably with simpler privacy<br />

masking, plug-and-play advanced analytics and a<br />

range of cybersecurity measures now provided as<br />

standard. So it’s not surprising that they got an<br />

enthusiastic reception at IFSEC.<br />

Cybersecurity and the risk of loopholes is<br />

now a top priority for everyone says the<br />

company, which is Korea’s largest video<br />

tech manufacturer.<br />

To inform decision-making IDIS has now<br />

produced a cybersecurity advisory video, which<br />

is available via its website and YouTube<br />

channel. It makes useful viewing and explains<br />

the urgent need to strengthen the resilience of<br />

traditional surveillance network processes.<br />

Users should plan for three specific risks:<br />

• data access loopholes<br />

• data transmission weaknesses<br />

• the integrity of recorded footage.<br />

IDIS has put effort into addressing these risks<br />

at every stage, from R&D through to<br />

installation. says James Min, Managing Director,<br />

IDIS Europe.<br />

‘This means that we can give users a rich,<br />

layered and comprehensive set of<br />

technologies and features to ensure maximum<br />

protection.’<br />

For example, IDIS DirectIP, the cornerstone<br />

of the IDIS Total Solution, closes-up<br />

widespread vulnerabilities and serves as a<br />

proprietary mutual authentication system for<br />

all IDIS IP products. DirectIP speeds up<br />

implementations and streamlines<br />

cybersecurity by eliminating the need for<br />

engineers to manage multiple IP addresses<br />

and associated passwords during<br />

implementation.<br />

It not only speeds up installation but<br />

mitigates against human error and the<br />

common malpractice of saving passwords in<br />

vulnerable spreadsheets.<br />

Supporting installers who want to ensure<br />

cybersecurity but don’t have in-depth,<br />

specialist knowledge of routing or networking,<br />

IDIS’s For Every Network (FEN) peer-to-peer<br />

technology lets engineers deploy and<br />

configure secure, multi-site surveillance<br />

solutions that deliver centralised monitoring<br />

and control.<br />

IDIS also highlights the cybersecurity<br />

essentials for transmission and recording,<br />

together with its own patented and proprietary<br />

technologies which prevent activities such as<br />

snooping, modification and destruction of data.<br />

And it’s giving a timely reminder about the<br />

continuing importance of video recording<br />

integrity. With its advanced Chained<br />

Fingerprint technology IDIS authenticates<br />

footage so that it can be submitted to the<br />

police and courts as admissible evidence.<br />

‘We’re making cybersecurity a key feature of<br />

our training programmes too, covering devices<br />

and networks,’ says James Min. ‘We’re giving<br />

installers the tools and knowledge they need<br />

to protect their customers from video<br />

cybersecurity loopholes.’<br />

Privacy masking without all<br />

the hassle<br />

When it comes to submitting video evidence or<br />

meeting requests for footage in compliance<br />

with the General Data Protection Regulation<br />

(GDPR), users can be left struggling because of<br />

the need to apply privacy masking. IDIS<br />

42


ADVERTISEMENT FEATURE<br />

IDIS Deep<br />

Learning<br />

Analytics<br />

& AI in<br />

the Box<br />

Dynamic Privacy Masking (IDPM) is designed<br />

to make life a whole lot easier.<br />

IDPM makes the blurring and masking of<br />

people, vehicles and sensitive areas much<br />

faster and easier. Importantly, it is being<br />

made available totally cost-free as a direct<br />

download from the IDIS website. Now users<br />

don’t need to rely on expensive third-party<br />

suppliers to do this job, or to use slow,<br />

cumbersome techniques to do it themselves.<br />

Instead, they simply select any faces or<br />

objects that need to be masked and IDPM will<br />

handle the task dynamically, throughout the<br />

clip, even if the subjects move around. IDPM<br />

applies the masks without changing or<br />

altering the integrity and authenticity of the<br />

video, meaning masking can also easily be<br />

removed if necessary.<br />

Easy deep learning analytics are<br />

97% accurate<br />

Also launched at IFSEC, IDIS’s DV-2116 AI in<br />

the Box makes deep learning analytics more<br />

affordable for small to mid-sized applications,<br />

enhancing security and control room<br />

efficiency.<br />

The plug-and-play IDLA-ready appliance<br />

comes embedded with an NVDIA GTX1060 GPU<br />

chipset allowing the analysis of up to 16<br />

channels simultaneously. Users benefit from<br />

robust and calibration-free object detection<br />

and classification (objects such as people, cars,<br />

and bicycles); intrusion and loitering detection;<br />

powerful. intelligent search functions; and<br />

tracking by colour, object and number.<br />

The introduction of AI in the Box makes<br />

deep learning analytics now easier to adopt<br />

through plug-and-play installation via IDIS<br />

Solutions Suite video management software<br />

(VMS). This allows installation without costly<br />

disruption. And the 97% accuracy proven in<br />

independent testing will minimise false<br />

alarms, significantly improving detection and<br />

monitoring performance.<br />

James Min, Managing Director, IDIS Europe,<br />

says this latest innovation has the potential to<br />

make surveillance much less labour intensive<br />

– and more effective – for a wide range of<br />

users.<br />

‘Our high accuracy analytics can process<br />

vast amounts of data, without break, in a way<br />

that human operators can’t. This means that<br />

high-resolution video streams can be<br />

automatically monitored to spot suspicious<br />

behaviour or distinguish potential threats<br />

from every day activity.’<br />

IDIS’s Deep Learning Engine, which powers<br />

the new DV-2116 AI in the Box solution, can<br />

recognise potentially significant movements<br />

and characteristics of people and vehicles,<br />

while ignoring activity that isn’t relevant. The<br />

technology can quickly check through hours<br />

of video to find specific individuals. It also<br />

becomes more accurate over time due to its<br />

self-learning characteristics.<br />

‘This is very exciting as it means that time<br />

critical activities - such as investigating<br />

incidents - will become increasingly efficient<br />

as our analytics are embedded in operations,’<br />

adds James Min.<br />

James Min,<br />

Managing Director,<br />

IDIS Europe<br />

Find out more<br />

For more information about<br />

IDIS’s video solutions go to<br />

www.idisglobal.com, email<br />

uksales@idisglobal.com or<br />

call +44 (0)203 657 5678.<br />

For up to date news and<br />

information about IDIS’s<br />

technology follow<br />

