BenchmarkAugust2019
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
TECHNOLOGICAL INNOVATION & SMART SOLUTIONS<br />
Smart Solutions: Enhanced Integrations<br />
Technology: Video Cloud Services<br />
12 to Try: Network Infrastructure<br />
AI Developments: Business Use Cases<br />
August 2019<br />
BENCHMARK<br />
Visual Verification<br />
Does the OPTEX Bridge offer a cost-effective solution?<br />
Tested: Mainstream VMS Software<br />
Assessment: Dynamic Encoding
BENCHMARK<br />
BENCHMARK<br />
Technological Innovation & Smart Solutions<br />
At Benchmark, we passionately believe that the future growth and<br />
development of the security sector depends upon the creation of<br />
flexible, scalable and effective solutions. As technology delivers<br />
ever increasing levels of functionality, so the ability to integrate<br />
elements such as business intelligence and smart management create a<br />
more valued proposition for all concerned. This brings together<br />
enhanced security with truly beneficial solutions.<br />
We believe that by embracing the new and emerging technologies,<br />
and by adopting a more holistic approach to encompass the inherent<br />
flexibility they offer, credible solutions that deliver enhanced protection,<br />
security and business benefits can be realised.<br />
Through independent testing, system and technology assessments,<br />
field-based analysis, educational articles and informed debate,<br />
Benchmark provides vital information to those seeking to create best-inclass<br />
solutions. The editorial materials included in the magazine and its<br />
on-line initiatives ensure that those who offer bespoke advanced<br />
solutions have access to honest, independent and relevant reporting<br />
that aids and supports them in their work. All editorial content is<br />
exclusive to Benchmark and is based upon real-world field trials, not on<br />
theoretical documents produced by manufacturers.<br />
Benchmark delivers its content via a monthly print-based<br />
publication, as well as a number of interactive electronic initiatives. By<br />
realising the potential that new technologies offer, enhanced solutions<br />
that deliver security and business benefits can be realised.<br />
Benchmark Independent Testing<br />
Benchmark Recommended<br />
Status is awarded to<br />
products that undergo the<br />
independent testing and<br />
assessment process and are considered<br />
to deliver genuine benefits in the<br />
design and creation of innovative and<br />
smarter solutions. Products which<br />
receive Recommended status have<br />
undergone testing and have reached a<br />
high standard.<br />
Benchmark Outstanding<br />
Status is awarded to<br />
products that undergo the<br />
independent testing and<br />
assessment process and are considered<br />
to deliver invaluable benefits to those<br />
designing and installing innovative and<br />
smarter solutions. Products which<br />
receive this status have undergone<br />
application-specific testing and have<br />
reached the very highest standards.<br />
Because products and<br />
systems in the electronic<br />
security industry are varied,<br />
there are inevitable price<br />
differences. Benchmark always<br />
considers the price/performance ratio,<br />
and makes adjustments to ratings to<br />
reflect value for money. In group tests,<br />
the product which delivers the best<br />
price/performance ratio receives the<br />
award of Benchmark Best Buy.<br />
3
VISIT US AT STAND F410<br />
Inner Range’s Integriti<br />
High Security System is<br />
a complete Hardware/<br />
Software solution designed<br />
<br />
installations.<br />
Our range includes:<br />
All Software<br />
Hardware Controllers<br />
End of Line Modules<br />
Power Supplies<br />
Keypads<br />
Enclosures<br />
Communications Devices<br />
Access Control Readers<br />
Credentials<br />
WHY TAKE CHANCES?<br />
FULL END TO END DATA ENCRYPTION EXTERNALLY CERTIFIED<br />
T: +44 845 470 5000 | E: ireurope@innerrange.co.uk innerrange.co.uk
AUGUST 2019<br />
Contents<br />
Editor<br />
Pete Conway<br />
E-mail: pete.conway@benchmarkmagazine.com<br />
Advertisement Manager<br />
Nick Tiday<br />
Tel: 020 8295 8302<br />
E-mail: nick.tiday@benchmarkmagazine.com<br />
Production<br />
Matt Jarvis<br />
Tel: 020 8295 8300<br />
E-mail: matt.jarvis@proactivpubs.co.uk<br />
Administration<br />
Tracey Cole<br />
Tel: 020 8295 8306<br />
E-mail: tracey.cole@proactivpubs.co.uk<br />
ISSN: 1750-1040<br />
Editorial and Advertisement Office<br />
PO Box 332<br />
Dartford<br />
DA1 9FF<br />
© Pro-Activ Publications Ltd 2019<br />
All rights reserved. No part of this publication may<br />
be reproduced or transmitted in any form or by any<br />
means, electronic or mechanical, including<br />
photocopy, recording, or any information storage and<br />
retrieval system, without permission in writing from<br />
the publisher.<br />
Benchmark reserves the right to alter, abridge or<br />
edit any submissions prior to publication. The views<br />
published in Benchmark are not necessarily those of<br />
the publisher.<br />
While every care has been taken to ensure<br />
accuracy in the preparation of material included in<br />
Benchmark, the publishers cannot be held responsible<br />
for the accuracy of the information contained herein,<br />
or any consequence arising from it. In the case of all<br />
product reviews, tests and assessments, judgements<br />
have been made in the context of the equipment<br />
supplied at the time of the review. Any judgements are<br />
based upon situations relevant at the time of writing,<br />
and comments relating to cost are based upon<br />
published prices available from major distributors.<br />
Comments are based upon products and systems<br />
currently available in the UK market-place.<br />
7 Editorial<br />
The evolving technological landscape can be good<br />
news for integrators and installers.<br />
8 Test: VMS for Mainstream Sites (Part 2)<br />
Benchmark looks at VMS packages which are<br />
ideal for mainstream applications, with Axis<br />
Communications’ AXIS Camera Manager and<br />
XProtect from Milestone Systems.<br />
15 SiX Event<br />
For integrators and installers, the SiX event in<br />
Manchester represents an opportunity to find out<br />
more about new and emerging technologies.<br />
17 Get Connected, Take Control<br />
Service-based solutions offer the potential to earn<br />
recurring revenue and deliver enhanced systems.<br />
18 Innovation Focus<br />
Benchmark takes a close look at the OPTEX<br />
Bridge powered by CHeKT, which offers costeffective<br />
visual verification.<br />
20 Smart Solutions: Enhanced Integrations<br />
Integrations offer power when creating bespoke<br />
solutions, and a dedicated platform can add value.<br />
22 Cloud-based Video Services<br />
The time has come for integrators and installers<br />
to reconsider cloud-based video services to<br />
enhance their solutions.<br />
26 Bulletin<br />
New products and news of interest of integrators<br />
and installers seeking to create smart solutions.<br />
29 Time-of-Flight Detection<br />
Time-of-Flight technology can be cost-effective,<br />
and enhances detector catch performance.<br />
30 Sign up for Benchmark E-News<br />
Stay updated with the Benchmark E-News service<br />
and keep informed about tests, assessments,<br />
innovation and smart technologies.<br />
32 Smart Technology: AI Trends<br />
The focus of AI implementations is starting to<br />
deliver some credible business use cases, making<br />
the technology more viable.<br />
35 Service-based Alarms<br />
With end users seeking a more service-based<br />
offering, can next generation intruder alarm<br />
systems meet their needs?<br />
38 12 To Try: Network Infrastructure<br />
Benchmark looks at a dozen products and<br />
services which will be of interest to those<br />
delivering networked solutions.<br />
44 Dynamic Encoding<br />
Can dynamic encoding offer a credible solution to<br />
bandwidth management?<br />
50 Benchmark Innovation Awards 2019<br />
The finalists for the 2019 awards are announced,<br />
with a look at the various products.<br />
58 Benchmark Online<br />
Benchmark’s website is a valuable resource for<br />
those seeking to deliver smart solutions.<br />
20<br />
28<br />
38<br />
5
Start<br />
your free<br />
trial today!<br />
Manage, configure and control your<br />
alarm system portfolio<br />
• Manage access by system<br />
• Control by individual engineer<br />
• Fully audited access records<br />
Managed Access<br />
Texecom Cloud gives you complete control over your alarm system portfolio,<br />
including safeguards to ensure only the right people have access to the right data.<br />
Intelligent and dynamic system labelling tools make controlling, recording and<br />
removing engineering access rights to systems simple and straightforward.<br />
Sales:<br />
+44 (0)1706 212524<br />
Start your free trial today<br />
www.cloud.texe.com
COMMENT<br />
Editorial Comment...<br />
During IFSEC, a number of interesting<br />
conversations highlighted how the<br />
relationship between integrators or<br />
installers and their end user customers can be<br />
enhanced thanks to emerging technologies<br />
and changing working practices. Several<br />
engineers explained how their business has<br />
grown, simply due to the fact that customers<br />
are increasingly receptive to proposals that<br />
target their businesses or organisations.<br />
For a lot of companies, the way they decide<br />
on security budgets is formulaic. Their insurer<br />
informs them the annual premiums will rise by<br />
£X,000 unless they increase security, and that<br />
figure then becomes the maximum they will<br />
invest in systems or upgrades. There are<br />
exceptions, but this scenario happens in a lot<br />
of cases. Integrators and installers then bid,<br />
knowing others will come in under that cost.<br />
This gives the perception that end users only<br />
care about price and are unwilling to pay the<br />
price for a system which delivers more.<br />
The integrators and installers I spoke to<br />
faced a very similar situation. The potential<br />
customer had a fixed budget and a general<br />
idea of what they wanted to achieve. However,<br />
it soon became clear that any system meeting<br />
the budget would include compromises, yet<br />
for a small amount more a credible and<br />
effective solution could be put in place. It’s a<br />
scenario many of you will be familiar with.<br />
The four of five engineers I spoke to, all in<br />
separate conversations, took a very similar<br />
approach. Firstly, the put together a tender<br />
which created a system within the customers’<br />
budgets. Then they added another document<br />
which outlined the compromises which had to<br />
be made to meet the budget, and put forward<br />
a second proposal which not only removed<br />
those compromises, but also added extra<br />
benefits of a non-security nature. The<br />
proposal focused on the total cost of<br />
ownership over the lifetime of the system, the<br />
potential return on investment created by<br />
efficiencies which the system could provide,<br />
and the potential for future upgrades and<br />
scalability should the need arise.<br />
Interestingly, all presented different<br />
additional benefits, based upon the needs of<br />
There can be no denying the entire solutions-based<br />
security industry is undergoing change. The<br />
technological landscape is developing at a rapid<br />
pace, communications, AI and processing are<br />
creating opportunities, the end user is aware of<br />
smart technologies and bespoke solutions are in<br />
demand. Customers’ expectations are changing,<br />
and that can only be a good thing.<br />
the individual sites. One offered power<br />
management, another monitoring of fridges<br />
and freezers, and one proposed tracking of<br />
company assets.<br />
One integrator told me the facilities<br />
manager at the site called him personally to<br />
point out how the second proposal made<br />
sense, and clearly illustrated why he would be<br />
their choice for a trusted partner. The others<br />
also reported a positive reaction from the<br />
customer, with one actually being asked if<br />
additional services could be added.<br />
The bottom line is simple: all won contracts<br />
at a higher value than the initial budget,<br />
because they offered benefits the user could<br />
understand, and which offered security and<br />
business efficiencies.<br />
The proposal focused on the total cost of ownership, the potential<br />
return on investment created by business efficiencies, and the<br />
potential for future upgrades and scalability should the need arise.<br />
7
BENCHMARK TEST<br />
TEST: VMS for Mainstream<br />
Applications (Part 2)<br />
Milestone: XProtect<br />
Axis: AXIS Camera Station<br />
AXIS Camera Station (ACS) is a VMS package from<br />
Axis Communications. It is aimed at small- to<br />
medium-sized applications and has been optimised<br />
for use with Axis’ own cameras. However, it also supports a number of devices which utilise<br />
ONVIF’s Profile S. This requires a higher licence level and compatibility might be limited in terms<br />
of which camera features are supported by the VMS.<br />
The GUI has been optimised for systems with lower camera counts. The VMS works with all<br />
video resolutions up to 20 megapixels (including 4K UHD) and frame rates of up to 120fps.<br />
Supported video formats include H.264 , H.265 and M-JPEG.<br />
ACS is available pre-loaded onto appliances, or as a service-based subscription model.<br />
The XProtect series of VMS software packages from Milestone Systems<br />
range from an entry-level free-of-charge package right up to an enterpriselevel<br />
edition for multiple sites. When considering packages for<br />
mainstream applications, there are three main choices: Essential+,<br />
Express+ and Professional+. There are Express and Professional versions,<br />
but we’d expect those to be retired in the near future. The ‘+’ versions use<br />
an enhanced code base which includes a number of benefits over the basic versions.<br />
The Essential+ version is free of charge, but only supports 8 cameras on a single server.<br />
Express+ supports up to 48 cameras on a single server, while Professional+ supports unlimited<br />
cameras and unlimited servers. Unlimited users are supported via the free-of-charge Smart<br />
Client on all versions.<br />
The software is compatible with the majority of video formats including H.265, H.264, M-JPEG<br />
and MPEG-4; it can also support 4K devices. The software supports a wide range of cameras,<br />
encoders, I/O devices and other systems including access control.<br />
All XProtect versions include an advanced rules engine for AND/OR programming, hardwarebased<br />
acceleration for decoding, maps functionality and Microsoft Active Directory support.<br />
The growth in VMS deployments for video<br />
surveillance and security management has grown<br />
significantly in recent years, and for good reason.<br />
Many VMS providers take an open platform<br />
approach, ensuring third party devices can be easily<br />
supported. This enables the creation of ‘best of<br />
breed’ solutions. While often considered as an ideal<br />
solution for large and complex sites, VMS systems<br />
have increasingly won favour with integrators and<br />
installers for mainstream applications due to their<br />
highly flexible capabilities.<br />
In the past the mainstream video<br />
surveillance market was very much<br />
hardware-centric when it came to recording<br />
and system management. However, with<br />
today’s evolving technological landscape, the<br />
case for open platform VMS solutions is<br />
becoming ever more compelling.<br />
The leading VMS packages often combine<br />
video management and recording, IVA<br />
implementations, as well as integrations with<br />
access control, perimeter protection, intruder<br />
detection, building management, business<br />
intelligence and a host of other sub-systems.<br />
In many cases, a VMS can provide an<br />
advanced and flexible security management<br />
solution which is highly cost-effective. The<br />
depth of flexibility and the ability to create<br />
8
BENCHMARK TEST<br />
truly bespoke solutions can be deployed in<br />
many different ways.<br />
There are a number of driving factors when<br />
specifying a VMS-based system for<br />
mainstream applications. The systems deliver<br />
simple installation and integration of a wide<br />
range of third party devices. Open platform<br />
VMS packages support the majority of devices<br />
from professional security manufacturers,<br />
with the market-leaders boasting thousands<br />
of supported products. This eliminates<br />
frustrations associated with single-brand<br />
hardware options.<br />
Often hardware-based recorders have<br />
limitations with regards to third party<br />
compatibility. Many NVRs only support the<br />
manufacturer’s own cameras and codecs,<br />
sometimes along with a few models from a<br />
limited number of partner companies. In some<br />
cases, future firmware upgrades don’t support<br />
new camera models from other<br />
manufacturers, so systems cannot be<br />
upgraded as technologies advance.<br />
Not only will an open platform VMS offer a<br />
vast array of supported third party models,<br />
but because drivers have been created<br />
specifically for the individual devices, all<br />
features should be supported.<br />
Another driver for the deployment of VMS<br />
solutions is the fact that they are scalable and<br />
upgradable. As the system is software-based,<br />
new developments can be quickly<br />
implemented, ensuring end users can realise<br />
the full potential from their investment.<br />
Many integrators and installers who switch<br />
to VMS platforms find the functionality and<br />
flexibility on offer is far in excess of what is<br />
available from similar hardware solutions.<br />
Additionally, they discover the available<br />
features are also superior to those available<br />
from higher cost hardware-based options.<br />
Axis: AXIS Camera Station<br />
AXIS Camera Station (ACS) is a VMS package<br />
from Axis Communications. It is aimed at<br />
small- to medium-sized applications and has<br />
been optimised for use with Axis’ own<br />
cameras. However, it also supports a number<br />
of devices which utilise ONVIF’s Profile S. This<br />
requires a higher licence level and<br />
compatibility might be limited in terms of<br />
which camera features are supported by the<br />
VMS.<br />
The GUI has been optimised for systems<br />
with lower camera counts. The VMS works<br />
with all video resolutions up to 20 megapixels<br />
(including 4K UHD) and frame rates of up to<br />
120fps. Supported video formats include<br />
H.264 , H.265 and M-JPEG.<br />
The two licensing options are Core and<br />
Universal. The Core licence allows the use of<br />
devices from Axis Communications only. The<br />
Universal licence is required if any third-party<br />
devices are used. It is worth noting that ACS<br />
used to be limited to 32 Core licences,<br />
meaning a higher amount of Axis devices still<br />
required the more expensive licence.<br />
However, from version 5.17, this has been<br />
changed. The VMS is also supported by AXIS<br />
Site Designer, which simplifies the task of<br />
specifying a system.<br />
ACS is available pre-loaded onto<br />
appliances, or as a service-based subscription<br />
model.<br />
9
BENCHMARK TEST<br />
ACS is supplied as a single .exe file; the file<br />
size is slender in comparison with some other<br />
VMS packages, and this makes the download<br />
and installation fast and simple. On starting<br />
the installation wizard, the installation<br />
executable file will check if the server<br />
hardware has the required version of the .NET<br />
framework. If it cannot detect the presence of<br />
the appropriate version, the package will<br />
install it automatically.<br />
With the VMS installed, the software<br />
searches for connected devices. The only<br />
interaction needed is to apply the correct<br />
passwords. Where multiple devices are added<br />
together and all have the same secure<br />
password, it is a simple task to apply the<br />
entered password to all devices which do not<br />
have a known password.<br />
In reality, if you’ve set some base<br />
configurations before attaching the cameras,<br />
Axis’ secure password policy will have forced<br />
a change from the default. It is possible to<br />
change camera configurations from within the<br />
VMS, but most installers will prefer to do this<br />
via the camera interface.<br />
Another option is to use the AXIS Site<br />
Designer tool. While not part of this test, we<br />
have seen a demo of the software and it<br />
greatly simplifies the design and configuration<br />
of the system. Config files can then be loaded<br />
into ACS, making initial set-up a simple and<br />
quick task. For many engineers looking to<br />
implement Axis-specific solutions, it will be a<br />
benefit.<br />
The installation and discovery process is<br />
very simple, as you’d expect with a<br />
predominantly own-brand VMS. Working with<br />
ONVIF devices doesn’t actually change the<br />
process, but the Site Designer tool is Axis<br />
specific.<br />
Once the cameras are discovered and<br />
authorised, adding them to the system gives a<br />
choice of a quick configuration or using a Site<br />
Designer configuration from the already<br />
mentioned Site Designer tool. The quick<br />
configuration option sets retention time,<br />
recording storage and recording mode, which<br />
allows the system to be up and running before<br />
you fine-tine the configurations.<br />
The GUI has menu options for Device,<br />
Storage, Recording and Events, Client,<br />
Connected Services, Server, Licenses and<br />
Security. The layout has a clean, modern<br />
design and is easy to follow. After some of the<br />
established VMS packages which still have<br />
their GUI design rooted in the days when<br />
Windows Servers were considered the<br />
pinnacle of software aesthetics, it’s a<br />
refreshing look.<br />
Much of the functionality of ACS will be selfexplanatory<br />
for integrators and installers who<br />
have worked with any VMS before. Playback<br />
utilises timeline scrubbing, time and date<br />
search and smart search options, and<br />
recordings of interest can be locked to<br />
prevent overwriting.<br />
Alarms and events are managed by Action<br />
Rules. These are simple relationships based<br />
upon trigger events and subsequent actions<br />
to manage incidents.<br />
Implementing Action Rules is a simple way<br />
to create advanced flexibility, allowing smart<br />
control over several system attributes.<br />
Action rules are created by specifying a<br />
trigger event, a subsequent action and a<br />
schedule period during which the rule is live.<br />
Available triggers and actions are shown in<br />
drop-down menus, making the process<br />
relatively fool-proof. If, for example, a camera<br />
has inputs and outputs, these are shown as<br />
options. If it does not, the choice will not<br />
appear in the menu.<br />
ACS is an intuitive VMS, and all the<br />
functionality is easy to access. While it does<br />
favour Axis-only applications, the option is<br />
there to add licensing for ONVIF devices. The<br />
latest changes have elevated it in terms of<br />
performance, but it remains an option best<br />
suited to Axis-centric sites.<br />
Milestone: XProtect<br />
The XProtect series of VMS software packages<br />
from Milestone Systems range from an entrylevel<br />
free-of-charge package right up to an<br />
enterprise-level edition for multiple sites.<br />
When considering packages for mainstream<br />
applications, there are three main choices:<br />
Essential+, Express+ and Professional+. There<br />
are Express and Professional versions, but<br />
we’d expect those to be retired in the near<br />
future. The ‘+’ versions use an enhanced code<br />
base which includes a number of benefits over<br />
the basic versions.<br />
The Essential+ version is free of charge, but<br />
only supports 8 cameras on a single server.<br />
10
Save<br />
the<br />
Date...
BENCHMARK TEST<br />
Express+ supports up to 48 cameras on a<br />
single server, while Professional+ supports<br />
unlimited cameras and unlimited servers.<br />
Unlimited users are supported via the free-ofcharge<br />
Smart Client on all versions.<br />
The software is compatible with the<br />
majority of video formats including H.265,<br />
H.264, M-JPEG and MPEG-4; it can also<br />
support 4K devices. The software supports a<br />
wide range of cameras, encoders, I/O devices<br />
and other systems including access control.<br />
All XProtect versions include an advanced<br />
rules engine for AND/OR programming,<br />
hardware-based acceleration for decoding,<br />
maps functionality and Microsoft Active<br />
Directory support.<br />
For the purposes of the test we are focusing<br />
on XProtect Expert+, but much of the core<br />
functionality is similar.<br />
XProtect Expert+ software is supplied as a<br />
single .exe file, which is downloaded from the<br />
Milestone website. The file is pretty hefty,<br />
because Milestone offers a single software<br />
executable file which is used for all versions<br />
of XProtect, including the enterprise variants.<br />
Which version is installed depends on the<br />
licence added at the start of the installation<br />
process. The XProtect package does include a<br />
copy of the Smart Client, but even with that<br />
included the file is large.<br />
You will need to ensure that the server has<br />
the appropriate version of the Microsoft .NET<br />
framework installed before adding Expert+.<br />
This is a free Microsoft software package and<br />
is simple to add; unlike many VMS packages,<br />
the XProtect installer doesn’t add it, but<br />
instead shows an error message and closes.<br />
XProtect has never been the swiftest<br />
installation for a VMS: it can take around 20<br />
minutes to complete the install, but<br />
it must be said aside from a few<br />
basic selections at the start the<br />
process is automatic.<br />
The two main elements of XProtect<br />
are the Management Client and the<br />
Smart Client. There are other<br />
elements such as the Mobile Client,<br />
but the Management and Smart<br />
Client are key to configuring the<br />
system. The former is used by the<br />
integrator or installers to set up and<br />
configure the system, while the<br />
latter is the user interface for day-today<br />
operations. The Smart Client is<br />
necessary for the engineer to view<br />
feeds and check displays, etc..<br />
Discovering devices is<br />
straightforward, and is carried out<br />
by adding hardware to the Recording<br />
Server. Hardware is automatically<br />
discovered; there is an option to update<br />
authentication details. Individual devices can<br />
also be added manually.<br />
For some who are new to the Milestone<br />
interface, the Management Client may seem<br />
complex. It borrows it look from the treestructure<br />
of Windows Servers. There are a lot<br />
of options, but if configured one section at a<br />
time it makes sense. Have no doubt about it,<br />
XProtect is flexible, allowing a huge number of<br />
parameters (including those of supported<br />
cameras) to be adjusted from the VMS. It does<br />
take longer than many other VMS software to<br />
configure, but it’s hard to complain when the<br />
functionality has a high degree of<br />
adjustability.<br />
Once you get used to the menu flow, you<br />
start to appreciate just how engineer-friendly<br />
XProtect is. A great example is how the<br />
system deals with alarm events and<br />
subsequent actions. This is done via Rules,<br />
which make use of AND/OR logic. Trigger<br />
events can be simple or complex, but all are<br />
simple to set via drop-down menus and<br />
clickable links. Not only are rules easy to<br />
implement, but errors don’t happen as only<br />
available functions for each device are shown.<br />
Multiple triggers can be set, allowing events<br />
to be filtered by a whole variety of criteria.<br />
The Smart Client interface is intuitive and<br />
simple to use, and does what is required with<br />
regard to video management. At first glance it<br />
may appear to be somewhat minimalist, but it<br />
uses a number of contextual menus, and once<br />
you become accustomed to how the menus<br />
work there is a depth of easy-to-access<br />
functionality and control on offer.<br />
The Smart Client is very different to the<br />
Management Client in terms of appearance,<br />
12
BENCHMARK<br />
...The Event of 2019<br />
5/6 November<br />
SiX<br />
19<br />
2 November 5/6<br />
Dedicated to Installers & Integrators<br />
In Association with:<br />
sixevent.co.uk<br />
ORGANISED BY Pro-Activ<br />
CONTACT: David Lewis on 0208 295 8309 (david.lewis@proactivpubs.co.uk) or Nick Tiday 0208 295 8302 (nick.tiday@benchmarkmagazine.com)
BENCHMARK TEST<br />
and offers a sleek and modern HTML5-type<br />
feel, echoing many user-facing software<br />
packages. Performance is stable, and if you’re<br />
viewing multiple high resolution streams, it’s<br />
best to use hardware acceleration to ensure<br />
smooth displays. Otherwise, there’s little to<br />
fault with the interface.<br />
XProtect works well. There aren’t any<br />
features you’d need for a mainstream<br />
application which are missing, it delivers a<br />
high level of flexibility, and is a very robust<br />
platform. During the test it didn’t miss a beat,<br />
and delivered the advanced functionality you<br />
will expect from a VMS solution.<br />
BENCHMARK VERDICT<br />
Axis: AXIS Camera Station<br />
AXIS Camera Station (ACS) is unashamedly biased towards systems which use Axis devices,<br />
and much of the functionality – such as support for Zipstream, Lightfinder and other Axis<br />
technologies – is a benefit to those who’ve opted to use the cameras. Being aimed at small- to<br />
medium-sized applications, and optimised for use in such applications, does make it stand<br />
out from the crowd. It can be used with third party devices, but most integrators will select<br />
ACS for the additional benefits, such as AXIS Site Designer. ACS has been well thought out,<br />
and offers a high level of value. As such, it has to be given Recommended status, albeit with<br />
the proviso there are better choices if you don’t have an estate of Axis devices.<br />
Milestone: XProtect<br />
The XProtect series of VMS software packages from Milestone Systems has pretty much<br />
become the standard VMS against which all others are judged. It has flexibility in spades, the<br />
performance is high and operation is reliable and as expected from a leading product. At the<br />
enterprise end of the market, it’s consistently one of the outstanding VMS choices for<br />
integrators looking to create a bespoke solution. For mainstream applications where less<br />
bespoke functionality is required, the VMS is still impressive, and it’s hard to knock the<br />
software, but some integrators and installers might find it overkill. Despite this, it does<br />
elevate security system design and as such it has to ge given Recommended status.<br />
Cathexis: CathexisVision 2019<br />
CathexisVision 2019 is an ideal VMS for mainstream applications, and one which we think<br />
more integrators and installers should consider. At first it does have a strange almost minimal<br />
feel, despite offering a full range of functions and features often only found on more costly<br />
high-end products. It includes some high-end flexibility with regard to event management,<br />
and together with an ease of customisation, it as a management option which will be of<br />
interest to integrators and installers creating smarter solutions. The implementation is very<br />
installer-friendly, which aides fast configuration, and because the software is relatively lean it<br />
runs smoothly, delivering consistent performance. Because of this, CathexisVision 2019 is<br />
rated as Recommended for use in mainstream applications.<br />
Hanwha Techwin: Wisenet Wave<br />
When Wisenet Wave first appeared, it had a few rough edges which were only to be expected<br />
as it was a new implementation of a VMS, albeit one where the core code was based upon a<br />
previously established product. Hanwha Techwin has since added some refinements and<br />
generally overhauled much of the operational side of the product, and as such it is a more<br />
dependable choice than before. It is easy to work with, but it could be further improved. It<br />
would churlish to pick fault, as it has come a long way, but it still lacks some of the<br />
refinements which other longer established products have. That said, the installation and<br />
configuration process are straightforward, although we did have a few early freezes during<br />
the licensing stage. The event management options have improved, but still lack some of the<br />
more advanced features of other VMS products. Because of this, Wisenet Wave is rated as<br />
Recommended for mainstream applications, with the proviso that it is suitable for those with<br />
a need for basic alarms.<br />
14
SiX<br />
SiX: an essential event for<br />
integrators and installers<br />
For many system integrators and security<br />
installers, the future of the security<br />
industry is dependent upon the delivery<br />
of enhanced flexibility. Increasingly, end users<br />
are seeking features and functionality which<br />
fits with their vision of a smarter future. As a<br />
result, intelligent technologies which provide<br />
advanced capabilities, scalable systems and<br />
bespoke solutions are not just expected; they<br />
are demanded by many businesses and<br />
organisations.<br />
Today’s technologies allow integrators and<br />
installers to not only deliver higher than ever<br />
levels of security and protection to businesses<br />
and organisations, but also enable them to<br />
offer a high level of benefits and added value<br />
which create business efficiencies. By<br />
ensuring end users enjoy a greater return on<br />
investment, integrators and installers taking a<br />
smart approach to business can enjoy an<br />
increased willingness by their customers to<br />
invest in smarter systems and solutions.<br />
Demand for smart and more efficient<br />
systems is high, and everyday there are more<br />
customers seeking such solutions. With many<br />
of the new and emerging technologies having<br />
a significant impact on the security arena, the<br />
flexibility and scalability of systems is<br />
constantly being enhanced. Security is not<br />
just about reducing the risk of crime. It now<br />
includes provision of a range of benefits such<br />
as compliance, asset management, building<br />
control, business intelligence and duty of care<br />
monitoring.<br />
It is vital that system integrators and<br />
security installers realise the value in these<br />
systems and ensure they offer solutions that<br />
meet customer expectations. Developments<br />
in other technology-based sectors are raising<br />
the bar in terms of performance, and end<br />
users expect the same from security.<br />
Attending Six in Manchester later this year<br />
will enable integrators and installers to<br />
network with innovative, market-leading<br />
manufacturers and service providers. SiX<br />
SiX<br />
19<br />
On 5-6 November 2019, SiX, an event specifically<br />
targeted at system integrators and security<br />
installers interested in the design, delivery and<br />
implementation of smarter solutions will take place<br />
at Event City in Manchester. Given the rapidly<br />
evolving technological landscape in today’s security<br />
sector, and the emerging technologies which add<br />
value for end users, this event promises to link<br />
forward-thinking engineers with similarly minded<br />
manufacturers and service providers.<br />
will create the only event dedicated to the<br />
delivery of efficient and value-added<br />
solutions.<br />
The event will include a conference<br />
programme, hands-on sessions and the<br />
ability to meet with manufacturers and<br />
service providers to discuss technology,<br />
implementations, integrations and other<br />
needs when creating and delivering best-ofbreed<br />
security solutions. Registration to<br />
attend is free-of-charge.<br />
2 November 5/6<br />
For event registration, visit: sixevent.co.uk<br />
15
ADVERTISEMENT FEATURE<br />
Axis Communications IFSEC<br />
Show highlights<br />
Learn more at www.axis.com<br />
With no shortage of headlines around the<br />
globe in the last year that serve to<br />
highlight the growing importance of<br />
security, Axis welcomed the start of IFSEC<br />
International in London. Kicking off the<br />
exhibition were a number of exciting<br />
announcements including new products,<br />
partner initiatives and the launch of a Smart<br />
Cities and Smart Buildings whitepaper that<br />
demonstrates how Axis continues to innovate<br />
for a smarter, safer world. The Axis Daily Report<br />
captured on film the highlights of each day as it<br />
unfolded, with discussions on topics ranging<br />
from cybersecurity, sustainability, analytics and<br />
the rise in cloud-based ‘as-a-service’ security<br />
solutions.<br />
Cybersecurity topped the agenda, with<br />
cybersecurity expert Steve Kenny involved in<br />
several speaker events including delivering a<br />
keynote on the topic, being involved in a panel<br />
debate on biometrics, while leading discussions<br />
on the subject at the Axis-hosted consultants’<br />
lunch. Visitors learned about what Axis is doing<br />
to improve its cyber credentials, the importance<br />
of a trusted supply chain and how security<br />
accreditations, such as Cyber Essentials Plus,<br />
demonstrate Axis’ ongoing commitment to<br />
being the best it can be.<br />
New product announcements were as much a<br />
part of the fabric of IFSEC this year as years<br />
past. Axis’s new 7th generation ARTPEC chip is<br />
optimised for network video and delivering new<br />
capabilities including better imaging, enhanced<br />
security, powerful compression and the ability<br />
to run analytics at the edge. Axis also launched<br />
the Axis Camera Station System-as-a-Service,<br />
an exciting opportunity to access the proven<br />
video management software based on a<br />
recurring monthly payment model. Also on the<br />
stand was Axis’ range of integrated IP audio<br />
solutions that add features including public<br />
address, background music and scheduled<br />
announcements to an existing surveillance<br />
system.<br />
Two of Axis’ partners had a presence on the<br />
stand, with Morphean announcing its<br />
technology partnership with Simons-Voss, to<br />
enable its Access Control-as-a-Service, a<br />
solution that utilises door controllers from Axis<br />
Communications. The AXIS A1001 and the AXIS<br />
A1601 serve as the interface between the cloud<br />
and the SimonsVoss’ SmartIntego door locking<br />
system. Milestone Systems presented<br />
demonstrations of Axis Optimiser for Milestone<br />
XProtect, a suite of plug-ins and features that<br />
optimise the usability of Axis cameras in<br />
XProtect.<br />
Axis’ sustainability agenda, along with ethics<br />
and values, was again one of the main<br />
prevailing themes. The ethics and values behind<br />
Axis’ technology are as important as the<br />
technology itself, and the company has a<br />
continuing commitment to put purpose beyond<br />
profit.<br />
The strength of the Axis Communications<br />
brand relies on the strong relationship between<br />
customers, partners and employees. In an era of<br />
heightened conscious capitalism, Axis’ focus on<br />
safeguarding the welfare of people and planet<br />
is key. This was confirmed by Great Place to<br />
Work who recognised Axis as one of the UK’s<br />
Best Workplaces in 2019. Axis Communications<br />
ranked 10th in the Small Business category.<br />
Axis is immensely proud of its people, and<br />
the confidence and camaraderie between Axis<br />
and its partners is evident. Axis’ employees<br />
continue to surprise by their commitment, not<br />
only to each other, but to benefit others as part<br />
of a responsibility to society.<br />
On the final day, the UK Surveillance Camera<br />
Commissioner announced the first voluntary<br />
cybersecurity standard and compliance<br />
certification mark for the manufacturers of<br />
surveillance cameras. Axis played a part in the<br />
development of the standard and wholly<br />
welcomed its introduction.<br />
Whether developing and implementing new<br />
technologies and services or doing its bit to<br />
help the planet and support others, Axis<br />
remains committed to its central focus:<br />
innovating for a smarter, safer world.<br />
16
TECHNOLOGY<br />
Get Connected, Take Control<br />
For many professional system integrators<br />
and security installers, the evolving<br />
technological landscape is creating<br />
additional opportunities when it comes to the<br />
delivery of added-value solutions. Customers<br />
not only expect seamless and immediate<br />
service; they demand it. If user expectations<br />
are to be met, then engineers need to be both<br />
flexible and agile.<br />
SaaS (Software-as-a-Service) allows a high<br />
degree of flexibility, allowing users to pick<br />
and choose which elements of a system are<br />
important to them, prioritising on receiving<br />
the features and support they require. The<br />
solutions are also cost-effective. This is<br />
because the provision is from experts who<br />
maintain, update and deliver the software<br />
functionality. There is no need for dedicated<br />
server space running programs, and<br />
maintenance issues are taken by the service<br />
provider. Finally, the solutions are benefitsrich,<br />
adding value to everyday operations and<br />
increasing business efficiency.<br />
For integrators and installers, the fact that<br />
end users understand and appreciate the<br />
benefits of SaaS is a bonus. When offering<br />
SaaS-enabled systems, the customer will<br />
immediately understand the benefits in terms<br />
of cost-savings, lack of disruption and the<br />
advantage of a subscription-based model.<br />
However, there are a number of other<br />
advantages to this approach for engineers.<br />
Software set-up and configuration is<br />
simplified, and updates occur automatically in<br />
the cloud, so the software is always up to<br />
date. Maintenance and health-checks on the<br />
system can be carried out remotely, and<br />
issues can be identified and dealt with before<br />
a problem arises. The SaaS approach also<br />
generates recurring revenue for the integrator<br />
or installer.<br />
Enhanced control<br />
SaaS can deliver an enhanced level of control<br />
for integrators and installers. This is<br />
evidenced by considering SPC Connect from<br />
Vanderbilt. SPC Connect is a cloud-based<br />