@IDISGlobal on Twitter.<br />

43


ASSESSMENT<br />

ASSESSMENT: Automated<br />

Transcoding Options<br />

Increases in processing power have enabled smart<br />

technologies to be introduced to a wide range of<br />

security devices. In the world of video surveillance,<br />

these include intelligent video analytics, suspect<br />

tracking and AI-aided searching, but smart<br />

technology can also make a system more efficient.<br />

Increasing video resolutions can have an impact on<br />

bandwidth, but a smart system can offer a solution.<br />

The growth is smart technologies has been<br />

a positive for many in the video<br />

surveillance sector. Decreasing costs for<br />

hardware, coupled with advances in<br />

processing power, have allowed integrators<br />

and installers to deliver high level security<br />

features (IVA tools such as line crossing,<br />

intruder detection, object tracking, loitering,<br />

etc. ) along with a host of other benefits such<br />

as business-based analytics (people counting,<br />

heat mapping and queue monitoring) through<br />

to ANPR and facial recognition.<br />

One of the impacts of this change towards<br />

bespoke and smarter solutions is that end<br />

users are happy to invest in greater camera<br />

counts. This is because the additional devices<br />

deliver business and site management<br />

efficiencies. When a business case can be<br />

made for additional coverage, budget is easier<br />

to find if there is a clear and recognisable<br />

return on investment for the user.<br />

Invariably, when a bespoke smart solution<br />

is deployed, the flexibility and ease of<br />

integration from an IP-based infrastructure<br />

makes a networked platform the obvious<br />

choice. With the growth in use of higher<br />

resolution cameras, plus demand for higher<br />

camera numbers, this does mean installers<br />

and integrators need to be aware of<br />

bandwidth constraints.<br />

44


ASSESSMENT<br />

When considering the implementation of<br />

networked video surveillance systems, one of<br />

the major considerations has to be bandwidth<br />

management. There are many opinions about<br />

the best way to manage the load placed on a<br />

network by streaming video, but the reality<br />

remains that in order to minimise bandwidth<br />

requirements, you have to reduce the amount<br />

of data being transmitted. That is somewhat<br />

ironic in today’s market, given the main<br />

reason for end users investing in HD and 4K<br />

UHD video is to improve the quality of the<br />

video image, which is achieved by generating<br />

more data.<br />

Not only do increases in video resolution<br />

add to the load, but additional cameras-based<br />

tasks can create vast amounts of data<br />

packets, all requiring bandwidth and storage.<br />

With finite network resources, in many<br />

applications the only answer is to take steps<br />

to manage the load.<br />

Basic management<br />

End users demand and expect detailed images<br />

and real-time video. Combined, these two<br />

elements will cause the video to consume a<br />

greater amount of bandwidth. Some of the<br />

more commonly used approaches to<br />

bandwidth reduction are based on techniques<br />

hailing from the analogue video era (ironically<br />

when bandwidth was not an issue, but<br />

recording multiple video streams to one<br />

device was).<br />

These approaches include recording at a<br />

lower resolution than that being viewed (this<br />

used to be achieved by recording video fields<br />

instead of frames) and reduced frame rates.<br />

It should be noted that these approaches<br />

will introduce unwanted compromises with<br />

regard to video quality. Any integrator or<br />

installer delivering a credible solution should<br />

be wary of such basic steps.<br />

Where HD or 4K UHD video has been<br />

specified, such an approach is unacceptable.<br />

Both video formats are established standards<br />

which have been created outside of the<br />

security industry.<br />

If the available bandwidth isn’t sufficient for<br />

the number of cameras being deployed, the<br />

use of smart technologies can provide a<br />

solution.<br />

A smart approach<br />

It may seem like a small point, but the best<br />

results come when integrators and installers<br />

stop thinking about bandwidth reduction, and<br />

consider smart bandwidth management<br />

instead. The goal is to utilise the available<br />

resources to ensure delivery of the best<br />

quality video possible — when it is required.<br />

This means the goal for the engineer is to<br />

ensure the full resolution and specified frame<br />

rates can be achieved for any critical security<br />

video footage. The key word here is ‘critical’.<br />

Basic surveillance cameras will use up<br />

bandwidth resources regardless of whether<br />

the captured footage is critical or not. This<br />

means much of the bit-rate budget is used<br />

delivering information that does not include<br />

data of value.<br />

45


ASSESSMENT<br />

By way of an example, if one part of a site<br />

had a bandwidth budget of 40Mbps and<br />

includes 10 HD cameras, common practice<br />

would be to ‘share’ the bit-rate between<br />

devices. If one camera captures footage of an<br />

incident, it might be the case that the other<br />

nine cameras are capturing nothing of<br />

importance. The result is 90 per cent of the<br />

bandwidth budget is being used gather video<br />

of no real importance.<br />

The challenge is to ensure cameras<br />

delivering images of no great importance do<br />

not use significant amounts of bandwidth,<br />

thereby allowing those with important<br />

information to increase detail and quality by<br />

using an appropriate level of bandwidth.<br />

Because of the unexpected nature of security,<br />

it’s impossible to know which cameras will<br />

capture critical video at any given time, so the<br />

issue requires a dynamic solution to regulate<br />

the bandwidth dependent upon what is<br />

happening in the scene.<br />

Recent increases in computational<br />

processing capabilites have delivered many<br />

benefits for video surveillance. Analysis and<br />

on-the-fly action triggering have made the<br />

automation of many features simpler to<br />

implement. A growing number of<br />

manufacturers are using this capability for<br />

bandwidth management, in the form of<br />

dynamic encoding.<br />

Dynamic benefits<br />

Dynamic encoding controls video processing<br />

according to information within the viewed<br />

scene. As the scene content changes, so the<br />

encoding configurations are automatically<br />

adjusted. These can include resolution, frame<br />

rate and even GOP settings.<br />

In many applications, the interpretation of<br />

what is important video data will be based<br />