SaaS solution which connects with SPC<br />
control panels to deliver a wealth of benefits<br />
and proactive control over an entire estate of<br />
systems. The intuitive software allows<br />
integrators and installers to manage and<br />
maintain all SPC panels from any location.<br />
The benefits are immediately obvious,<br />
allowing integrators and installers to better<br />
manage their field<br />
personnel. Specific<br />
roles and<br />
permissions can be<br />
granted to individual<br />
engineers, ensuring<br />
a secure hierarchy is<br />
in place, and control<br />
panels can be<br />
grouped to improve<br />
management.<br />
Groups can be<br />
geographical, or by<br />
customer, thus ensuring the right engineers<br />
can access relevant systems.<br />
Remote maintenance and health-checks<br />
allow engineers to carry out regular<br />
assessments of systems, identifying any need<br />
for maintenance and often identifying<br />
potential issues before they become a<br />
problem for the customer. This ensures the<br />
installation company is seen as being on the<br />
front foot by the end user. Also, as systems<br />
become smarter and offer additional benefits<br />
to customers, an engineer can react to<br />
requests for configuration changes<br />
immediately, without visiting the site.<br />
As is the nature with technical devices,<br />
problems will sometimes arise. Using SPC<br />
Connect, the latest configuration file can be<br />
downloaded by the engineer and saved.<br />
Should an error occur, the last correct<br />
configuration file can be remotely uploaded to<br />
the control panel, usually resolving any<br />
problems in a very short time. This is also a<br />
benefit where several sites require the same<br />
or very similar configurations, such as with<br />
chain retail stores of multi-tenanted offices.<br />
Finally, SPC Connect is used to power<br />
mobile apps for end users, ensuring<br />
customers have access and control over their<br />
systems in a way they prefer.<br />
In summary<br />
SaaS is continuing to grow in other sectors,<br />
and as such many business and organisations<br />
expect the approach from their security<br />
providers. Using a cloud-based option such as<br />
SPC Connect delivers the benefits end users<br />
are demanding, and also offers value to<br />
integrators and installers.<br />
Get connected and take control with Vanderbilt’s award-winning SPC Connect<br />
service-based solution. https://vanderbiltindustries.com/spcconnect<br />
17
INNOVATION FOCUS<br />
INNOVATION FOCUS: OPTEX<br />
Bridge Powered by CHeKT<br />
Increasingly, visual<br />
verification of events<br />
and incidents is a<br />
sought-after function.<br />
While sequential<br />
confirmation has its<br />
place, the reality is that<br />
video delivers<br />
information which<br />
provides a higher<br />
degree of certainty as to<br />
what has caused an<br />
alarm event. For sites<br />
which don’t have the<br />
budget to implement a<br />
full video surveillance<br />
system to link to<br />
intruder alarms, the<br />
OPTEX Bridge, powered<br />
by CHeKT, offers a costeffective<br />
solution.<br />
Ever since<br />
the demand grew for<br />
verified alarm activations, integrators<br />
and installers have had two credible choices:<br />
visual verification or sequential verification.<br />
The use of audio as a verification tool was<br />
called into doubt many years, and even now it<br />
remains an option few would consider.<br />
It has to be remembered that the goal<br />
of verification is to allow a remote<br />
operator, who will usually not be<br />
familiar with the site, to assess whether<br />
or not an alarm is genuine or a nuisance<br />
event.<br />
In the intruder alarm sector,<br />
sequential verification became<br />
established as the first choice, not because it<br />
was better than visual verification, but<br />
because it was more cost-effective and<br />
simpler to implement. At the time, video was<br />
predominantly analogue, and creating a<br />
seamless integration with intruder alarms was<br />
costly and time-consuming.<br />
18
INNOVATION FOCUS<br />
In today’s security sector, visual verification<br />
is not only simple to implement, but it also<br />
allows the creation of smarter solutions.<br />
However, it is often dependent upon the<br />
implementation of a digital video surveillance<br />
system. While there is no doubting the<br />
flexibility and scalability available from VMS<br />
software, integrators and installers are often<br />
constrained by budgetary considerations.<br />
Where an end user has limited funds, they<br />
will typically opt for an intruder alarm system<br />
as it represents a good level of protection in a<br />
cost-effective package. While many intruder<br />
detection systems allow the addition of video<br />
cameras, these are usually viewed by the<br />
user, via an app, and are designed for either<br />
self-monitoring or for life-style applications.<br />
The issue is where a commercial or<br />
industrial business or organisation requires a<br />
graded alarm system, along with visual<br />
verification which can be used by a (often<br />
third party) control room or monitoring centre.<br />
OPTEX offers a solution in the form of its<br />
OPTEX Bridge powered by CHeKT.<br />
What is it?<br />
The OPTEX Bridge powered by CHeKT is a data<br />
bridge which can be connected to zones on<br />
any professional quality intruder detection<br />
control panel. It is effectively ‘invisible’ to the<br />
alarm system. It also connects to ONVIF<br />
Profile S-compatible cameras, allowing<br />
images from zones in alarm to be sent to an<br />
ARC or central control room when an event<br />
takes place.<br />
By bridging the two separate systems, it<br />
allows an intruder detection system to be<br />
supplemented by a single camera, a basic<br />
video surveillance system or a combination of<br />
devices, ensuring legacy equipment can be<br />
reused and cost-effective upgrades are always<br />
possible.<br />
The OPTEX Bridge powered by CHeKT also<br />
includes a cloud service which enables<br />
interaction between the site, the ARC and the<br />
user.<br />
Installation of the Bridge is claimed to be<br />
quick and easy. It requires looping of the zone<br />
wiring through the bridge hardware device.<br />
The next step is to add an ONVIF Profile S-<br />
compatible camera, and this is then linked to<br />
the relevant zone. There is no need for port<br />
forwarding or firewall configurations, and<br />
mapping between alarm panel zones and<br />
video devices has been designed to be<br />
intuitive.<br />
Because the Bridge is used for visual<br />
verification rather than monitoring,<br />
transmission of data is quick and simple. This<br />
ensures the delivery of relevant images do not<br />
cause a delay in the handling of alarm events.<br />
There is also an option for a designated user<br />
to receive the images, allowing them to accept<br />
or reject an event cause.<br />
How does it work?<br />
When an alarm activation occurs, the alarm<br />
data is sent to the ARC or control room as<br />
normal. The ARC operator can then view the<br />
associated images, via a cloud portal, within a<br />
matter of seconds. It is important to note that<br />
ARCs will not require additional software or<br />
dedicated hardware to do this. They will then<br />
be presented with images which show the<br />
cause of the event.<br />
Based on the visual verification, they can<br />
either action a police response or close the<br />
alarm.<br />
It has to be accepted that whilst visual<br />
verification is significantly more effective than<br />
sequential verification, it’s not always perfect.<br />
If the operator is unsure as to whether or not<br />
the alarm event is valid, they can access video<br />
devices at the site via a monitoring portal if<br />
authorised to do so.<br />
If there remains any doubt about the<br />
validity of an event, the operator can push the<br />
images and alarm data to the user, via an app.<br />
The operator receives a real-time notification<br />
if the user is viewing the information. This<br />
allows them to wait when they’re aware the<br />
images are being viewed. If there is no<br />
response from the user, they can proceed with<br />
passing the alarm to the police.<br />
When the user receives and views the<br />
images, they can then, via a single button<br />
press on their smart device, send a message<br />
to the ARC to either action the alarm or it clear<br />
it down.<br />
Features and functions<br />
The actual Bridge hardware is a small device,<br />
measuring approximately 82 x 100 x 36mm.<br />
The unit supports four alarm input zones and<br />
one trouble output. It includes a 10/100Base T<br />
LAN port and is powered by a 12V DC source.<br />
Manufactured from white polycarbonate,<br />
the device also includes an SDHC card slot<br />
and an audio output. LEDs are used for status<br />
updates (indicating power, status and alarm<br />
condition).<br />
The Bridge can be wired for zone<br />
passthrough or relay output, offering a range<br />
of options to suit various panels and sites.<br />
In summary<br />
OPTEX Bridge powered by CHeKT allows any<br />
professional intruder alarm panel to be<br />
upgraded to deliver monitored visual<br />
verification, quickly and cost-effectively.<br />
19
SMART SOLUTIONS<br />
Increasing Success with<br />
Expanded Integrations<br />
Increasingly, end users are seeking and investing in<br />
solutions which not only deliver credible and robust<br />
security functionality, but also ensure added value<br />
can be realised. With demand for greater levels of<br />
flexibility on the rise, it is no longer enough for a<br />
security solution to only offer protection for people<br />
and assets. While this will remain the core reason<br />
for specifying such a solution, integrators and<br />
installers must be able to offer additional benefits.<br />
In today’s rapidly evolving security sector,<br />
integration is the order of the day.<br />
Customers do not want disparate systems<br />
which operate independently of each other.<br />
The evolving technological landscape has<br />
relegated such systems to the past. In the<br />
vast majority of sectors, manufacturers are<br />
working tirelessly to bring systems together,<br />
sharing data and delivering seamless<br />
solutions, all controlled from a single intuitive<br />
interface.<br />
End user expectations are that any modern<br />
smart system will be the same, and this is<br />
increasingly true for security-centric systems.<br />
20
SMART SOLUTIONS<br />
People expect security technologies to<br />
integrate, and for good reason. Video<br />
surveillance complements audio-based<br />
technologies, and both are made more<br />
powerful by adding transactional data such as<br />
access control. A combination of real-time<br />
video with accurate and timely site status data<br />
enables a host of smart features to be<br />
implemented. Add in alarm data, and the<br />
system offers a considerably higher level of<br />
performance.<br />
However, where the real benefits of<br />
integration lie are when the security solution<br />
is combined with other business critical<br />
systems. These might enable power and<br />
energy control, to save the user ongoing costs<br />
in the management of their site. In certain<br />
industries such as retail or entertainment, the<br />
collection and reporting of customer<br />
behaviours could add value, for marketing or<br />
product placement purposes. Also, real-time<br />
data on occupancy and flow could ensure the<br />
site’s management is better able to deploy<br />
staff more effectively.<br />
These integrations can ensure the end user<br />
sees real value from their solution, which in<br />
turn increases the return on investment.<br />
Increasingly, integrators and installers who<br />
offer additional benefits are not only winning<br />
new business, but often see the budgets<br />
increase because the offered services are of a<br />
real value to the customer.<br />
Integrations for success<br />
COSMO PSIM+ is a software-based solution<br />
which adds functionality to security systems<br />
by simplifying integration with other<br />
technology-based systems. This is possible<br />
because COSMO PSIM+ has been developed<br />
at as ‘API-first’ product. Its application<br />
programming interface has been specifically<br />
created to allow the creation of advanced<br />
integrations which elevate security systems<br />
beyond the basic task of protection. However,<br />
the software achieves all this without<br />
compromising on fundamental security<br />
principles.<br />
By understanding the core functionalities of<br />
COSMO PSIM+, it is easier to consider how<br />
the solution can be best deployed to deliver<br />
added value efficiencies for end users. The<br />
first role of the software is the collection of<br />
relevant data, whether it is generated by the<br />
security system or other business or site<br />
management systems. Because of this data<br />
collection role, it is important COSMO PSIM+<br />
is GDPR compliant. For many end users, GDPR<br />
represents an area of importance, so<br />
integrators and installers will benefit from the<br />
fact the software addresses this issue.<br />
As the data is gathered, it is analysed by the<br />
software in real-time, ensuring important<br />
information can be identified and prioritised,<br />
based upon the criteria set by the user via the<br />
system configurations. For example, if the<br />
goal is energy and power management, the<br />
software might compare access control and<br />
intruder alarm data to identify when<br />
departments are unmanned, allowing power<br />
to be switched off.<br />
If an event occurs, the software can push<br />
relevant data and associated information,<br />
such as video streams, event logs,<br />
transactional data or other customised<br />
reports, to operators. They can then use the<br />
data to assess incidents and verify whether<br />
additional action needs to be taken. The value<br />
of real-time situational information is that the<br />
end user saves time and resources by being<br />
notified of issues rather than having to<br />
investigate once they discover something has<br />
happened.<br />
COSMO PSIM+ can also be used to assist<br />
operators, security staff, maintenance teams<br />
or any other authorised individuals to deal<br />
with situations and problems as they arise.<br />
Through the implementation of workflows, the<br />
software can provide guidance or deliver<br />
instructions to specified team members,<br />
ensuring compliance with operating<br />
procedures and best practice is always<br />
adhered to.<br />
Through automated real-time reporting, the<br />
notifications are recorded, along with details<br />
of any actions taken by operators or other<br />
team members. The software can even assess<br />
whether the actions meet requirements for<br />
compliance.<br />
Reports can provide valuable insight to<br />
enable a full and thorough investigation by<br />
the end user. A complete audit trail is also<br />
created, providing customers with evidence<br />
that appropriate processes and procedures<br />
have been followed.<br />
In summary<br />
COSMO PSIM+ simplifies integration and<br />
ensures the user experience is both effective<br />
and consistent. For integrators and installers<br />
looking to deliver smart solutions, it is<br />
effectively the ‘glue’ which brings disparate<br />
technologies into one seamless and efficient<br />
solution.<br />
COSMO PSIM+ is hardware agnostic and the<br />
software is modular. This makes it ideal for<br />
use in a wide range of applications, from large<br />
campus-type environments down to smaller<br />
systems in SMEs which require a specific<br />
feature to enhance the overall level of<br />
performance on offer.<br />
21
CLOUD SERVICES<br />
Cloud Video Services:<br />
Not Fluffy?<br />
When cloud services first appeared in the video<br />
surveillance sector, they didn’t exactly set the<br />
imaginations alight. Most of the services offered<br />
were limited to the storage of streams, and limited<br />
upload capabilities made the offering more costly<br />
than NVRs and DVRs, with less performance.<br />
However, in recent years things have changed, and<br />
increasingly the technology offers a wide range of<br />
benefits and cost-efficiencies.<br />
Across the commercial and industrial<br />
sectors, an increasing number of today’s<br />
critical business and process<br />
applications and associated technologies<br />
increasingly make use of the cloud and<br />
associated services. The growth of SaaS<br />
(software as a service) is accepted by the vast<br />
majority as the norm. Where once people<br />
wanted ‘ownership’ of their systems, today<br />
they prefer to offload the more labourintensive<br />
elements of solutions such as<br />
maintenance, managing upgrades and<br />
investing capital in upfront payments in<br />
exchange for a recurring cost which covers<br />
everything.<br />
In a growing number of sectors, cloud<br />
services are not only expected, but are<br />
demanded by customers. The tide of opinion<br />
and acceptability has turned very much in<br />
favour of cloud-based services, and the<br />
security industry cannot – and many will<br />
argue should not – attempt to buck the trend.<br />
If end users want cloud services, the<br />
traditional arguments such as unreliability,<br />
high costs and fragile infrastructure, could fall<br />
on deaf ears, because many businesses and<br />
organisations rely on cloud services for their<br />
core operations.<br />
While in the past it could have been argued<br />
that video surveillance wasn’t ready for<br />
migration to the cloud, today there are many<br />
arguments for the use of cloud services with<br />
video solutions. While these by far outweigh<br />
arguments against a cloud-based approach, it<br />
doesn’t necessarily mean all cloud services<br />
will be suitable for all sites. As with any<br />
technology, every application needs to be<br />
22
CLOUD SERVICES<br />
considered individually, to assess how and<br />
where cloud services could add value.<br />
When debating the validity of cloud services<br />
in video surveillance, it must be remembered<br />
that much like video technology, cloud-based<br />
services and their associated benefits do vary<br />
considerably.<br />
This variation even extends as far as<br />
considering what providers mean when they<br />
refer to ‘the cloud’. In common parlance, it is<br />
a catch-all term for remote hosting of software<br />
and services which may be provided by a third<br />
party, or could be under the control of the<br />
system operator. As communications<br />
technologies improve, so the notion of<br />
‘private clouds’ are becoming more popular<br />
with many end users.<br />
Private clouds can make use of secure and<br />
dedicated infrastructure, providing a solution<br />
that has many of the benefits of cloud<br />
services – centralised management, real-time<br />
accurate status reporting, simpler<br />
management and maintenance of software<br />
and other IT resources – whilst also providing<br />
the security and assurance of having a wholly<br />
owned and maintained infrastructure firmly<br />
within the user’s control.<br />
However, more often than not, cloud<br />
services in the video surveillance sector are<br />
provided by third parties, and the benefits<br />
very much depend upon the functionality<br />
being offered.<br />
Cloud functionality<br />
Cloud services vary in functionality dependent<br />
upon the level of provision being offered.<br />
Systems can be fully cloud-based, but most<br />
offer a hybrid solution, where a local<br />
hardware-based system is supplemented with<br />
additional services and/or features which are<br />
accessed via a cloud service. In some cases,<br />
the system might operate as expected on a<br />
local level, but additional tools<br />
of tweaks are achieved<br />
through cloud<br />
connectivity.<br />
If that<br />
sounds<br />
vague, it’s because it is! The cloud is merely<br />
the infrastructure used for delivery, a remote<br />
network which can be connected to in order to<br />
add features and functions to a system.<br />
Many integrators and installers will already<br />
be using cloud-based services across their<br />
portfolio of sites, even if they are unaware of<br />
it. Many systems will offer a simple interface<br />
enabling users to remotely manage the basic<br />
configurations of their systems. The interface<br />
will inevitably be cloud-based. Equally, if the<br />
user receives notifications or can generate<br />
reports to share with other authorised<br />
persons, again this will usually be cloudbased.<br />
The cloud is ideal for such purposes as<br />
those accessing the information or managing<br />
system parameters have no need to interact<br />
with the core operational security system<br />
itself. User error is reduced, and site security<br />
is enhanced. With the growing focus on<br />
cybersecurity, cloud services also ensure any<br />
rogue users cannot interact directly with the<br />
system’s OS or software.<br />
By way of an example, if a site has video<br />
surveillance in place to protect loading bays<br />
at a warehouse, the video might be used out<br />
of hours for security purposes. However, while<br />
the site is open for business, the video<br />
streams could offer efficiencies to a logistics<br />
manager. The images would show at a glance<br />
which loading bays are empty, and how many<br />
vehicles are waiting in a holding area.<br />
Restricting access to such footage detracts<br />
from the overall value of the system for an<br />
end user, but equally allowing various<br />
personnel to log in to the security system to<br />
view the footage is a risk. A client-based<br />
connection could be used, but this relies on<br />
the user having access to a device with the<br />
relevant software loaded. Instead, it is easier<br />
and more cost-effective for them to log in to a<br />
23
CLOUD SERVICES<br />
cloud-based service, using any browser, to<br />
see the footage and related data.<br />
Cloud services can also be used to share<br />
information gathered from metadata. This can<br />
be associated with video analytics, enabling<br />
alarm and incident reports to be shared, but<br />
the insights might not have a security<br />
relevance. For example, many cameras<br />
support business intelligence-based analytics,<br />
such as people counting, heatmapping, flow<br />
analysis, etc.. This data has great value for<br />
many users such as retailers, hospitality and<br />
entertainment providers, etc., but having to<br />
interrogate cameras or VMS packages to<br />
access it invariably means it doesn’t get used<br />
as often as it could be. By delivering<br />
supplementary data in push notification<br />
reports via a cloud service, the user enjoys a<br />
simple and automated benefit from their<br />
system.<br />
While considering video analytics, a<br />
growing area is SaaS: software as a service.<br />
With surveillance, this is sometimes referred<br />
to as VSaaS, video surveillance as a service.<br />
While video is streamed and archived locally,<br />
a metadata stream is also sent to a cloud<br />
server where analytics algorithms are applied.<br />
If alarms occur, the data is pushed back to the<br />
locally recorded stream, flagging events.<br />
The benefit of cloud-based analytics is that<br />
the video stream itself is not transmitted,<br />
which on sites with multiple cameras would<br />
soon impact on upload speeds. Instead, a<br />
local appliance – usually supplied by the<br />
service provider – creates a metadata stream.<br />
As this is comprised of alphanumeric data, the<br />
network load is minimal and transfers are fast<br />
and reliable.<br />
With a good implementation, there is little<br />
difference between using a VSaaS IVA service<br />
and localised servers for content analysis. The<br />
bonus for integrators and installers is that<br />
updates, maintenance and licensing all takes<br />
place in the cloud and is managed by the<br />
provider. The capital outlay is also reduced as<br />
the service is paid for on a subscription<br />
model, which also equates to recurring<br />
revenue for the engineer.<br />
The final common option for cloud services<br />
is storage, and this is one that often creates<br />
the biggest debate. Theoretically, video<br />
storage in the cloud is possible. However, in<br />
reality, most properties have limited upload<br />
resources, and as a result relying on the cloud<br />
as a storage solution for anything other than<br />
one of two cameras isn’t a credible option.<br />
However, where small amounts of footage<br />
showing exceptions or alarms needs to be<br />
shared, such as for visual verification, the<br />
cloud offers a realistic and cost-effective<br />
choice.<br />
Typically, such systems are hybrid, with full<br />
resolution streams being captured and<br />
archived locally on servers or NVRs, and<br />
event-based clips for sharing are transmitted<br />
to the cloud, allowing easy access for remote<br />
users.<br />
While these examples of how cloud services<br />
can add value cover most applications, there<br />
are other more specialist cloud applications.<br />
For example, some suppliers use cloud<br />
connectivity to deliver configurations or to<br />
implement additional services, such as DDNS,<br />
without intervention for the integrator or<br />
installer. Another use is the ‘locking down’ of<br />
cybersecurity measures once configurations<br />
are complete. By simplifying installation<br />
procedures and assisting with advanced<br />
system configurations, the cloud services can<br />
enhance system delivery for engineers.<br />
In summary<br />
Judging cloud services is difficult, because<br />
many of the provisions are specific to<br />
individual manufacturers and service<br />
providers. Like most things in technologybased<br />
security, the offerings are constantly<br />
evolving, and the benefits can be significant if<br />
the services are used in the right way.<br />
It has to be accepted that whilst cloud<br />
services aren’t suited to every video<br />
surveillance application, there will inevitably<br />
be a cloud solution of some type which can<br />
deliver benefits. When cloud services are<br />
selected and deployed correctly, in relevant<br />
applications, a credible solution can be<br />
created which will enhance the user’s return<br />
on investment.<br />
24
DEEP LEARNING ADDS VALUE<br />
TO VIDEO SOLUTIONS<br />
Uri Guterman<br />
Alessia Saggese<br />
In this article Uri Guterman, Head<br />
of Product & Marketing for Hanwha<br />
Techwin Europe and Alessia Saggese,<br />
Ph.D., Co-Owner at A.I Tech and<br />
Assistant Professor at the University of<br />
Salerno, provide an overview of Deep<br />
Learning and how the two companies<br />
are working together to introduce<br />
solutions which will add to the value of<br />
video surveillance systems by offering<br />
real-life practical benefits.<br />
Progress in the development of artificial<br />
intelligence and computer vision has been<br />
advancing at such a dramatic rate, that doyens<br />
of the technologies, such as computer scientist<br />
Yann LeCun, have been known to jokingly refer<br />
to work done on the subjects before 2012, as<br />
‘prehistoric’. In terms of object recognition, the<br />
algorithms available at that time were only 75%<br />
accurate. Nowadays, thanks to a deep learning<br />
based approach, we can expect accuracy to be<br />
much higher. In fact, the advances made in the<br />
last 12 months means, we are close to being in<br />
a position to seriously consider incorporating<br />
the technologies into the majority of video<br />
surveillance systems.<br />
It would be wrong to look at Deep Learning as<br />
some kind of advanced video analytics software<br />
platform, as it represents a paradigm shift within<br />
the security sector as to how incidents can be<br />
detected and responded to.<br />
What is Deep Learning?<br />
Unlike most forms of video analytics, the Deep<br />
Learning application developer does not have<br />
to write complicated algorithms for recognising<br />
objects. Instead, a Deep Learning solution has the<br />
ability to ‘learn from examples’. During an initial<br />
training phase, the application is supplied with<br />
large amounts of data representing correctly solved<br />
examples of the challenge at hand, e.g. classifying a<br />
person by age or gender.<br />
A deep network analyses the relationship between<br />
inputted data and the expected output, such as<br />
the gender of a person, and learns how to solve the<br />
problem by analogies. As an example, being able to<br />
correctly establish the gender of a person requires<br />
an AI expert to design, train and validate a deep<br />
network which during the training stage, uses a<br />
database of millions of suitably selected faces, each<br />
of which is tagged with its known true gender. After<br />
several days of learning, the neural network is ready<br />
to be put to work and is likely to have an accuracy of<br />
approximately 98%, which is about the same as the<br />
ability of human beings to do the same thing.<br />
The Challenge<br />
Deep Learning needs the expertise of machine<br />
learning experts together with massive computing<br />
resources, as the Application needs to be able to<br />
cope with ‘in the wild conditions’, such as changing<br />
lighting conditions, shadows, the position of a<br />
face, etc. As a result, anything other than the most<br />
basic of Deep Learning solutions, will need to be<br />
run on servers which have adequate amounts of<br />
computing power and memory. For Deep Learning<br />
to be a practical addition to the majority of video<br />
surveillance systems, it is generally accepted that it<br />
will require an optimised software architecture so<br />
that it is possible for it to be run at the edge. By this<br />
we mean onboard cameras, in the same way Apps<br />
are run on smartphones and tablets.<br />
The Hanwha Techwin Partnership<br />
Reducing the processing requirements of Deep<br />
Learning so that it can be operated at the edge<br />
is no mean feat, which is why Hanwha Techwin<br />
is championing the concept of manufacturers of<br />
video surveillance solutions working closely with<br />
experts in this specialised field, in order to have<br />
access to the latest innovations and research.<br />
For Hanwha Techwin, this means working in<br />
partnership with A.I. Tech - a spinoff of the<br />
Computer Engineering Department – DIEM of<br />
the University of Salerno (UNISA), which has<br />
a dedicated ‘Intelligent Machines for Video<br />
Recognition’ Lab research group. A.I. Tech’s CEO,<br />
Mario Vento, is listed as one of the top ranked<br />
Italian scientists in engineering and is also among<br />
the most cited authors in Italy in the field of<br />
Computer Vision and Artificial Intelligence.<br />
A.I. Cameras<br />
Hanwha Tecwhin is also working on introducing new<br />
Wisenet cameras during the latter part of 2019 which<br />
will incorporate a computer vision chipset allowing<br />
Deep Learning applications to be run onboard the<br />
cameras. These new 4K and 5MP cameras, which<br />
will be additions to our existing Wisenet P premium<br />
camera series, will initially offer more accurate forms<br />
of existing types of video analytics. However, they<br />
will also provide a platform for our technology<br />
partners to use our APIs to introduce ground<br />
breaking Deep Learning applications that integrate<br />
seamlessly with the new cameras.<br />
Do you have some questions about Deep Learning? Email Uri Guterman at u.guterman@hanwha.com<br />
or Alessia Saggese, Ph.D. at saggese@aitech.vision
BULLETIN<br />
Bulletin<br />
Benchmark looks at news and product<br />
launches of interest to those involved in the<br />
design and implementation of smart solutions<br />
Vaion System<br />
Vaion has launched an end-to-end video<br />
solution which features embedded AI<br />
technology to deliver benefits including<br />
smart analytics and enhanced intelligent<br />
search functionality. Vaion's product line<br />
includes cameras, a software-based VMS<br />
and dedicated server hardware.<br />
The devices incorporate embedded video<br />
and audio analytics powered by machine<br />
learning algorithms, along with intuitive<br />
interfaces to simplify operational and<br />
installation processes. The system detect<br />
threats at an early stage to enable timely<br />
and effective responses.<br />
The Vaion product portfolio includes<br />
cameras ( Vaion v cam) with integrated<br />
directional audio analytics, a VMS ( Vaion<br />
vcore) with embedded video analytics,<br />
security appliances ( Vaion v server) and a<br />
hybrid cloud service ( Vaion v cloud).<br />
The system creates instant alerts about<br />
exceptions, and can track people and<br />
objects throughout the site. Analytics are<br />
performed in real-time from all cameras<br />
(including third-party models) at the VMS.<br />
The hybrid cloud approach enables<br />
remote configuration and access, simplified<br />
firmware and software upgrades, and<br />
license pooling.<br />
Paxton10 roadshows<br />
Paxton is to host a series of interactive<br />
roadshows during September and October<br />
2019 to preview the release of Paxton10,<br />
its next generation access control and<br />
video management solution. Attendees will<br />
get a first look at the single platform<br />
solution, which utilises advanced<br />
technology to deliver powerful features in<br />
a simple to use and install system.<br />
Paxton Chief Executive Adam Stroud<br />
stated, ‘We’re really excited to meet our<br />
installers in person to showcase the<br />
Paxton10 system. Access control and video<br />
make up the vast majority of the electronic<br />
security market. The two work best when<br />
combined into a single platform, but most<br />
systems don’t get integrated due to<br />
associated complexity. The time for<br />
Paxton10 is here.’<br />
The nine events will take place at high<br />
prestige venues across the UK.<br />
Attendees will be among the first to see<br />
Paxton10 in action and get hands-on<br />
experience.<br />
TDSi acquired<br />
TDSi has announced it has agreed to be<br />
acquired by Vitaprotech Group, a European<br />
leader in access control and security systems<br />
for critical sites. This acquisition continues<br />
Vitaprotech’s growth strategy, which has<br />
included several acquisitions in the market<br />
over the last two years.<br />
The acquisition aligns with Vitaprotech<br />
Group's and TDSi’s growth strategy to<br />
develop export sales of security solutions. It<br />
will enable Vitaprotech to expand its portfolio,<br />
strengthening the Group's export presence<br />
and to access international distribution<br />
networks in the security sector.<br />
Pelco acquired<br />
Transom Capital Group, a private equity<br />
firm, has announced it has acquired Pelco<br />
from Schneider Electric.<br />
Russ Roenick, Managing Partner at<br />
Transom, stated, ‘The journey toward<br />
creating the next great breakthroughs in<br />
video security begins today through our<br />
investment in Pelco. We have conviction<br />
that the work done over the past several<br />
years to transform the company into a<br />
digitally-savvy security leader with<br />
innovative hardware, software, and service<br />
solutions is nearly complete.’<br />
26
BULLETIN<br />
Hanwha announces<br />
Cortech integration<br />
Wisenet NVRs have been successfully<br />
integrated with Cortech Developments’<br />
Datalog MV. Datalog MV provides local and<br />
remote site monitoring and control of<br />
building, fire, security and energy systems,<br />
and enhances the ability of operators to<br />
manage surveillance systems as part of an<br />
integrated security solution.<br />
Integration with the NVRs means operators<br />
can view live or recorded images on the<br />
Datalog graphical user interface.<br />
When an alarm occurs, images from<br />
Wisenet cameras are automatically displayed,<br />
allowing operators to verify events. Live<br />
images can also be triggered by any number<br />
of user defined events.<br />
ProxyClick achieves<br />
Lenel accreditation<br />
ProxyClick has announced it has received<br />
LenelS2 factory certification and joined<br />
the Open Access Alliance Program<br />
(OAAP). ProxyClick’s secure visitor<br />
management system interfaces with the<br />
OnGuard access control system and helps<br />
companies better regulate visitor access<br />
into and around their buildings.<br />
The integration alleviates<br />
administrative strains for companies<br />
performing manual tasks across<br />
platforms, and also increases the<br />
accuracy in reporting user data. Card<br />
holder management can be streamlined<br />
with specified access-level lifecycles<br />
based around meeting times, for flexible<br />
user provisioning.<br />
Controlsoft integrates<br />
with Aperio<br />
Controlsoft has integrated its Identity Access<br />
platform with the Aperio wireless locking<br />
technology. By upgrading its Identity Access<br />
platform, integrators can add mechanical<br />
doors to existing access control systems.<br />
Aperio requires minimal additional hardware<br />
to upgrade systems to include wireless access<br />
control.<br />
A communications hub provides wireless<br />
connection with up to eight doors, and<br />