upon movement. If the scene is static or only<br />

includes limited motion such as trees<br />

swaying, it will usually contain nothing of<br />

interest. However, if someone enters the<br />

viewed area, movement is detected by the<br />

encoding algorithm and the video is treated as<br />

important. In short, if an exception occurs,<br />

dynamic encoding increases the base<br />

resolution and frame rate, either for the whole<br />

scene of the region of interest.<br />

It is vital to understand dynamic encoding<br />

will not suit every application. Just as other<br />

video analytics and smart processing are not<br />

ideal for every site, the same is true for<br />

dynamic encoding.<br />

Because dynamic encoding makes use of<br />

exceptions, it is not suitable where scenes are<br />

busy and contain a high level of motion. In<br />

such circumstances, dynamic encoding will<br />

not create significant efficiencies.<br />

Dynamic encoding engines differ from<br />

manufacturer to manufacturer, in terms of<br />

which parameters are adjusted and how the<br />

changes are applied to the video stream.<br />

However, results are often best when the<br />

viewed scene is typically static, relatively<br />

clean and well lit at night.<br />

Most manufacturers state bit-rate savings in<br />

terms of percentage decreases. To make<br />

46


much more than a PSIM<br />

Physical Security Information Management<br />

The technology agnostic platform that really<br />

understands what your end user needs.<br />

Mix & Match Monitoring Interact<br />

Easily combine all<br />

your Security and<br />

Information Systems.<br />

Free yourself from<br />

Brand dependence<br />

and start correlating<br />

activities and events.<br />

Accurate monitoring<br />

and real-time analysis<br />

in ways you never<br />

thought possible!<br />

Have the ability to<br />

rapidly take informed<br />

and data-driven<br />

actions.<br />

From alerts and<br />

warnings to statistical<br />

data, the information<br />

that really matters,<br />

will appear instantly,<br />

making it easier to<br />

take action.<br />

Co-funded by:<br />

www.cosmonautasoftware.com


ASSESSMENT<br />

sense of these figures, it is important to<br />

establish what is being compared.<br />

Some of the more dramatic comparisons<br />

will consider dynamically encoded H.265<br />

video against standard H.264 video. To get<br />

the best idea of the difference, ask for figures<br />

where the same compression codec is used.<br />

If the tested camera view contains little or<br />

no movement, this allows dynamic encoding<br />

to be significantly more efficient. However,<br />

even small amounts of motion can vary the<br />

balance and impact on bit-rate savings.<br />

Dynamic encoding can also be adversely<br />

impacted by rain, fog, noise and<br />

environmental scene change.<br />

The methods use to illustrate bandwidth<br />

differences are typically honest, but may not<br />

be a true relection for all sites. The best way<br />

to assess the savings that you are likely to<br />

make is to carry out a field trial.<br />

The reality<br />

For many, the important question is what sort<br />

of bandwidth savings can be achieved with<br />

the use of dynamic encoding? Benchmark has<br />

carried out several trials using various devices<br />

from a number of leading manufacturers,<br />

testing the algorithms using a variety of realworld<br />

scenes in various conditions.<br />

With the preservation of image quality as<br />

our main criteria, scenes with a low level of<br />

movement (occasional foot and vehicle traffic)<br />

saw average bandwidth reductions of up to 53<br />

per cent in good conditions. With medium<br />

levels of motion (more frequent foot and<br />

occasional vehicle traffic), this fell to an<br />

average of 37 per cent.<br />

Rain did have an impact on the performance<br />

of dynamic encoding. In scenes with low<br />

motion the reduction was on average 18 per<br />

cent during a rain storm; the busier scene saw<br />

reductions fall to 7 per cent as the lowest<br />

figure. However, a typical rain shower saw<br />

reductions of 22 per cent and 15 per cent for<br />

each scene. In short, the application of<br />

dynamic encoding was worthwhile.<br />

At night, with a low level of illumination<br />

(around 3 lux at the viewed scene), the<br />

general savings were roughly 20 per cent for<br />

low level motion and 14 per cent for medium<br />

activity. However, when infrared lighting was<br />

used during darkness, the savings increased<br />

to 49 per cent with low motion, and 34 per<br />

cent with medium levels of activity.<br />

It must be remembered that these figures<br />

will be particular to the circumstances during<br />

out test and the conditions at the site.<br />

Dynamic encoding will be more effective is the<br />

viewed area is a sterile zone, and the<br />

technology will be less effective if the area<br />

has a higher level of motion, or if the video<br />

stream is noisy during periods of low light.<br />

In some applications, such as retail<br />

establishments or in public areas, where there<br />

is some degree of motion present at all times,<br />

the savings will be significantly lower, if even<br />

measurable. However, many cameras include<br />

dynamic encoding as a core feature, allowing<br />

integrators and installers to experiment and<br />

see if it adds value.<br />

In summary<br />

In the right circumstances, dynamic encoding<br />

works well and delivers significant bit-rate<br />

savings. With an increasing number of<br />

cameras including this functionality, it is<br />

always worth testing a camera to see what<br />

savings are achievable.<br />

For many the debate will be whether it’s<br />

worth specifying better cameras to enjoy the<br />

benefits of high quality dynamic encoding.<br />

The answer is simple: where site conditions<br />

are right and bandwidth requires careful<br />

management, the technology does offer a<br />

solution, and often the camera upgrade cost<br />

will be less than upgrading the infrastructure.<br />

48


PROMOTIONAL FEATURE<br />

IP data switches vs. Video IP<br />

switches – an explanation<br />

The trend in CCTV to convert and integrate<br />

existing analogue CCTV systems into IP<br />

networks is accelerating, and a new trend<br />

in IP is emerging, one that demands careful<br />

consideration, as barox explain.<br />

Today’s PoE IP cameras are demanding<br />

more and more power to be supplied via<br />

network switches. A 60W network device is<br />

now common, but network designers face<br />

limitations on the availability of switches that<br />

can cope with that demand. In addition, IEEE<br />

standards for 60W are not yet completely<br />

ratified, leaving the world of video IP<br />

networks to forge ahead independently with<br />

the requirement for its own specification of<br />

high-performance switches and components.<br />

Power & agility<br />

IP cameras need to stream their video frames<br />

continuously and steadily, otherwise the eye<br />

immediately perceives the change. In<br />

comparison to the needs of traditional data<br />

networks and due to the synchronous nature<br />

of high-resolution video streams, to cope with<br />

modern IP cameras, video IP network switches<br />

need to be powerful, dynamic and fast.<br />

Megapixel cameras output large ‘jumbo’<br />

video frames, often around 9600Bytes, that’s<br />

up to 6 times larger than normal frames. So<br />

for video network installers, the problem is<br />

most network switches only support frames<br />

with a 1 Gigabit connection, but IP video<br />

cameras negotiate at 100Mbits. As a result,<br />

the switches discard the jumbo frames and<br />

data is lost, creating green/empty frames.<br />

Video network design<br />

Megapixels, 4K, 8K cameras …in the future<br />

we’re heading towards the need to cater for<br />

even greater data rates. A switch might be<br />

labeled 24 Gigabit but can it handle that<br />

amount of data? Conductivity is determined<br />

by the so-called switching fabrics (SF). A<br />

switch with 24Gbits has twice the SF i.e.<br />

48Gbits.<br />

A comparable criterion for evaluating a<br />

switch is the forwarding rate (FR). Many<br />

access switches and Top Hat DIN rails are<br />

exempting switches, not built for Full Wire<br />

Speed on all ports, because switches in the<br />

industrial world only usually need to handle<br />

small amounts of data. When video is<br />

connected to these switches, the device is<br />

overwhelmed.<br />

Another consideration is the bottleneck<br />

uplink. For a switch, this should also be<br />

designed for video. As an example, a 24-port<br />

1/100/1000TX switch must be used with a<br />

minimum uplink of 10Gbits.<br />

Conclusion:<br />

Why buy a general purpose low cost 24 port<br />

switch which is likely to fail when only<br />

partially populated due to the switching fabric<br />

not being able to handle the traffic?<br />

Power budget – choosing the<br />

right switch<br />

IP cameras behave differently compared to<br />

other PoE devices, for example, on day/night<br />

switching current peaks are generated, or<br />

when PTZ domes move there is a short-term<br />

increase in power demand. In these<br />

situations, the network switch must cope with<br />

the demand and not fail.<br />

Typically, 75% of the switch power is used<br />

purely for PoE, the remaining 25% is required<br />

to cope with peak currents and for the switch<br />

CPU. So for example, a 24-Port Switch with<br />

Class 3 consumers equates to 24 x 15.4W =<br />

370W. However, effectively the switch needs<br />

to be specified as 370W / 0.75 = 500W, i.e.<br />

the remaining 130W is needed for the reserve<br />

of peak currents/switch CPU.<br />

In the event of a power failure, a fullyfeatured<br />

video switch must be able to timedelay<br />

port-by-port. Otherwise all cameras<br />

could receive peak power at a stroke.<br />

Example: All Domes are required to pre-set to<br />

their Home position at the same time, this<br />

generates enormous peak currents, impacting<br />

the power supply again and again. At the<br />

same time, modern video browsers should be<br />

able to ‘ping’ PoE devices directly and, if<br />

necessary, remove the PoE supply to<br />

successfully reboot cameras.<br />

For more information about<br />

the barox range of<br />

professional video switches,<br />

customers can contact Clear<br />

Vision Technologies on<br />

01580 212999, email<br />

info@cv-tech.tech, or visit<br />

www.cv-tech.tech<br />

49


INNOVATION AWARDS<br />

Rewarding Innovation<br />

INNOVATION<br />

AWARDS 2019<br />

At Benchmark, we passionately believe that the<br />

future of the electronic security sector lies in the<br />

creation of innovative and smart solutions. In order<br />

to allow installers and integrators to create such<br />

solutions, it is vital that manufacturers deliver<br />

innovation that both enhances the technological<br />

capabilities of their products, and allows those<br />

developments to be implemented in a realistic<br />

fashion. In order to highlight such advances,<br />

Benchmark runs its Innovation Awards scheme,<br />

which recognises and rewards innovative thinking.<br />

Here we highlight the finalists in the 2019<br />

Benchmark Innovation Awards.<br />

The security industry has never before<br />

enjoyed the sheer breadth of<br />

technological options that it does today.<br />

The security systems market is advancing on a<br />

daily basis, and alongside developments from<br />

security innovators we can also benefit from<br />

the constant advancements being made in the<br />

IT, communications, AV and consumer sectors.<br />

The impact of these innovations is immediate,<br />

and we can leverage what is on offer as and<br />

when they happen. In short, innovation has<br />

become our watchword.<br />

As advances in technology deliver ever<br />

greater levels of functionality, so the ability to<br />

integrate security elements increases. This is<br />

further added to by interoperability with other<br />

functions such as business intelligence and<br />

smart management. The result is that security<br />

systems offer a more valued proposition for<br />

all concerned, bringing together enhanced<br />

security with truly beneficial solutions.<br />

Through on-going innovation, and by<br />

embracing the new and emerging<br />

technologies, manufacturers can assist<br />

installers and integrators who wish to adopt a<br />

more holistic approach to system design. This<br />

allows the solutions to encompass the<br />

inherent flexibility that new technologies<br />

offer.<br />

Defining innovation<br />

The Benchmark Innovation Awards scheme<br />

recognises and rewards innovations which<br />

deliver real benefits to installers, integrators<br />

and end users.<br />

Innovations must bring value; it’s not<br />

enough for a manufacturer to add features<br />

simply to expand a list of functions. If there is<br />

no tangible benefit for installers and<br />

integrators, or their customers, developments<br />

cannot be considered as innovative!<br />

Devices or systems must either deliver a<br />

new concept or different approach which is<br />

both effective and realistic, or should include<br />

a specific feature or function which ranks as<br />

innovative.<br />

Also, with an increasing focus on<br />

integration and interoperability, devices or<br />

software which add functionality and bring<br />

together other established systems are<br />

coming to the fore.<br />

Innovation is the lifeblood of the security<br />

systems sector, and is vital for a credible and<br />