delivers a 25 metre transmission range.<br />
Suitable for interior doors, the hub is practical<br />
for hallways with a number of adjacent<br />
corridors.<br />
Johnson Controls<br />
PowerSeries Pro<br />
Johnson Controls has launched the EN Grade<br />
3 compliant PowerSeries Pro intrusion alarm<br />
system for commercial properties of any size.<br />
The PowerSeries Pro completes the<br />
manufacturer’s intrusion product portfolio.<br />
Key features include a high-current<br />
capability, making it suited for large-scale<br />
buildings where high numbers of contacts and<br />
sensors need to be installed.<br />
All the communication, whether internal<br />
between the system components or external<br />
with the monitoring centre, is claimed to be<br />
cybersecure, meeting the highest standards<br />
with AES-128 bit encryption.<br />
The hybrid system can include a<br />
combination of hardwired and wireless<br />
detectors and sensors to provides a Grade 2<br />
system which uses PowerG technology,<br />
enabling multi-channel frequency hopping<br />
with two-way wireless communication.<br />
Traka Body Worn<br />
Camera Lockers<br />
Traka’s body worn camera lockers have<br />
been developed to meet the growing<br />
demand for such devices. With a duty of<br />
care for remote and lone workers, along<br />
with regulation in some sectors, body worn<br />
cameras are becoming common devices<br />
which must been managed effectively.<br />
Enhanced device management results in<br />
a need for fewer cameras needed. The<br />
automated system negates the need for a<br />
dedicated staff member to manually issue<br />
and return devices. Controlled access to the<br />
cameras offer protection and ensures they<br />
are only issued to authorised personnel.<br />
RFID tagging allows each asset to be<br />
individually tagged, enabling the user to<br />
know the status of cameras.<br />
27
BULLETIN<br />
VIVOTEK 360 Degree IVA Cameras<br />
VIVOTEK has introduced<br />
two new H.265 deep<br />
learning-enabled fisheye<br />
cameras, the FE9191 and<br />
FE9391-EV. The two<br />
day/night 12 megapixel<br />
fisheye cameras provide<br />
360 degree views and<br />
include deep learning<br />
technology and smart video<br />
content analysis.<br />
The IVA options include<br />
intrusion detection, crowd detection and loitering detection. These<br />
capabilities transform the cameras from image capture devices to advanced<br />
notification solutions.<br />
Intrusion detection protects any specific area against unauthorised entry.<br />
Crowd detection can calculate how many persons occupy a given space,<br />
triggering an alarm when a defined capacity is reached. Finally, loitering<br />
detection identifies people remaining in a selected area beyond a preset period.<br />
Both cameras are embedded with Trend Micro’s anti-intrusion software to<br />
provide higher levels of network protection.<br />
NorParc<br />
Nortech<br />
NorParc is a Windows-based<br />
counting and parking guidance<br />
system from Nortech, which<br />
provides centralised count<br />
management, monitoring and<br />
guidance control for parking<br />
facilities which) have multiple<br />
entry and exit points.<br />
Nortech’s counting solution<br />
includes a comprehensive range<br />
of high-intensity RGB variable<br />
message signs that use low<br />
profile LED matrices offering<br />
bright, clear messages indicating<br />
available spaces and status<br />
messages.<br />
Each panel can display count<br />
values of up to 5 digits and,<br />
depending upon the sign variant,<br />
there are options to display FULL, OPEN or<br />
SPACE and direction arrows.<br />
The range includes single level internal and<br />
external signs plus self-contained multilevel<br />
information signs.<br />
External signs meet the EN 12966 standard<br />
for visual, physical and durability, and provide<br />
high optical performance. External models are<br />
housed in robust weatherproof aluminium<br />
housing (IP65). Signs are available as single<br />
count displays or multilevel displays with<br />
additional information such as headings,<br />
logos, symbols and individual titles.<br />
Videx GSMPRO<br />
Videx has added new functionality to its<br />
GSMPRO intercom system. GSMPRO is now<br />
expandable to an eight-door access control<br />
system, and enables users to answer calls<br />
from their mobile phone or landline.<br />
GSMPRO is now available with an<br />
integrated backlit coded keypad, supporting<br />
up to 400 access codes and 32 temporary<br />
codes, which can be programmed to expire<br />
after a number of hours. Codes can also be<br />
programmed via a PC or SMS. A new app is<br />
also available for both Android and iOS<br />
devices which simplifies the process of<br />
sending SMS messages.<br />
Vanderbilt Web-shop<br />
Vanderbilt has launched its new webshop,<br />
shop.vanderbiltindustries.com, which<br />
offers thousands of products and is a<br />
practical solution to enable existing<br />
customers to browse and purchase<br />
content. Mobile responsive and<br />
integrated with the company’s main<br />
website, users can view all of Vanderbilt’s<br />
products, news, and resources.<br />
The new webshop includes additional<br />
resources like manuals, software<br />
downloads and technical descriptions.<br />
Morphean offers ACaaS<br />
SimonsVoss Technologies has entered a<br />
technology partnership in Europe with<br />
Morphean. The partnership will utilise<br />
SimonsVoss’ access control system<br />
SmartIntego to extend Morphean’s cloudbased<br />
capabilities beyond video surveillance.<br />
The Morphean platform drives efficiencies<br />
by generating actionable insights from a<br />
multitude of data sources.<br />
The combination of an integrated security<br />
system hosted in the cloud promises greater<br />
security with two factor authentication, along<br />
with a wealth of rich data to help businesses<br />
optimise operations and processes and<br />
realise additional benefits.<br />
28
TECHNOLOGY<br />
Enhanced Protection with Time-of-Flight<br />
One of the most reliable, effective and costefficient<br />
external detection options is the<br />
photoelectric beam. The technology is<br />
well proven and has an impressive track record.<br />
Manufacturers have developed a number of<br />
innovative technologies which enhance catch<br />
performance, reduce nuisance activations and<br />
make life simpler for integrators and installers.<br />
As user demand for the earliest possible<br />
warning of intrusions grows, the role of<br />
photoelectric beams has become more<br />
prominent. While the professional products<br />
available deliver solutions for every type of<br />
application, there are circumstances where<br />
photoelectric beams are found wanting.<br />
Photoelectric beam sensors typically include a<br />
transmitter and receiver. As a result, both<br />
elements must be powered. In many<br />
applications this isn’t an issue, but in some the<br />
receiver might be in a remote location, away<br />
from easy access to power. Whilst there are<br />
some very good battery-powered beam sensors,<br />
at times limited budgets may force integrators<br />
and installers to seek other less costly options.<br />
Reflector-based beams have been around for<br />
some time, but are not used as often as<br />
transmitter/receiver pairs. There is a slight issue<br />
with these sensors, in that if the beam is broken<br />
by an object with a highly reflective surface,<br />
there is a chance the unit will receive the<br />
reflected infrared light and assume the beam<br />
has not been broken.<br />
Reflector-based devices do have positives:<br />
they are quick to install, cost-effective and can<br />
eliminate the need for civil works. However, the<br />
risk of missed activations is too problematic for<br />
many applications. The launch of the PR-30BE<br />
from TAKEX changes things, in that it is a<br />
reflector-based photoelectric beam which uses<br />
Time-of-Flight technology.<br />
Enhanced performance<br />
Time-of-Flight technology accurately measures<br />
the time it takes for a signal (in this case an<br />
infrared beam) to return to the unit once it has<br />
been transmitted. The device ‘learns’ the time<br />
taken for the beam to be reflected and returned<br />
to the receiving element of the detector under<br />
normal conditions. If the signal is not returned,<br />
or if it is returned in a different timescale, then<br />
an alarm is generated.<br />
Time-of-Flight technology is already used in<br />
the sensing sector, usually with laser-based<br />
devices. These typically cost a significant<br />
amount more than photoelectric beams, but the<br />
fact the sensing technology is used for high risk<br />
applications proves its<br />
suitability for security<br />
applications. With typical<br />
reflector-based sensing, a<br />
white van (for example)<br />
passing through a beam<br />
might reflect enough light<br />
back for the sensor to not<br />
detect a beam break.<br />
However, with Time-of-Flight<br />
technology, the shortened<br />
time window in which the<br />
light is reflected will indicate<br />
an alarm condition has<br />
occurred.<br />
The PR-30BE has a 30<br />
metre range. It determines<br />
the distance of any beam<br />
break with a high degree of<br />
accuracy as it measures the<br />
light reception level and<br />
timing, ensuring that<br />
genuine alarms are not<br />
missed. This eliminates problems with<br />
unintended reflections caused by gloss or white<br />
surfaces, while ensuring integrators and<br />
installers still enjoy the benefits of a reflectorbased<br />
sensor.<br />
Because the sensor does not require power at<br />
both ends of the link, installation costs are kept<br />
low. If links need to cross waterways, roads or<br />
runways, this can be achieved with greater costefficiency.<br />
The sensor retains the look and size<br />
of a typical twin beam device, and incorporates a<br />
number of the innovative features from the PB-<br />
IN and PXB flagship quad series.<br />
Environmental monitoring dynamically<br />
optimises performance to match changing<br />
conditions, with a dedicated output enabling a<br />
pre-alarm warning if required. Other features<br />
include response time adjustment, horizontal<br />
and vertical adjustment, and a redesigned<br />
reflector assembly allowing a minimum<br />
operational distance of 0.5 metres.<br />
For simplicity of installation, the PR-30BE<br />
makes use of an audible alignment tone function<br />
together with a dual-ring viewfinder and monitor<br />
output voltage options.<br />
In summary<br />
Reflector-based photoelectric sensors offer a<br />
number of benefits to integrators and installers.<br />
With the use of Time-of-Flight technology, the<br />
PR-30BE from TAKEX also delivers increased<br />
levels of security to ensure there is no<br />
compromise in terms of catch performance.<br />
For more information,<br />
contact TAKEX<br />
www.takex.com<br />
E: sales@takex.com<br />
Tel: 01256 475555<br />
29
Register for regular<br />
updates, free-of-charge!<br />
Benchmark E-News<br />
Benchmark is the security<br />
industry’s only magazine<br />
that targets security<br />
installers and system<br />
integrators who are<br />
delivering bespoke and<br />
innovative solutions.<br />
Written to help those who<br />
are designing, specifying<br />
and installing best-ofbreed<br />
systems,<br />
Benchmark helps its<br />
engineer-based<br />
readership by seeking out<br />
the most flexible and<br />
effective smart solutions.<br />
Every week Benchmark sends<br />
registered readers e-mail-based<br />
content including new<br />
independent tests and technology<br />
assessments, informative articles,<br />
news and technical bulletins to<br />
ensure you are kept up to date.<br />
Registration to receive<br />
Benchmark’s E-News service is<br />
free-of-charge and ensures you<br />
stay ahead of the crowd by having<br />
access to the latest industry<br />
information. Because the<br />
dedicated Benchmark team<br />
generate all of the editorial<br />
content, you can read tests and<br />
assessments that simply are not<br />
available elsewhere.<br />
Visit www.benchmarkmagazine.com<br />
today and sign up<br />
30
ADVERTISEMENT FEATURE<br />
How Ajax Systems develops the<br />
market of wireless security systems<br />
With its radically simplified installation<br />
process and a user-friendly interface, the<br />
Ajax security system stands out on a<br />
market of intricate professional security<br />
equipment. On the one hand, the Ajax products<br />
are easy to maintain over the air and<br />
straightforward to sell together with the security<br />
subscription services. On the other hand, endusers<br />
love Ajax for its clean design, use-case<br />
versatility, and powerful management apps. 67%<br />
of Ajax users purchase additional security devices<br />
within the first six months.<br />
The results are remarkable: over 200,000 clients<br />
in more than 80 countries around the world protect<br />
their houses, apartments, and offices with the Ajax<br />
equipment. And more than 700 response<br />
companies connect Ajax systems to their Central<br />
Monitoring Stations (CMS).<br />
Control center<br />
Hub is the main control panel of the Ajax security<br />
system. It coordinates all of the connected<br />
devices and processes commands. OS Malevich is<br />
the hub’s real-time operating system. It is<br />
protected from any viruses and cyber attacks. It<br />
updates regularly over the air to expand the<br />
functionality.<br />
The control panel communicates with the<br />
detectors on a distance of up to 2000 m using<br />
Jeweller radio protocol. The coverage area can be<br />
expanded with the ReX signal extender to up to<br />
16 km² for protecting large sites. Jeweller is a<br />
proprietary technology featuring radio hopping<br />
and AES encryption. It is resistant to jamming<br />
and code grabbing.<br />
The hub can be controlled on any distance<br />
from the secured object using the Ajax apps:<br />
Ajax Security System, Ajax PRO: Tool for<br />
Engineers, and Ajax PRO Desktop. The Ajax Cloud<br />
service transmits the commands to the system. It<br />
keeps track of the state of all of the devices in<br />
the system by continually pinging the hub. Ajax<br />
Cloud servers are located in three different AWS<br />
data centers and are GDPR compliant.<br />
In cases of emergency, the system transmits<br />
alarm signals using push-notifications (via Ajax<br />
Cloud service), SMS, and calls. Alternatively, you<br />
can manage the hub with the SpaceControl key<br />
fob or the KeyPad keyboard when it is nearby.<br />
Wireless detectors<br />
Extensive range of Ajax wireless devices allows<br />
us to build indoor and outdoor security systems<br />
that react to a variety of triggers: door and<br />
window openings, glass breaking, motion on site,<br />
smoke, temperature, and water leaks. Ajax<br />
detectors ignore pets, they self-diagnose and<br />
operate up to 7 years on the pre-installed<br />
batteries.<br />
The most reliable grade a<br />
wireless security system can get<br />
After testing in five<br />
accredited<br />
laboratories, Ajax<br />
devices<br />
successfully earned<br />
Grade 2<br />
certification for<br />
compliance with<br />
the requirements of<br />
the international<br />
standard EN 50131-<br />
1:2006. Today Ajax<br />
is the most<br />
awarded wireless<br />
security system in<br />
Europe holding the<br />
major awards from the professional conferences:<br />
IFSEC, MIPS Securika, Intersec.<br />
Advantages of Ajax versatility<br />
Ajax security systems cover a large spectrum of<br />
commercial and residential cases worldwide. To<br />
illustrate:<br />
In the Kingdom of Saudi Arabia<br />
The owners of a large franchise of pharmacy stores<br />
needed to protect 70 locations across the country<br />
at once. Each system installation had to be clean.<br />
The devices had to fit the interior seamlessly. The<br />
company’s security department reached out to Ajax<br />
Systems for a solution. As a result, each store was<br />
equipped with a hub, a KeyPad, two MotionProtect<br />
Plus motion detectors, DoorProtect Plus opening<br />
detectors, and two third-party security cameras.<br />
In Ukraine<br />
A prime developer has integrated Ajax security<br />
system into a new residential high-rise. Each<br />
apartment features the Ajax StarterKit connected<br />
to the central monitoring station of an internal<br />
security service. They use Ajax PRO Desktop<br />
application to monitor the premises. So in cases of<br />
emergency, the response is prompt. The building<br />
features several levels of physical security and the<br />
biometric authentication check-points. The<br />
intruders have a hard time breaking in and no<br />
chance to escape.<br />
In Russia<br />
An online retailer used Ajax to build a centralized<br />
security system to control over 400 distribution<br />
centers. Each location features a hub, a<br />
CombiProtect motion detector, a door opening<br />
detector DoorProtect, and a KeyPad keyboard.<br />
Additionally, the internal security department has<br />
installed Hikvision cameras at each spot to<br />
integrate their video streams into the Ajax apps.<br />
For more information please<br />
contact Ajax Systems:<br />
Dominic Watson-Hayes<br />
07954 210645 (North)<br />
Sam Griffiths<br />
07547 520198 (South)<br />
www.ajax.systems<br />
31
SMART TECHNOLOGY<br />
TECHNOLOGY TRENDS:<br />
A Smarter Future<br />
Visit a security event or look through the product<br />
offerings across the industry and you’ll spot a trend:<br />
everyone is talking about AI and deep learning.<br />
Whilst it’s true AI, machine and deep learning offer<br />
a significant number of benefits when creating<br />
bespoke smart solutions, the suitability of those<br />
solutions is dependent upon how the technology is<br />
implemented. Benchmark considers how the<br />
emerging technologies can add real value.<br />
It is not unusual when emerging<br />
technologies surface for manufacturers and<br />
developers to do things for no other reason<br />
than that they can be done. While many of the<br />
resulting systems are clever, they’re not<br />
always practical or even useful. Technologists<br />
love to play, and while we can be impressed<br />
by their creativity, we’re unlikely to spend<br />
money on something that doesn’t in some<br />
way enhance or improve some element of our<br />
lives. This thinking is not only true of<br />
individuals: businesses and organisations<br />
think the same way too.<br />
It’s interesting that when a new technology<br />
comes to prominence, the early stages of<br />
development are often based upon some<br />
vision of the future. Take AI as an example. AI,<br />
and the closely associated technique of deep<br />