profitable future.<br />

50


INNOVATION AWARDS<br />

Video Hardware<br />

FLIR: Saros<br />

DH-390<br />

FLIR’s Saros<br />

dome cameras<br />

include patented<br />

and patentpending<br />

technologies to<br />

deliver accurate,<br />

actionable alerts,<br />

and verified<br />

alarm data for<br />

outdoor<br />

commercial perimeters. The cameras integrate multiple<br />

technologies in one device, including two thermal sensors<br />

supported by onboard analytics, plus the choice of an<br />

HD1080p or 4K UHD video camera, IR and visible LED<br />

illuminators, two-way audio and digital input/outputs. The DH-<br />

390 features a thermal resolution of 320 x 120 with a 90-<br />

degree field-of-view.<br />

Hikvision: Thermal Smart Linkage Tracking<br />

Hikvision’s Thermal Smart Linkage Tracking Systems makes<br />

use of a single fixed thermal imaging camera and a videobased<br />

PTZ camera. The PTZ camera uses smart processing to<br />

track multiple moving targets, triggered by the fixed thermal<br />

camera which delivers an overview of the protected area. There<br />

are a number of models with differing detection ranges.<br />

Edesix: VB-300<br />

The VB-300 series of body-worn cameras are WiFi-enabled<br />

devices. With a 130 degree horizontal field of view, day/night<br />

recording capability, RFID touch-assign enabled and integrated<br />

pre-record functionality, the VideoBadges can record footage of<br />

ongoing incidents. Video and audio footage is kept securely on<br />

the camera with no removable media card, and is encrypted.<br />

Hanwha Techwin: Wisenet XNP-6550RH<br />

The Wisenet XNP-6550RH PTZ camera features a 55x optical<br />

zoom, gyro sensing for accurate stabilisation, optical Defog and<br />

integral IR LEDs with an effective range of up to 500 metres. The<br />

optical Defog uses an optical low pass filter which accepts a<br />

higher light range in front of the camera’s image sensor in order to<br />

reduce the influence of fog. Other features include adaptive IR<br />

technology, auto-tracking, integral video analytics, dynamic<br />

streaming and dual SD/SDHC/SDXC memory slots.<br />

IDIS: Super Fisheye 5MP Compact<br />

The Super Fisheye 5MP Compact camera (DC-Y6513RX) is a<br />

compact 360 degree camera designed for wide area protection<br />

applications. Features include Smart UX Controls for high<br />

accuracy and ease-of-use, smooth de-warping on the camera<br />

as well as on desktop applications, protection against video<br />

loss via built-in Smart Failover technology, and an intelligent<br />

codec. Intelligent video and event trigger functions utilise<br />

motion detection, active tampering and trip zones.<br />

Video Software<br />

Milestone: XProtect+ 2019<br />

XProtect+ 2019 extends the usability of the Smart Client, with<br />

support for one- and two-way audio in the Mobile and Web<br />

clients. This includes communication directly from a phone<br />

with the Push-To-Talk function. All software packages in the<br />

XProtect+ range include Milestone’s Rules Engine, support for<br />

H.265 video formats, hardware-accelerated video decoding,<br />

centralised management and Active Directory support.<br />

Bosch: BVMS Pro 9<br />

BVMS Professional provides seamless management of digital<br />

video, audio and data. The network-based system offers<br />

optimum results with Bosch devices, leveraging the proprietary<br />

capabilities of the cameras and recording solutions. The<br />

system is equipped with embedded resilience, allowing day-today<br />

operations to continue should the management server or<br />

recording servers fail. Edge-based video content analysis and<br />

advanced recording technology reduce the cost of ownership.<br />

Johnson Controls: TrickleStor<br />

The VideoEdge TrickleStor feature provides an integrated<br />

camera-NVR connectivity solution protecting against video loss<br />

by recording video locally . By recording directly onto SD cards<br />

when a connectivity failure to the VideoEdge NVR takes place,<br />

video is protected. TrickleStor automates the process of media<br />

database repair, reducing the risks when a network<br />

communication failure event occurs.<br />

Mobotix: Mx6 Second Generation Platform<br />

MOBOTIX offer its second generation Mx6 camera line with a<br />

new platform that includes the integrated MxBus functionality.<br />

The MxBus technology is based on an extended camera board.<br />

This two-wire cable system is encrypted against cyberattacks<br />

and expands camera functions by including practical additional<br />

modules such as the MX-GPS-Box, a reliable time server for a<br />

complete video system. Mx6 cameras without MxBus can also<br />

process and use the data from an MxBus module connected to<br />

a camera within the same network.<br />

IPS: VideoManager 3D VMS<br />

VideoManager VMS makes use of 3D technology, which<br />

enhances the management suite’s operational feature-set.<br />

The software’s 3D technology automates tracking and camera<br />

handover, meaning operators can follow suspects without a<br />

need to manually control PTZ-enabled cameras. The cameras<br />

automatically use IVA to track suspects, and if the target<br />

moves from one<br />

camera’s protected<br />

area to another, the<br />

system automatically<br />

hands over.<br />

VideoManager includes<br />

VMD and sabotage<br />

detection, and IPS<br />

intelligent video<br />

analytics can be added<br />

via licence upgrades.<br />

51


INNOVATION AWARDS<br />

Access Control Hardware<br />

Paxton: PaxLock Pro<br />

PaxLock Pro is Paxton’s third generation of electronic door<br />

handle, offering a robust, wireless and aesthetically pleasing<br />

product suitable for a wide range of sites. It can be installed to<br />

operate as part of a networked access control system or as a<br />

standalone device. It is available in two options for internal<br />

and external facing doors. Simple to install, it is compatible<br />

with DIN standard locks so replacement of an existing door<br />

handle creates minimal disruption.<br />

Nortech: FeeMaster Smart Range<br />

The FeeMaster Smart system provides a simple, cost effective<br />

means of managing revenue collection while simultaneously<br />

controlling short-stay, long-stay and seasonal parking access.<br />

The FeeMaster system is also ideal for controlling access for<br />

staff, long stay and seasonal parkers due to the ability to<br />

validate smart cards for any given duration of time.<br />

Pacom: 8003 Controller<br />

The 8003 controller is an intelligent IP-enabled hybrid<br />

controller that provides flexible intrusion detection and access<br />

control for up to eight doors. As an access control device, the<br />

8003 can support up to 8 doors, each with an IN and OUT<br />

reader, enabling anti-passback. The 8003 controller can<br />

operate standalone for smaller or remote environments or can<br />

be easily incorporated as part of a fully integrated access<br />

control system for larger buildings or multi-site applications.<br />

Comelit: VIP Mini HF WiFi<br />

The VIP Mini HF WiFi features an integral WiFi port and gateway<br />

for forwarding video entry phone calls to smartphones and<br />

tablets running the Comelit app. All functions and<br />

programming can be performed from a graphic menu, using<br />

eight soft-touch keys. The unit is powered by PoE, and includes<br />

an induction loop with T position for users of hearing aids.<br />

ASSA Abloy: Aperio H100<br />

The H100 door handle offers integration with a number of<br />

third-party systems. Available in online and offline versions, it<br />

can be retrofitted without drilling for doors with a thickness of<br />

30–80mm. The H100 is battery-operated and supports iCLASS,<br />

Mifare, Mifare Plus, Desfire SE and EV1 card technologies.<br />

Access Control Software<br />

Vanderbilt: ACT Enterprise<br />

The latest release of ACT Enterprise includes a number of<br />

updates to enhance the solution. To help with integration, ACT<br />

Enterprise integrates seamlessly with the company’s SPC<br />

intrusion system. ACT Enterprise is also supported by intuitive<br />

smartphone apps delivering real-time monitoring, system<br />

management and user administration. To facilitate smart<br />

functionality, one of the headline additions is rules mapping,<br />

allowing triggers to implement actions.<br />

Qognify: Qognify ACI<br />

Access Control Insights (ACI) is designed to analyse access<br />

control system data to deliver operational insights, detecting<br />

abnormal behaviours and identifying critical events.Utilising<br />

machine learning data analytics, Qognify ACI detects unusual<br />

card holder activities associated with potential fraud, theft or<br />

other risks, alerting the system operator of threats. All<br />

functionality is delivered without changing legacy access<br />

control systems.<br />

Evva: Xesar 3.0<br />

The Xesar system is an innovative electronic access system<br />

which is fully scalable, allowing use in residential<br />

developments, educational facilities and office buildings. Xesar<br />

can be simply and securely managed, either from within a<br />

locally installed network or via the cloud. The Xesar system can<br />

be created from a number of modules. These include cylinders,<br />

escutcheons, readers, door handles, cam locks and padlocks.<br />

BQT Solutions: Net2 Integration<br />

BQT offers a software integration between its miPASS Access<br />

TMS software and Paxton’s Net2 access control software. The<br />

integration enables the seamless addition of BQT biometric<br />

readers to new or legacy Net2 systems, facilitating a smooth<br />

transition from less secure card technologies to more robust<br />

options like fingerprint biometrics and BQT’s own miPASS<br />

credentials.<br />

TDSi: GARDiS<br />

GARDiS access control management software boasts ease of<br />

installation across a number of Windows versions, with a<br />

graphical user-friendly interface developed specifically to<br />

accommodate the needs of a wide variety of users. The<br />

software’s installation wizard reduces complexity during the<br />

set-up. GARDiS is a<br />

web-based<br />

application which<br />

runs as a service.<br />

This ensures that is<br />

always operational.<br />

The software will be<br />

enhanced with a<br />

selection of<br />

hardware products<br />

designed to fully<br />

integrate with<br />

Cloud-hosted<br />

security solutions.<br />

52


INNOVATION AWARDS<br />

Site Protection Hardware<br />

Takex: PIR-<br />

T40NAM<br />

The PIR-T40NAM is<br />

a long-range<br />

external PIR with a<br />

maximum range of<br />

40 metres. The<br />

sensor boasts four<br />

selectable<br />

operational modes<br />

which allow<br />

flexibility when it<br />

comes to<br />

positioning the unit.<br />

With a mounting<br />

height range of<br />

between two and six<br />

metres, it allows freedom when finalising device locations. The<br />

PIR-T40NAM delivers vertical curtain protection. Other<br />

headline features include triple mirror optics and intelligent<br />

signal processing.<br />

OPTEX: OPTEX Bridge powered by CHeKT<br />

The OPTEX Bridge powered by CHeKT combines remotely<br />

monitored intruder alarm systems and ONVIF cameras to<br />

create a visual verification platform. The solution has been<br />

developed to be compatible with most intruder alarm systems,<br />

and any ONVIF camera, as well as being integrated with most<br />

ARCs’ monitoring software platforms. The Cloud hosted<br />

platform allows collaboration between the ARCs and the users<br />

by sharing video clips to confirm alarms.<br />

SICK: Visionary-T DT Sensor<br />

The Visionary-T DT sensor is a configurable, plug-and-play 3D<br />

detection sensor. The device makes use of single-snapshot<br />

Time of Flight technology for a range of detection, notification<br />

and security applications. The sensor uses integral image<br />

processing, ensuring it can be added to installations without<br />

additional IT-based infrastructure.<br />

InnoSent: iSYS-5021 with Tracker<br />

The iSYS-5021 is a 24GHz radar system. InnoSent has<br />

developed it with the aim of fusing together radar and<br />

cameras. The integrated Smart Tracker detects multiple<br />

moving objects within the detection area. It combines radar<br />

detections with tracked data and allows the anonymous<br />

monitoring of relevant events. The targets are recorded even if<br />

a person stops moving, changes postures or starts crawling.<br />

Raytec: Urban-X<br />

Urban-X is a range of high-performance general area<br />

luminaires designed for industrial applications. Urban-X<br />

delivers several performance advantages compared to<br />

traditional lighting, such as a lumen output up to 14,000lm.<br />

The range achieves powerful illumination through the use of<br />

Platinum SMT LED technology. High thermal performance<br />

ensures the luminaires run cool, providing long-life.<br />

Site Protection Software<br />

BT Redcare: Redcare Ultimate<br />

Ultimate is claimed to be BT Redcare’s best alarm signalling<br />

system yet, suitable for every level of risk. It uses a private IP<br />

connection on the Redcare network, backed up by two 4G<br />

SIMs. Resilience is ensured as the panel includes battery backup.<br />

Real-time monitoring means any problems with the<br />

connection can be notified in 90 seconds. The service can<br />

deliver alarm and fire signalling, as well as monitoring of<br />

business elements.<br />

Pyronix: ProControl+<br />

Pyronix has added voice push notifications to both the iOS and<br />

Android versions of the ProControl+ app. When an alarm<br />