learning, aren’t new. However, advances in<br />
processing have made them realistically<br />
affordable, and as a result the technologies<br />
are appearing in mainstream systems.<br />
The future vision for AI development<br />
remains in the robotic realm, and as a result<br />
many of the early commercial projects using<br />
the technology are aimed at that sector: selfdriving<br />
vehicles, robot workers, automaton<br />
processing plants, etc.. However, the<br />
development of any technology accelerates<br />
when a solid business case is made for its<br />
use. Once business and organisations see a<br />
way to harness real-world efficiencies,<br />
demand grows and actual products of value<br />
are created.<br />
In the security sector, the use of AI sparked<br />
a number of ‘projects’, many of which were<br />
clever, but few of these had a realistic chance<br />
of commercial success. In other words, there<br />
was no solid business case.<br />
As an example, at one of the US exhibitions<br />
last year, a well known manufacturer showed<br />
its ‘AI engine’. Using basic object recognition,<br />
it placed a bounding box on moving objects<br />
and gave them a classification: text reading<br />
Person or Vehicle appeared next to the box.<br />
When asked what the technology did once the<br />
object was identified, the answer was they<br />
didn’t know. Such was the race to<br />
demonstrate they had an AI solution, it wasn’t<br />
important it didn’t actually do anything of<br />
value.<br />
AI and security<br />
In the past few years, security manufacturers<br />
started to talk about AI and deep learning. It<br />
was hailed at the core technology for future<br />
developments, with many developers<br />
focussing on how systems would become<br />
autonomous with regard to decision making<br />
and implementing actions.<br />
While much of what was being discussed<br />
certainly fell under the classification of<br />
‘intelligent’, a solid business use case could<br />
not be made for it in today’s market. Many of<br />
the proposals relied on advances in other<br />
32
SMART TECHNOLOGY<br />
sectors which had yet to happen. As a<br />
statement of intent, the ideas made for good<br />
reading, but the use case was lacking.<br />
One area where deep learning could be<br />
applied was for facial recognition. The<br />
analytics involved need to recognise a face<br />
from other objects in a scene (something IVA<br />
can already do quite well, with minimal need<br />
for advanced processing), before comparing<br />
the captured face to large databases of facial<br />
images to identify persons on a whitelist or<br />
blacklist. This latter part of the analytics rule<br />
needs to be completed very quickly to allow<br />
action to be taken. There’s no benefit in<br />
finding out a few minutes after a person has<br />
left that an alarm should have been created.<br />
Because of restrictions in processing<br />
capacity and search technologies, facial<br />
recognition gained a reputation for being<br />
inaccurate. The technology was<br />
underpowered, and as such checks weren’t as<br />
thorough because of time limits. With the<br />
introduction of AI and deep learning, powered<br />
by GPUs, many of these issues have been<br />
resolved.<br />
GPUs maybe more limited than CPUs in<br />
terms of the tasks they can perform, but their<br />
huge amount of cores are ideal for repetitive<br />
tasks, such as matching facial templates.<br />
Deep learning also allows the systems to<br />
learn more about facial features, eliminating<br />
issues when the angle of capture might be<br />
different to a template.<br />
While it is true that AI and deep learning<br />
can significantly improve the performance of<br />
facial recognition, the problem remains that<br />
the bad reputation gained by the technology<br />
is still holding back adoption. This is added to<br />
by pressure from privacy groups who use the<br />
performance of older systems as a reason to<br />
oppose the technology. AI will improve facial<br />
recognition, and increased accuracy will<br />
eventually drive many to reconsider the<br />
technology, but right now the business use<br />
case isn’t strong enough.<br />
Moving forwards<br />
Interestingly, since the start of 2019, many<br />
providers of AI- and deep learning-based<br />
systems have switched their focus to using<br />
the technology to solve genuine problems,<br />
and as a result interest from end users has<br />
spiked. While some of the applications might<br />
not be as ‘intelligent’ as the headlinegrabbing<br />
robotics, the business case is<br />
certainly a lot stronger, and as a result the<br />
proposition is gaining traction.<br />
One area in which deep learning is solving a<br />
genuine problem is with regard to complex<br />
searching. Applications with multiple cameras<br />
can present a challenge when an operator<br />
tries to create an evidence trail after an event.<br />
Searching across multiple camera over a<br />
period of many hours or even many days is<br />
labour-intensive. Often the task is either<br />
abandoned or not done thoroughly because<br />
resources don’t allow it. AI- and deep<br />
learning-enabled systems can quickly and<br />
easily find numerous associated incidents,<br />
ensuring user can realise all the potential<br />
from their surveillance investments.<br />
Another area where deep learning excels is<br />
in identifying unknown exceptions. With IVA,<br />
the algorithms need to know the type of<br />
exception they are looking for, but with AI the<br />
system can ‘learn’ typical behaviours and flag<br />
exceptions to an operator. These can either be<br />
dismissed or highlighted as alerts, teaching<br />
the system which events are critical. The main<br />
benefit here is a reduction in configuration<br />
time for IVA deployments.<br />
Even simple tasks such as identification<br />
redaction for GDPR purposes can easily be<br />
handled by AI and deep learning, saving man<br />
hours while also delivering compliance with<br />
the regulations.<br />
These three examples might not be the<br />
smartest, but they each have a strong<br />
business use case, making them viable.<br />
In summary<br />
AI, machine learning and deep learning all<br />
offer significant benefits to the security<br />
sector, and well considered implementations<br />
will elevate what’s on offer to become true<br />
smart solutions. The only proviso is ensuring<br />
a credible business use case exists.<br />
End users won’t buy solutions because<br />
they’re AI-enabled. They’ll buy solutions<br />
which solve real problems which their<br />
businesses face every day. As such, the<br />
renewed focus in the industry has to be seen<br />
as a positive.<br />
33
ADVERTISEMENT FEATURE<br />
The Frontline of Security:<br />
Protecting Your Perimeter<br />
www.avigilon.com<br />
The perimeter of a site is<br />
often the first line of security - making<br />
the effectiveness of the solutions<br />
deployed at its edge crucial to its overall<br />
protection. To help protect your perimeter,<br />
Avigilon offers high resolution video security<br />
cameras and access control solutions, which<br />
enable you to accurately detect people and<br />
vehicles coming and going from your site<br />
while helping to restrict access to only<br />
authorised individuals.<br />
Seeing Is Securing<br />
Avigilon offers a full range of video security<br />
cameras that allow you to choose the<br />
resolution you need for clear viewing around<br />
your perimeter. The Avigilon H4Pro camera<br />
line starts at 4K (8MP) and goes up to the<br />
industry’s first single-sensor 7K (30MP)<br />
camera, which can capture high-detailed<br />
images across expansive distances while<br />
providing wide area coverage options, helping<br />
you cover more area with fewer cameras.<br />
For sites that struggle with visibility,<br />
Avigilon Thermal cameras can help you see<br />
beyond the visible spectrum. The H4 Thermal<br />
camera line is designed to detect the<br />
movement of people and vehicles even in<br />
areas with poor visibility, challenging lighting<br />
conditions, absolute darkness and partly<br />
camouflaged scenes - without the need for<br />
additional light sources. With patented<br />
Avigilon self-learning video analytics on<br />
board, H4 Thermal cameras are designed to<br />
help operators detect, verify and act on events<br />
in challenging environmental conditions.<br />
‘Clear video surveillance that can withstand<br />
challenging conditions is critical to our ability<br />
to protect the port from theft and other security<br />
threats,’ said Axel Humberto Perez Flores, Head<br />
of Information Technology for the Port of<br />
Guaymas. ‘With Avigilon HD cameras and ACC<br />
software, our operators can centrally monitor<br />
and verify port activities, helping to ensure we<br />
continue to provide secure transportation and<br />
storage services to our clients.’<br />
Control Traffic to and<br />
from Your Site<br />
Secure access is another crucial<br />
component of ensuring security at<br />
your perimeter. Restricting access<br />
to your site can have a significant<br />
impact on its safety, as well as your risk<br />
mitigation and loss prevention efforts. The<br />
Avigilon Access Control Manager system works<br />
together with Avigilon Control Center (ACC)<br />
video management software to produce<br />
action-based alarms and notifications when<br />
potential breaches occur, helping to ensure<br />
that only authorised individuals gain entry<br />
while also enabling expedited event<br />
correlation during investigations.<br />
The Avigilon H4 Video Intercom is another<br />
tool to verify visitor identity and authorise<br />
access at points of entry. The H4 Video<br />
Intercom integrates a 3MP camera with a highperformance<br />
intercom and features<br />
exceptional wide dynamic range, low-light,<br />
noise reduction and echo-cancelling<br />
technologies for clear viewing and two-way<br />
communication with visitors. Combined with<br />
ACC software, this secured entry system<br />
enables operators to quickly and easily<br />
identify and communicate with a visitor before<br />
remotely granting access.<br />
Perimeter Protection That<br />
Makes A Difference<br />
Securing your perimeter can be critical to the<br />
protection of your site. By deploying video<br />
security cameras that allow you to clearly see<br />
people and events at the edge of your site, as<br />
well as an access control system to limit entry<br />
to authorised individuals, you’ll gain greater<br />
situational awareness while mitigating the risk<br />
of intrusion.<br />
34
SMART TECHNOLOGY<br />
INTRUDER DETECTION: Delivering<br />
Smarter Systems<br />
Many people talk about disruptive<br />
technologies and their emergence in<br />
today’s technological world. Certainly<br />
the speed of change in current development<br />
has seen a significant number of disruptive<br />
technologies emerging simultaneously,<br />
predominantly as a result of enhanced<br />
capabilities being made available by modern<br />
processing options.<br />
The security sector, and specifically the<br />
intruder alarm sector, now faces a disruptive<br />
technology in the form of smart building<br />
systems which promise to provide security<br />
along with a host of management options.<br />
Adoption figures show that some end users<br />
are moving to these smart systems. The new<br />
adopters of these technologies include<br />
existing security system owners.<br />
A need for integration?<br />
For many years, the intruder alarm was, by<br />
design, kept separate from other systems in a<br />
building, regardless of the type of premises<br />
being protected. Standards were drafted<br />
which enforced that isolation and adherence<br />
to the standards was pushed partly by<br />
insurance industry requirements and partly by<br />
police first response restrictions.<br />
Just as much of the technology used in the<br />
security industry has changed in the past 25<br />
years, so have practices in the insurance and<br />
law enforcement worlds. While some end<br />
users still require graded alarm systems which<br />
are compliant with standards, many are<br />
looking at alternative solutions. They want to<br />
specify levels of protection based upon their<br />
own risk assessments.<br />
This isn’t bad news for the graded alarm<br />
market; many end users still consider<br />
professional systems, but importantly they<br />
want smarter systems which integrate with<br />
other devices and deliver specific business<br />
benefits.<br />
The big issue is when a user is seeking a<br />
smart security system with added benefits,<br />
they have plenty of choice. The arguments<br />
that traditional alarm systems meet standards<br />
and is installed an approved company doesn’t<br />
always sway the purchasing decision. This is<br />
not because standards and inspectorate<br />
Demand for smart systems is evident across a wide<br />
range of markets, and research underlines this isn’t<br />
going to slow down in the immediate future. When<br />
considering commercial or industrial applications,<br />
end users are ready and willing to invest in smarter<br />
technologies. Businesses and organisations have a<br />
hunger for flexible systems which offer integration<br />
and connectivity; all benefits available from the<br />
leading smart intruder detection systems.<br />
recognition have no value, but because the<br />
system on offer doesn’t meet their<br />
expectations!<br />
In a world where the IT and IoT giants are<br />
setting the technological agenda, going<br />
against what they are preaching will always be<br />
a difficult ask for a security company. This<br />
isn’t helped by the fact that as well as facing<br />
competition from other installers and<br />
integrators, there are also a whole host of<br />
other brand-name technology players that all<br />
claim to deliver security alongside other<br />
benefits for the user.<br />
35
SMART TECHNOLOGY<br />
On top of this, many utilities providers and<br />
cloud service companies have identified<br />
security is always on the wish-list of those<br />
seeking smart solutions and are subsequently<br />
bundling some level of protection in with their<br />
products. Users are attracted by the added<br />
value on offer from these systems, and if<br />
security is mentioned it’s another box ticked.<br />
Meeting demands<br />
Ignoring customer demands is often a trait<br />
that disrupted industries suffer from.<br />
Installers and integrators of intruder-based<br />
security systems must accept a growing<br />
number of customers aren’t making decisions<br />
based only on security; they’re making buying<br />
decisions based upon a recognition of smart<br />
system benefits. Security is one of those<br />
benefits, and at times it won’t be the one that<br />
really swings the buying decision. Businesses<br />
want to automate workplace devices and<br />
appliances, and they’d prefer a system that<br />
did that as well as protecting their property.<br />
It must be accepted hat many businesses<br />
don’t want to pay for security, because in<br />
effect they’re buying a system to stop them<br />
becoming a victim of crime. However, if the<br />
system also delivers business efficiencies, the<br />
idea of the system being a ‘grudge purchase’<br />
goes away.<br />
This might sound like bad news for the<br />
intruder alarm sector, but it’s not. It’s actually<br />
good news if installers and integrators<br />
present their product options in a way that<br />
appeals to the user.<br />
The critical difference<br />
There is a difference between a smart building<br />
system that includes security and a security<br />
system that includes smart functionality. This<br />
is very much down to the platforms upon<br />
which the systems are based.<br />
It is important to realise that despite the<br />
growing popularity and demand for smart<br />
building systems, users do have some<br />
concerns about the options. These are<br />
longevity of the various platforms, wireless<br />
connections being dropped, a requirement for<br />
multiple software packages or apps to<br />
manage different system elements, lack of<br />
technical support and complex installation<br />
and set-up procedures.<br />
Smart building systems are typically based<br />
upon a central hub which makes use of device<br />
apps, cloud services and various edge<br />
devices. They usually make use of WiFi and/or<br />
3G/4G links to communicate. The focus is on<br />
simplicity, ease of use and expandability.<br />
Security systems are typically based upon a<br />
graded intruder alarm panel which makes use<br />
of device apps, cloud services and edge<br />
devices. However, connectivity is usually via<br />
secure wireless or supervised hard-wired<br />
connections. The focus is on reliability,<br />
efficiency and consistent around-the-clock<br />
performance.<br />
The difference, while subtle, is actually<br />
important to many end users. They understand<br />
that security systems have a longer track<br />
record, more robust connectivity, a higher<br />
degree of reliability and offer consistent<br />
performance in a range of different conditions.<br />
One of the negatives they have about security<br />
systems is that the investment is in a solution<br />
that only does one thing: offer security.<br />
However, with the next generation alarm<br />
systems currently available, this isn’t the case.<br />
Today’s smart alarm systems offer a wealth<br />
of additional functionality, including features<br />
which increase business efficiency. If end<br />
users are aware of this, their opinion of<br />
intruder alarms as being a ‘grudge purchase’<br />
quickly changes.<br />
Smart security systems make use of robust<br />
and resilient proprietary signalling technologies<br />
to ensure that if, on a rare occasion,<br />
communication is affected, the user is made<br />
aware of that fact. Smart security systems<br />
handle all connected devices via the control<br />
panel, so there is only one interface required.<br />
Because all communication is handled by the<br />
control panel, the system is secure and informs<br />
the user if any attempt is made to tamper with<br />
it, either physically or electronically.<br />
Interestingly, when you compare the costs of<br />
smart building system peripherals with smart<br />
security system peripherals, the latter are<br />
competitively priced and often are lower cost<br />
than the alternatives.<br />
All these benefits, however, will not help<br />
persuade end users of the power of next<br />
generation alarm systems unless integrators<br />
and installers take the time to explain to them<br />
the added value benefits which are also<br />
available. Selling today’s smart systems as<br />