occurs, if the system is set or unset, or if an event is triggered<br />

by any life safety devices integrated with the system, the user<br />

receives a voice push notification. The feature adds value<br />

without any additional cost. When combined with cameras for<br />

video verification, users can also see what is happening.<br />

Teleste: S-AWARE<br />

S-AWARE provides users with a smart platform to centralise<br />

system information and manage daily operations. Data from<br />

various sources can be collected, identified, analysed and<br />

distributed in a single, easy-to-use, web-based graphical user<br />

interface. S-AWARE can be deployed as a standalone product,<br />

or integrated with Teleste’s S-VMX video management<br />

solution. It stores and records information from all system<br />

components and tracks events to generate reports for analysis.<br />

Reconeyez: Video Verification System<br />

Reconeyez offers a battery-powered alarm system with video<br />

verification, providing a flexible solution for outdoor security,<br />

with a particular emphasis on mobile/temporary security. The<br />

standalone system can be used where there is no mains power<br />

and the PIR-managed cameras work with a battery-powered<br />

2G/3G/4G bridge to send alarms and images back to a control<br />

room for verification purposes.<br />

Texecom: Texecom Cloud<br />

Texecom Cloud delivers enhanced system management<br />

options to integrators and installers. The cloud platform<br />

enhances day-to-day remote management. Benefits include<br />

remote maintenance and healthchecks across the full portfolio<br />

of systems, remote access to systems via any web-connected<br />

device, access management, reduction in time of on-site<br />

configurations, flexible reporting and a number of additional<br />

benefits which enable additional value and add-on services.<br />

53


INNOVATION AWARDS<br />

Intelligent Systems<br />

Business Intelligence<br />

Herta: BioFinder<br />

BioFinder makes it possible to search for a specific subject,<br />

through facial recognition, in one or various recorded videos.<br />

By working with GPU architecture, it processes all the images<br />

at a high speed, making it possible to locate a specific subject<br />

more rapidly. BioFinder delivers forensic analysis and the<br />

classification of information.<br />

Avigilon: AI Appliance<br />

The AI Appliance adds patented Avigilon self-learning video<br />

analytics and Appearance Search technology to almost any IP<br />

camera. When connected to Avigilon Control Center (ACC)<br />

software, integrators and installers can create powerful AIbased<br />

solutions, with automatic alerts of potentially critical<br />

events and the ability to search for and locate a person or<br />

vehicle of interest across an entire site.<br />

Axis: AXIS Guard Suite<br />

AXIS Guard Suite encompasses motion, intrusion and loitering<br />

analytics for Axis network video products. It detect threats and<br />

instigates configured actions. The analytics are suitable for use<br />

in a range of locations. The analytics can be used with Axis<br />

network video products running firmware 7.x or higher. They<br />

are available at no extra cost for Axis Q-line products and at a<br />

low cost for other compatible products. The applications<br />

support multiple profiles, allowing trigger settings for different<br />

times of day.<br />

Davantis: Daview Mini<br />

Daview Mini offers a comprehensive security solution for small<br />

sites, centralising video analytics and alarm verification,<br />

enabling system operators to take immediate action. The<br />

appliance is quick and easy to install and features intuitive<br />

software. The system is compatible with devices using the<br />

ONVIF protocol. The appliance features relays for activating<br />

external devices, and perimeter protection is enhanced thanks<br />

to a SmartWalk function which aids configuration.<br />

Genetec: Streamvault Appliances<br />

Streamvault is a complete line of secure, ready-to-deploy<br />

security infrastructure solutions designed to help integrators<br />

and installers design a system that meets project<br />

requirements. With Security Center, the Genetec VMS product,<br />

pre-loaded, Streamvault appliances simplify deployment and<br />

maintenance, and unify a site’s security operations.<br />

Briefcam: Briefcam Protect<br />

BriefCam’s video content analytics platform adds value to<br />

video surveillance system investments by making captured<br />

video searchable, actionable and quantifiable. Using a fusion<br />

of computer vision technologies, together with patented Video<br />

Synopsis technology, Briefcam enables video system operators<br />

to review hours of video in minutes, rapidly identifying people<br />

and objects of interest. The software provides robust<br />

detection, classification and recognition.<br />

A.I. Tech: AI-PARKING-DEEP<br />

AI-PARKING-DEEP is a video analytics solution for parking<br />

management. Using deep learning techniques, it is able to<br />

analyse car parks, including indoor and outdoor areas, to<br />

assess if spaces are empty or occupied. The solution is aimed<br />

at parking management, and delivers occupancy rates for<br />

parking areas. It can operate in enclosed spaces or on streets,<br />

and can inform users about parking spaces.<br />

Allgovision: Flow Map<br />

The Allgovision analytics packages offer a diverse number of<br />

modules, including a host of business intelligence options. The<br />

AGV-VA-FLOW module implement flow mapping, allowing<br />

footfall traffic is a surveyed area to be quickly and easily<br />

mapped. The analytics module produces a movement trend<br />

map which highlights the percentage split for various<br />

movement paths taken by people in the monitored zone, over a<br />

defined time period.<br />

Anyvision: Better Tomorrow Platform<br />

Better Tomorrow is a state-of-the-art platform that enables<br />

one-to-many recognition on-demand. The platform can either<br />

be based in the local premises or in the cloud. It can be used<br />

for recognition of persons of interest, as well as recognition of<br />

humans or other specified objects. Other features include heat<br />

mapping. The technology can be applied across multiple sites,<br />

and results can be filtered by adding variants as required.<br />

SAST: IoT Platform<br />

SAST offers a global platform for the next generation of<br />

security cameras. It has been created to harness the potential<br />

available from emerging innovative IP-based security cameras<br />

and devices. With surveillance technologies being deployed<br />

using internet connectivity and processing at the edge, the<br />

increased use of next generation processing and advanced<br />

video<br />

compression<br />

and stream<br />

management<br />

requires a new<br />

approach. The<br />

SAST IoT<br />

platform is<br />

designed for<br />

edge-based<br />

video analytics<br />

as well as<br />

business<br />

applications.<br />

54


INNOVATION AWARDS<br />

Infrastructure<br />

Seagate: SkyHawk AI 14TB<br />

SkyHawk AI HDDs are available in 14TB<br />

variants and have been designed for use in AIcapable<br />

surveillance systems. Traditional<br />

SkyHawk drives are optimised for<br />

predominantly write-based performance but<br />

the AI models are configured for higher<br />

workloads, such as the in-depth searching<br />

and logging that AI-enabled systems perform.<br />

The drives also include data protection<br />

coverage as they are supplied with a two year<br />

Rescue Data Recovery Services plan bundled<br />

with every AI drive.<br />

ComNet: CTS24+2<br />

The CTS24+2 is a managed layer-2<br />

commercial grade Ethernet transport system<br />

and provides up to 24 ports of 10/100TX<br />

Ethernet and two ports of 10/100/1000TX or<br />

1000FX transmission. The CTS24+2 series<br />

allows for flexibility in combining standard<br />

copper, optical and extended distance<br />

Ethernet in one device. Optional PoE supplies<br />

of 400 or 720 Watts are available. Up to three<br />

8-channel modules can be fitted to each<br />

chassis: the modules are CAT5/6 10/100 Mbps<br />

Ethernet, 100FX optical SFP, or CopperLine<br />

Coax or UTP interfaces.<br />

D-Link: DIS-700G<br />

The DIS-700G Series Industrial Layer 2+<br />

Gigabit managed switches are designed to<br />

withstand temperature variations, vibrations<br />

and shocks, making them ideal for security<br />

applications. The rugged switches feature a<br />

hardened design combined with high<br />

availability network features which are vital<br />

when considering surveillance and wireless<br />

connectivity. The switches provide high<br />

throughput and reduced response time which<br />

is critical for security-based video, voice and<br />

data applications.<br />

NVT Phybridge: EC Extender Kit<br />

The NVT Phybridge EC Extender solution is<br />

designed to upgrade the downlink capabilities<br />

of a standard Ethernet switch, delivering<br />

10/100Mbps symmetrical (full duplex) data<br />

and PoE over coax. The solution offers<br />

enhanced range with distances of up to 1.2km.<br />

IP-based IoT devices can be connected to the<br />

existing coaxial infrastructure, delivering<br />

optimal performance while saving costs and<br />

time. Cost savings can enable system<br />

designers to transfer budget and resources<br />

towards higher-quality applications and<br />

devices.<br />

InfiNet: InfiLink 2x2<br />

InfiLINK 2X2 is a point-to-point wireless<br />

transmission solution, combining high-speed<br />

capabilities of up to 280Mbps throughput,<br />

with a range of features and benefits such as<br />

leading-edge radio protocols providing<br />

spectral efficiency and wireless transmissions<br />

over long distances. The wireless solution can<br />

be deployed to provide Ethernet extensions,<br />

such as simple LAN-to-LAN connectivity,<br />

between two locations where physical cabling<br />

might be cost-prohibitive.<br />

56


Stay Untouched.<br />

And Secure Your Security.<br />

www.cactusconcept.com<br />

At MOBOTIX, we have developed the unique cactus concept for a reliable and complete protection of endto-end<br />

video security systems. Protect yourself against serious hacker attacks – with an intelligent video<br />

system that is ready to go, but can also stand up to the ever evolving challenges of our world.<br />

Stay untouched with MOBOTIX!


BENCHMARK – driving innovation<br />

and smart solutions in the security industry<br />

The Benchmark website is a supplement<br />

to the printed monthly magazine, and<br />

includes a variety of tests and<br />

assessments of the latest technologies,<br />

including videos where relevant, as well as<br />

guides to product selection, independent<br />

technology-based articles and information<br />

about the latest influential products and<br />

systems comprising security and smart<br />

technologies.<br />

TESTS AND ASSESSMENTS<br />

All tests and assessments are fully independent, and<br />

manufacturers have no involvement in the process.<br />

Additionally, Benchmark makes no charge, financially or of any<br />

other kind, for inclusion in tests. All products are selected by<br />

an independent team. In short, it’s the only way you can<br />

ascertain the truth about product and system performance in<br />

real-world applications! Tests are carried out by an<br />

independent team of experts, telling you the whole truth about<br />

the performance you can expect.<br />

DRIVING INNOVATION<br />

Benchmark believes that the future of the security sector lies<br />

in the creation of innovative solutions which deliver credible<br />

security, flexibility and smart value-added benefits. With<br />

unrivalled technical expertise, Benchmark ensures you are upto-date<br />

in an increasingly technical environment.<br />

LONG-TERM SYSTEM EVALUATIONS<br />

The Benchmark website now includes information from the<br />

newly launched long-term system evaluation. There are many<br />

theories about how systems can deliver added value;<br />

Benchmark sees what is and what is not possible by creating a<br />

long-term system to investigate the various possibilities.<br />

@benchmarkmag<br />

STAY UP TO DATE<br />

Benchmark is always testing and assessing<br />

new products and technologies. Keep up to<br />

date with the latest reports by following<br />

Benchmark on Twitter.<br />

www.twitter.com/benchmarkmag<br />

www.benchmarkmagazine.com


thepaper<br />

Business News for Security Professionals<br />

Pro-Activ Publications is embarking on a revolutionary<br />

launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />

latest financial and business information for<br />

professionals operating in the security sector<br />

The Paper will bring subscribers (including CEOs,<br />

managing directors and finance directors within the<br />

UK’s major security businesses) all the latest company<br />

and sector financials, details of business re-brands,<br />

market research and trends and M&A activity<br />

FOR FURTHER INFORMATION<br />

ON THE PAPER CONTACT:<br />

Brian Sims BA (Hons) Hon FSyI<br />

(Editor, The Paper and Risk UK)<br />

Telephone: 020 8295 8304<br />

e-mail: brian.sims@risk-uk.com<br />

www.thepaper.uk.com


Secure operations 24/7 to see all the details,<br />

all the time with Bosch FLEXIDOME IP starlight 8000i.<br />

With quick installation plus wireless and remote commissioning, camera<br />

adjustments can be corrected whenever needed plus up to 4k Ultra HD<br />

resolutions and starlight technology so you can see all the details all the time.<br />

Find out more at boschsecurity.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!