nothing more than alarms undersells their<br />
potential.<br />
In summary<br />
There is no doubt the technological landscape<br />
is evolving and businesses and organisations<br />
have demands that are very different to those<br />
of just a few years ago.<br />
Security systems are well placed to join the<br />
disruptive technologies in offering users<br />
greater choice, and currently offer a superior<br />
option to smart building systems.<br />
However, unless these systems are sold<br />
correctly installers and integrators could miss<br />
an opportunity to grow their businesses.<br />
36
PROMOTIONAL FEATURE<br />
Enhancing time-to-insight with IVA<br />
Video is a great enabler, delivering a rich<br />
depth of information which can be used<br />
intuitively by operators and those<br />
investigating incidents. However, the<br />
management of IVA- and alarm-related data is<br />
critical. Smart systems utilise a variety of data<br />
to filter events and apply criteria when making<br />
decisions on how to best handle a situation.<br />
As a result, partnering with HPE makes sense<br />
as the company has a wealth of experience in<br />
this sector.<br />
CUDO Communication, a video surveillance<br />
technology provider, delivers a range of<br />
intelligent video surveillance solutions. As an<br />
HPE OEM partner, CUDO was able to offer<br />
competitive differentiation and deliver the<br />
performance, scalability, reliability and<br />
support customers demanded from their<br />
security analytics systems.<br />
Additionally, HPE has committed to invest<br />
$4 billion in intelligent edge technologies and<br />
services over the next four years, cementing its<br />
place as an innovator in this growing sector.<br />
The goal is to drive development in sectors<br />
such as AI, machine learning, edge computing<br />
and smart automation.<br />
Turning data into intelligence requires<br />
serious processing power, which is why HPE<br />
entered into a joint venture with NVIDIA to<br />
help push the high-level analytical processing<br />
used by artificial intelligence (AI) and deep<br />
learning to the edge, thus creating video<br />
analytics which accelerate time-to-insight. This<br />
approach also reduces the need for data<br />
transfer, which can be bandwidth-hungry.<br />
Edge-based processing also mitigates the risks<br />
of data loss or corruption.<br />
The partnership with NVIDIA resulted in the<br />
high performance of HPE’s Edgeline Converged<br />
Edge Systems. These systems are designed<br />
specifically for high-level data acquisition,<br />
making use of enterprise class analytics to<br />
deliver appropriate control actions directly at<br />
the edge, in real-time. This is achieved by<br />
leveraging the full power of NVIDIA Tesla<br />
accelerated artificial neural networks to power<br />
AI and deep learning capabilities.<br />
HPE’s Edgeline Converged Edge System<br />
hardware processes video data in real-time at<br />
the edge, thus eliminating any data<br />
management issues which may be caused by<br />
network problems or bandwidth restrictions.<br />
The edge-based servers are more than capable<br />
of handling today’s advanced and complex<br />
intelligent video analytics solutions, including<br />
those which use AI-based technologies.<br />
Edge-based management and processing is<br />
a perfect solution for intelligent video analytics<br />
and AI-enabled processing as it negates any<br />
need for transfer of significant amounts of<br />
video data to a central location, ensuring a<br />
quick and consistent time-to-insight for users.<br />
The approach also delivers cost savings<br />
relating to networking and data storage,<br />
ensuring the solution is both effective and<br />
cost-efficient.<br />
The use of HPE’s Edgeline Converged Edge<br />
Systems enhances the performance of today’s<br />
more complex video analysis solutions,<br />
allowing the use of AI-enabled technologies<br />
through the provision of advanced processing<br />
options. This delivers a greater level of benefits<br />
for the user, significantly increasing their return<br />
on investment. By keeping the processing at<br />
the edge, potential system latency is<br />
eliminated, as are risks associated with data<br />
transfer including tampering and sabotage.<br />
To further assist its partners, HPE runs the<br />
Channel-to-Edge Institute (CEI), a partner<br />
program designed to support those supplying<br />
HPE solutions along with their own Edge<br />
products and services. In order to offer support,<br />
CEI has three elements. The first is training and<br />
support with regard to business use cases,<br />
delivering insights into how the technologies<br />
can be deployed. This is backed up by education<br />
about return on investment, highlighting how<br />
business outcomes can be improved. Finally,<br />
HPE works with its partners on joint go-tomarket<br />
campaigns and sales enablement.<br />
As the use of AI technologies and deep<br />
learning increases, the demands on<br />
infrastructure will intensify. Ensuring the<br />
hardware is both capable and robust is of<br />
increasing importance where video solutions<br />
perform critical roles.<br />
Accelerate actionable<br />
insights from video<br />
surveillance data with robust<br />
IT infrastructure, advanced<br />
services and deep industry<br />
expertise from HPE OEM<br />
Solutions. Partner with us<br />
and achieve faster time-toinsight<br />
with edge analytics:<br />
http://www.hpe.com/<br />
solutions/oem-cctv<br />
37
12 TO TRY<br />
12 TO TRY: Infrastructure<br />
Benchmark looks at 12 products and systems of interest for integrators and installers<br />
who are looking to implement smart solutions on network-based platforms.<br />
Promise Technology: Vess<br />
A6120 Servers<br />
Altronix: NetWay5B<br />
Altronix has expanded its range of<br />
networking products with the NetWay5B<br />
five port hardened switch. The compact<br />
switch is designed to mount in virtually<br />
any Altronix enclosure and combines<br />
multiple IP devices over a single Ethernet<br />
cable. It is especially suitable where<br />
multiple IP access controllers are<br />
deployed.<br />
NetWay5B switches feature five<br />
10/100/1000 data ports with<br />
speed/activity LED indicators, and are<br />
powered via PoE or 12V DC/24V DC<br />
power supplies.<br />
The BR1 mounting bracket enables the<br />
fixing of additional sub-assemblies to the<br />
enclosure’s side wall. It is compatible<br />
with the NetWay5B, PD4UL, PD8UL,<br />
PDS8, LINQ8PD, ACM4, MOM5 and VR6<br />
to allow more devices to share enclosure<br />
space.<br />
The NetWay series also includes<br />
switches with varied capacities.<br />
The Vess A6120 series of servers have been<br />
specifically designed as building blocks for<br />
the deployment of a complete video<br />
surveillance system. Claimed to be reliable<br />
and easy to configure, the series includes<br />
two main server specifications. Vess<br />
Orange servers are designed for running<br />
intelligent video analytics, while Vess Black<br />
servers have been designed for managing<br />
the whole surveillance system.<br />
The modular approach allows integrators<br />
and installers to design and build bespoke<br />
infrastructure for each application, ensuring<br />
the price/performance ratio is as specified.<br />
The Vess A6120 range is fully<br />
customisable, delivering a variety of<br />
performance criteria based on the<br />
individual needs of each user. The servers<br />
are supported by a range of PCI or PCM<br />
cards to enable a mix of data and network<br />
connections to suit specific applications.<br />
Add-ins include 1G Base-T, 10G Base-T, 10G<br />
SPF+, SAS expansion, extension RAID<br />
boards as well as graphic cards.<br />
Ogier Electronics: ESL3100-SC<br />
The ESL3100-SC is a compact point-to-point<br />
wireless bridge/repeater from Ogier<br />
Electronics. Operating in the 31GHz band, with<br />
a selectable choice of 16 operating channels,<br />
the links deliver interference-free operation<br />
over ranges stated to be in excess of eight<br />
kilometres using built-in antennas.<br />
Designed for use with IP-connected video<br />
surveillance systems, the links feature IP66<br />
protection from moisture and dust ingress,<br />
heatsinks and optional sunshields to allow<br />
operation in harsh environments.<br />
The link is based on 802.11g radio but<br />
operates in the interference-free 31GHz band.<br />
The link features data-rates up to 54Mbps in<br />
standard mode and includes configurable<br />
features for enhanced throughput. A number<br />
of encryption features are supported.<br />
38
12 TO TRY<br />
ComNet: ValueLine<br />
ComNet’s ValueLine selection of switches<br />
delivers cost-effective Ethernet and optical<br />
fibre transmission products delivering high<br />
levels of performance for applications where<br />
budgetary constraints are in place. The range<br />
includes managed switches, media convertors<br />
and video/data multiplexers.<br />
The CWGE26FX2TX24MS is a managed<br />
switch which supports 22 10/100/1000BASE-<br />
T(X) ports, along with 2 gigabit combination<br />
ports. The latter can be user-selected as either<br />
10/100/1000BASE-T(X) ports or 100/1000FX<br />
SFP ports. A further 2 100/1000FX SFP ports<br />
are also included. The SFP ports use ComNet<br />
SFPs for fibre and connector type.<br />
The CWGE26FX2TX24MS supports multiple<br />
Ethernet redundancy protocols to protect<br />
security applications from network<br />
interruptions or temporary malfunctions. It<br />
does this by redirecting critical transmissions<br />
within the network.<br />
Other variants of the switch are available,<br />
allowing the right capacity device to be<br />
specified for most application needs.<br />
Siklu: MultiHaul range<br />
The MultiHaul series of products from Siklu<br />
delivers a point-to-multipoint transmission<br />
solution for applications with a need for<br />
shorter range wireless video, audio and<br />
data transmission. The Siklu MultiHaul<br />
products operate in the widely available<br />
and license-exempt 60GHz V Band and<br />
deliver high data throughputs.<br />
Range for transmission is quoted as 400<br />
metres in point-to-multipoint<br />
configurations, and the MultiHaul series of<br />
links also make use of advanced beamforming.<br />
The link is made up of a Base Unit and a<br />
number of Terminal Units; up to eight<br />
Terminal Units can be connected to a single<br />
Base Unit. The throughput is 1.8Gbps.<br />
The devices make use of plug and play<br />
installation, which is combined with Siklu’s<br />
zero-touch configuration. The manufacturer<br />
claims that MultiHaul networks can be<br />
deployed rapidly and cost effectively by a<br />
single person.<br />
The products use narrow beams to<br />
provide virtually interference-free<br />
operation, and dynamically adjust upload<br />
and download capacities to balance the<br />
load, enhancing overall performance.<br />
AES encryption, port isolation and 802.1x<br />
deliver a secure connection.<br />
AMG Systems: Skywave III<br />
Skywave III is a digital IP transmission system<br />
based on 802.11 a/n WLAN technology,<br />
adapted for wirelessly transmitting video and<br />
telemetry data in the 5.5GHz to 5.8GHz bands.<br />
The system can support various<br />
configurations from basic point-to-point links<br />
through to multiple camera applications.<br />
AMG claims the system is easy to use, with<br />
simple installation and configuration<br />
procedures which require no specialist<br />
telecoms knowledge.<br />
Two system design options are available,<br />
using either network-based cameras or legacy<br />
analogue cameras with IP video encoders and<br />
decoders. If using IP-based cameras, no<br />
additional hardware is required. Both IPconnected<br />
and analogue devices can be used<br />
to create a hybrid system.<br />
The Skywave III AMG8150 point-to-point<br />
device has a 150Mbps data rate with 95Mbps<br />
data throughput and 70Mbps compressed<br />
video throughput. The link has a line of sight<br />
range of 1.2 kilometres.<br />
The links are PoE compatible, adding to the<br />
ease of installation, and are equipped with a<br />
wireless signal level indicator. With regards to<br />
security, the wireless devices support WEP,<br />
WPA and WPA2 encryption for secure<br />
transmission.<br />
The antenna are weatherproofed to IP66.<br />
39
12 TO TRY<br />
Barox: RY LPITE-802GBTME<br />
Switch<br />
Barox, the manufacturer of switches, media<br />
converters and IP extenders designed for use<br />
in security-related video applications, has<br />
released a new Layer 2/3 DIN rail-mounted<br />
industrial managed switch, which has been<br />
designed to meet the increased demands of<br />
PoE video applications.<br />
The Barox RY LPITE-802GBTME is a<br />
ruggedised, high-quality switch for use in<br />
10/100/1000Mbps Ethernet networks in<br />
compliance with IEEE802.x.<br />
The switch features eight ports with PoE,<br />
PoE + and PoE ++. One feature of the switch is<br />
that it enables the creation of more fault<br />
tolerant rings using two or more ports. For<br />
example, a two-port bundle can be used to<br />
provide 120W (Max), configured as Port 1<br />
60W/Port 2 60W, or Port 1 90W/Port 2 30W,<br />
etc..<br />
In the event of a network interruption, the<br />
ring closes automatically (in less than 20ms),<br />
to maintain the availability of the system.<br />
For the backbone, two SFP 100/1000Base<br />
SX/LX/ZX bays can be used for multimode or<br />
singlemode fibre. The switch can also be used<br />
as a standalone device for point-to-point<br />
connections or connection modules.<br />
The supplied management software allows<br />
the switch to be deployed in systems with<br />
high functionality demands, such as when<br />
used with PTZ dome<br />
cameras, LED illuminators,<br />
wipers and heaters, etc.,<br />
negating the need for a<br />
network injector.<br />
As well as active PoE<br />
performance management<br />
and reporting, an automatic<br />
camera reboot function<br />
allows problematic edge<br />
devices to be power-cycled<br />
to wake them.<br />
The switch features high<br />
backplane performance for<br />
smooth transmission at full<br />
port occupancy, and jumbo<br />
frames of up to 9600 bytes<br />
are supported at 100Mbps.<br />
Other functionality<br />
includes integrated network<br />
monitoring, graphical<br />
network overview, device<br />
discovery, error handling,<br />
network diagnostics and<br />
security protection to guard<br />
against unauthorised<br />
access.<br />
Secure Logiq: HA Servers<br />
Secure Logiq offers a cost effective<br />
‘Analytics Optimised’ range of servers. The<br />
HA Series fulfils the requirement for an<br />
Enterprise server range with improved<br />
processing capabilities, designed and<br />
optimised for video analytics. The Logiqal<br />
Benchmark software allows an accurate<br />
prediction of the processing benchmark<br />
points for each analytic to provide the best<br />
solution.<br />
Taking advantage of i7 Extreme edition<br />
processors enables a higher clock speed<br />
more suitable for intelligent video analysis,<br />
as opposed to Xeon processors which are<br />
more suited to high-end video processing.<br />
The HA series server range is optimised<br />
for video analytics as well as the video<br />
processing and storage function. An<br />
optional GPU upgrade adds additional<br />
processing functionality. GPU offload<br />
improves performance as well as adding<br />
multiple 4K monitor outputs for use as a<br />
workstation.<br />
Server based analytics have operational<br />
advantages over camera-based solutions.<br />
HA Series servers include the expected<br />
level of mission-critical resilience,<br />
including dual redundant PSUs, OS and<br />
application on two SSDs with RAID1,<br />
hardware RAID and healthcheck software.<br />
Seagate: Exos Enterprise HDDs<br />
While much of the focus in the security<br />
market is on surveillance-specific HDDs<br />
such as the SkyHawk and SkyHawk AI hard<br />
drives from Seagate, the company also<br />
offers enterprise level drives. As modern<br />
security solutions increasingly gather<br />
additional data which can be used to add<br />
value for business intelligence and site<br />
management, that data needs to be<br />
securely stored and managed. Surveillance<br />
specific HDDs are not the best tool for this<br />
task.<br />
When creating data-specific arrays,<br />
Enterprise level HDDs can deliver enhanced<br />
capacities, high performance and an<br />
expected level of reliability to ensure data<br />
is preserved and available when needed.<br />
The Exos X16 enterprise drive is designed<br />
for maximum storage capacity and rackspace<br />
efficiency. The 16TB HDDs are<br />
protected with Seagate Secure. This locks<br />
the drive and encrypts data if the hard drive<br />
is removed from the system.<br />
40
12 TO TRY<br />
NVT Phybridge: FLEX24<br />
The FLEX24 managed switch from NVT<br />
Phybridge makes the transition from legacy<br />
systems to IP-based surveillance and IoT<br />
devices a simple, secure and cost-effective<br />
option for integrators and installers. When the<br />
switch is paired with FLEX adapters, the<br />
enterprise-grade switch delivers fast Ethernet<br />
and PoE over multi-pair UTP cable with up to<br />
610 metres reach: the total distance is more<br />
than six times the achievable distance of<br />
standard Ethernet switches.<br />
This reduces the cost of installation as<br />
additional hardware, such as network<br />
extenders and associated PSUs and cabinets<br />
are not required.<br />
The FLEX24 delivers robust power<br />
management capabilities and a simple to use<br />
GUI interface, ensuring it is both simple to<br />
configure and use. The switch takes<br />
advantage of Modern LAN principles,<br />
protecting legacy infrastructure and<br />
eliminating the need to ‘rip and replace’ any<br />
established multipair UTP cabling.<br />
The FLEX24 switch allows greater flexibility<br />
with regard to network design and enables<br />
advanced interoperability and easy integration<br />
into the overall LAN. For integrators and<br />
installers, this assists with the creation of an<br />
independent secure, robust and easy to<br />
manage network for security and safety IP<br />
endpoints, along with any IP-connected edge<br />
devices such as VoIP telephony, process data<br />
collection, print servers, etc..<br />
Buffalo: TeraStation NAS<br />
Buffalo, a provider of network attached<br />
storage (NAS), USB storage, wired and<br />
wireless networking solutions, has launched<br />
additional models of its network attached<br />
storage rackmount devices. The new models<br />
are the TeraStation 51210RH and TeraStation<br />
5410RN.<br />
The 12-bay model (TS51210RH) is now<br />
available in a partially populated<br />
configuration with four 12TB NAS-grade hard<br />
drives for a total storage space of 48TB, or<br />
fully populated with twelve 12TB drives for a<br />
total capacity of 144TB.<br />
The 4-bay rackmount model (TS5410RN)<br />
can be supplied as a partially populated<br />
option with two 8TB hard drives for a total of<br />
16TB disk space and two free expansion slots.<br />
The Buffalo TeraStation 5010 range has<br />
been built for small and medium sized<br />
applications which require an easy to set-up<br />
and cost-effective 10GbE NAS solution. The<br />
TS5010 series supports iSCSI at enterprise<br />
level network speeds, and can run multiple<br />
concurrent services seamlessly with minimal<br />
performance degradation. The TeraStation<br />
5010 NAS series also supports hybrid cloud<br />
backup services.<br />
Allied Telesis: x930 Switches<br />
The x930 series is made up of Gigabit Layer 3 stackable switches. The high-performance<br />
and scalable devices have been designed to support demanding network requirements,<br />
delivering resilience and reliability for network core and distributed solutions. The switches<br />
offer the ability to stack up to eight units using VCStack, which enables multiple switches to<br />
appear as a single virtual chassis. In use, the virtual chassis acts as a single switch,<br />
simplifying network management.<br />
The x930 switches support load-sharing, and hot-swappable power supplies ensure<br />
maximum uptime while supporting minimal maintenance disruptions. Deployments can be<br />
with Gigabit copper and fibre with 10G and 40G uplinks. Network and device management<br />
can be automated with Autonomous Management Framework (AMF) functionality.<br />
PoE switches are included with the range.<br />
41
ADVERTISEMENT FEATURE<br />
Easy privacy masking, advanced<br />
analytics & powerful cybersecurity<br />
as standard with IDIS<br />
The latest video tech innovations from IDIS are<br />
designed to make life a lot easier for users and<br />
installers – most notably with simpler privacy<br />
masking, plug-and-play advanced analytics and a<br />
range of cybersecurity measures now provided as<br />
standard. So it’s not surprising that they got an<br />
enthusiastic reception at IFSEC.<br />
Cybersecurity and the risk of loopholes is<br />
now a top priority for everyone says the<br />
company, which is Korea’s largest video<br />
tech manufacturer.<br />
To inform decision-making IDIS has now<br />
produced a cybersecurity advisory video, which<br />
is available via its website and YouTube<br />
channel. It makes useful viewing and explains<br />
the urgent need to strengthen the resilience of<br />
traditional surveillance network processes.<br />
Users should plan for three specific risks:<br />
• data access loopholes<br />
• data transmission weaknesses<br />
• the integrity of recorded footage.<br />
IDIS has put effort into addressing these risks<br />
at every stage, from R&D through to<br />
installation. says James Min, Managing Director,<br />
IDIS Europe.<br />
‘This means that we can give users a rich,<br />
layered and comprehensive set of<br />
technologies and features to ensure maximum<br />
protection.’<br />
For example, IDIS DirectIP, the cornerstone<br />
of the IDIS Total Solution, closes-up<br />
widespread vulnerabilities and serves as a<br />
proprietary mutual authentication system for<br />
all IDIS IP products. DirectIP speeds up<br />
implementations and streamlines<br />
cybersecurity by eliminating the need for<br />
engineers to manage multiple IP addresses<br />
and associated passwords during<br />
implementation.<br />
It not only speeds up installation but<br />
mitigates against human error and the<br />
common malpractice of saving passwords in<br />
vulnerable spreadsheets.<br />
Supporting installers who want to ensure<br />
cybersecurity but don’t have in-depth,<br />
specialist knowledge of routing or networking,<br />
IDIS’s For Every Network (FEN) peer-to-peer<br />
technology lets engineers deploy and<br />
configure secure, multi-site surveillance<br />
solutions that deliver centralised monitoring<br />
and control.<br />
IDIS also highlights the cybersecurity<br />
essentials for transmission and recording,<br />
together with its own patented and proprietary<br />
technologies which prevent activities such as<br />
snooping, modification and destruction of data.<br />
And it’s giving a timely reminder about the<br />
continuing importance of video recording<br />
integrity. With its advanced Chained<br />
Fingerprint technology IDIS authenticates<br />
footage so that it can be submitted to the<br />
police and courts as admissible evidence.<br />
‘We’re making cybersecurity a key feature of<br />
our training programmes too, covering devices<br />
and networks,’ says James Min. ‘We’re giving<br />
installers the tools and knowledge they need<br />
to protect their customers from video<br />
cybersecurity loopholes.’<br />
Privacy masking without all<br />
the hassle<br />
When it comes to submitting video evidence or<br />
meeting requests for footage in compliance<br />
with the General Data Protection Regulation<br />
(GDPR), users can be left struggling because of<br />
the need to apply privacy masking. IDIS<br />
42
ADVERTISEMENT FEATURE<br />
IDIS Deep<br />
Learning<br />
Analytics<br />
& AI in<br />
the Box<br />
Dynamic Privacy Masking (IDPM) is designed<br />
to make life a whole lot easier.<br />
IDPM makes the blurring and masking of<br />
people, vehicles and sensitive areas much<br />
faster and easier. Importantly, it is being<br />
made available totally cost-free as a direct<br />
download from the IDIS website. Now users<br />
don’t need to rely on expensive third-party<br />
suppliers to do this job, or to use slow,<br />
cumbersome techniques to do it themselves.<br />
Instead, they simply select any faces or<br />
objects that need to be masked and IDPM will<br />
handle the task dynamically, throughout the<br />
clip, even if the subjects move around. IDPM<br />
applies the masks without changing or<br />
altering the integrity and authenticity of the<br />
video, meaning masking can also easily be<br />
removed if necessary.<br />
Easy deep learning analytics are<br />
97% accurate<br />
Also launched at IFSEC, IDIS’s DV-2116 AI in<br />
the Box makes deep learning analytics more<br />
affordable for small to mid-sized applications,<br />
enhancing security and control room<br />
efficiency.<br />
The plug-and-play IDLA-ready appliance<br />
comes embedded with an NVDIA GTX1060 GPU<br />
chipset allowing the analysis of up to 16<br />
channels simultaneously. Users benefit from<br />
robust and calibration-free object detection<br />
and classification (objects such as people, cars,<br />
and bicycles); intrusion and loitering detection;<br />
powerful. intelligent search functions; and<br />
tracking by colour, object and number.<br />
The introduction of AI in the Box makes<br />
deep learning analytics now easier to adopt<br />
through plug-and-play installation via IDIS<br />
Solutions Suite video management software<br />
(VMS). This allows installation without costly<br />
disruption. And the 97% accuracy proven in<br />
independent testing will minimise false<br />
alarms, significantly improving detection and<br />
monitoring performance.<br />
James Min, Managing Director, IDIS Europe,<br />
says this latest innovation has the potential to<br />
make surveillance much less labour intensive<br />
– and more effective – for a wide range of<br />
users.<br />
‘Our high accuracy analytics can process<br />
vast amounts of data, without break, in a way<br />
that human operators can’t. This means that<br />
high-resolution video streams can be<br />
automatically monitored to spot suspicious<br />
behaviour or distinguish potential threats<br />
from every day activity.’<br />
IDIS’s Deep Learning Engine, which powers<br />
the new DV-2116 AI in the Box solution, can<br />
recognise potentially significant movements<br />
and characteristics of people and vehicles,<br />
while ignoring activity that isn’t relevant. The<br />
technology can quickly check through hours<br />
of video to find specific individuals. It also<br />
becomes more accurate over time due to its<br />
self-learning characteristics.<br />
‘This is very exciting as it means that time<br />
critical activities - such as investigating<br />
incidents - will become increasingly efficient<br />
as our analytics are embedded in operations,’<br />
adds James Min.<br />
James Min,<br />
Managing Director,<br />
IDIS Europe<br />
Find out more<br />
For more information about<br />
IDIS’s video solutions go to<br />
www.idisglobal.com, email<br />
uksales@idisglobal.com or<br />
call +44 (0)203 657 5678.<br />
For up to date news and<br />
information about IDIS’s<br />
technology follow<br />
@IDISGlobal on Twitter.<br />
43
ASSESSMENT<br />
ASSESSMENT: Automated<br />
Transcoding Options<br />
Increases in processing power have enabled smart<br />
technologies to be introduced to a wide range of<br />
security devices. In the world of video surveillance,<br />
these include intelligent video analytics, suspect<br />
tracking and AI-aided searching, but smart<br />
technology can also make a system more efficient.<br />
Increasing video resolutions can have an impact on<br />
bandwidth, but a smart system can offer a solution.<br />
The growth is smart technologies has been<br />
a positive for many in the video<br />
surveillance sector. Decreasing costs for<br />
hardware, coupled with advances in<br />
processing power, have allowed integrators<br />
and installers to deliver high level security<br />
features (IVA tools such as line crossing,<br />
intruder detection, object tracking, loitering,<br />
etc. ) along with a host of other benefits such<br />
as business-based analytics (people counting,<br />
heat mapping and queue monitoring) through<br />
to ANPR and facial recognition.<br />
One of the impacts of this change towards<br />
bespoke and smarter solutions is that end<br />
users are happy to invest in greater camera<br />
counts. This is because the additional devices<br />
deliver business and site management<br />
efficiencies. When a business case can be<br />
made for additional coverage, budget is easier<br />
to find if there is a clear and recognisable<br />
return on investment for the user.<br />
Invariably, when a bespoke smart solution<br />
is deployed, the flexibility and ease of<br />
integration from an IP-based infrastructure<br />
makes a networked platform the obvious<br />
choice. With the growth in use of higher<br />
resolution cameras, plus demand for higher<br />
camera numbers, this does mean installers<br />
and integrators need to be aware of<br />
bandwidth constraints.<br />
44
ASSESSMENT<br />
When considering the implementation of<br />
networked video surveillance systems, one of<br />
the major considerations has to be bandwidth<br />
management. There are many opinions about<br />
the best way to manage the load placed on a<br />
network by streaming video, but the reality<br />
remains that in order to minimise bandwidth<br />
requirements, you have to reduce the amount<br />
of data being transmitted. That is somewhat<br />
ironic in today’s market, given the main<br />
reason for end users investing in HD and 4K<br />
UHD video is to improve the quality of the<br />
video image, which is achieved by generating<br />
more data.<br />
Not only do increases in video resolution<br />
add to the load, but additional cameras-based<br />
tasks can create vast amounts of data<br />
packets, all requiring bandwidth and storage.<br />
With finite network resources, in many<br />
applications the only answer is to take steps<br />
to manage the load.<br />
Basic management<br />
End users demand and expect detailed images<br />
and real-time video. Combined, these two<br />
elements will cause the video to consume a<br />
greater amount of bandwidth. Some of the<br />
more commonly used approaches to<br />
bandwidth reduction are based on techniques<br />
hailing from the analogue video era (ironically<br />
when bandwidth was not an issue, but<br />
recording multiple video streams to one<br />
device was).<br />
These approaches include recording at a<br />
lower resolution than that being viewed (this<br />
used to be achieved by recording video fields<br />
instead of frames) and reduced frame rates.<br />
It should be noted that these approaches<br />
will introduce unwanted compromises with<br />
regard to video quality. Any integrator or<br />
installer delivering a credible solution should<br />
be wary of such basic steps.<br />
Where HD or 4K UHD video has been<br />
specified, such an approach is unacceptable.<br />
Both video formats are established standards<br />
which have been created outside of the<br />
security industry.<br />
If the available bandwidth isn’t sufficient for<br />
the number of cameras being deployed, the<br />
use of smart technologies can provide a<br />
solution.<br />
A smart approach<br />
It may seem like a small point, but the best<br />
results come when integrators and installers<br />
stop thinking about bandwidth reduction, and<br />
consider smart bandwidth management<br />
instead. The goal is to utilise the available<br />
resources to ensure delivery of the best<br />
quality video possible — when it is required.<br />
This means the goal for the engineer is to<br />
ensure the full resolution and specified frame<br />
rates can be achieved for any critical security<br />
video footage. The key word here is ‘critical’.<br />
Basic surveillance cameras will use up<br />
bandwidth resources regardless of whether<br />
the captured footage is critical or not. This<br />
means much of the bit-rate budget is used<br />
delivering information that does not include<br />
data of value.<br />
45
ASSESSMENT<br />
By way of an example, if one part of a site<br />
had a bandwidth budget of 40Mbps and<br />
includes 10 HD cameras, common practice<br />
would be to ‘share’ the bit-rate between<br />
devices. If one camera captures footage of an<br />
incident, it might be the case that the other<br />
nine cameras are capturing nothing of<br />
importance. The result is 90 per cent of the<br />
bandwidth budget is being used gather video<br />
of no real importance.<br />
The challenge is to ensure cameras<br />
delivering images of no great importance do<br />
not use significant amounts of bandwidth,<br />
thereby allowing those with important<br />
information to increase detail and quality by<br />
using an appropriate level of bandwidth.<br />
Because of the unexpected nature of security,<br />
it’s impossible to know which cameras will<br />
capture critical video at any given time, so the<br />
issue requires a dynamic solution to regulate<br />
the bandwidth dependent upon what is<br />
happening in the scene.<br />
Recent increases in computational<br />
processing capabilites have delivered many<br />
benefits for video surveillance. Analysis and<br />
on-the-fly action triggering have made the<br />
automation of many features simpler to<br />
implement. A growing number of<br />
manufacturers are using this capability for<br />
bandwidth management, in the form of<br />
dynamic encoding.<br />
Dynamic benefits<br />
Dynamic encoding controls video processing<br />
according to information within the viewed<br />
scene. As the scene content changes, so the<br />
encoding configurations are automatically<br />
adjusted. These can include resolution, frame<br />
rate and even GOP settings.<br />
In many applications, the interpretation of<br />
what is important video data will be based<br />
upon movement. If the scene is static or only<br />
includes limited motion such as trees<br />
swaying, it will usually contain nothing of<br />
interest. However, if someone enters the<br />
viewed area, movement is detected by the<br />
encoding algorithm and the video is treated as<br />
important. In short, if an exception occurs,<br />
dynamic encoding increases the base<br />
resolution and frame rate, either for the whole<br />
scene of the region of interest.<br />
It is vital to understand dynamic encoding<br />
will not suit every application. Just as other<br />
video analytics and smart processing are not<br />
ideal for every site, the same is true for<br />
dynamic encoding.<br />
Because dynamic encoding makes use of<br />
exceptions, it is not suitable where scenes are<br />
busy and contain a high level of motion. In<br />
such circumstances, dynamic encoding will<br />
not create significant efficiencies.<br />
Dynamic encoding engines differ from<br />
manufacturer to manufacturer, in terms of<br />
which parameters are adjusted and how the<br />
changes are applied to the video stream.<br />
However, results are often best when the<br />
viewed scene is typically static, relatively<br />
clean and well lit at night.<br />
Most manufacturers state bit-rate savings in<br />
terms of percentage decreases. To make<br />
46
much more than a PSIM<br />
Physical Security Information Management<br />
The technology agnostic platform that really<br />
understands what your end user needs.<br />
Mix & Match Monitoring Interact<br />
Easily combine all<br />
your Security and<br />
Information Systems.<br />
Free yourself from<br />
Brand dependence<br />
and start correlating<br />
activities and events.<br />
Accurate monitoring<br />
and real-time analysis<br />
in ways you never<br />
thought possible!<br />
Have the ability to<br />
rapidly take informed<br />
and data-driven<br />
actions.<br />
From alerts and<br />
warnings to statistical<br />
data, the information<br />
that really matters,<br />
will appear instantly,<br />
making it easier to<br />
take action.<br />
Co-funded by:<br />
www.cosmonautasoftware.com
ASSESSMENT<br />
sense of these figures, it is important to<br />
establish what is being compared.<br />
Some of the more dramatic comparisons<br />
will consider dynamically encoded H.265<br />
video against standard H.264 video. To get<br />
the best idea of the difference, ask for figures<br />
where the same compression codec is used.<br />
If the tested camera view contains little or<br />
no movement, this allows dynamic encoding<br />
to be significantly more efficient. However,<br />
even small amounts of motion can vary the<br />
balance and impact on bit-rate savings.<br />
Dynamic encoding can also be adversely<br />
impacted by rain, fog, noise and<br />
environmental scene change.<br />
The methods use to illustrate bandwidth<br />
differences are typically honest, but may not<br />
be a true relection for all sites. The best way<br />
to assess the savings that you are likely to<br />
make is to carry out a field trial.<br />
The reality<br />
For many, the important question is what sort<br />
of bandwidth savings can be achieved with<br />
the use of dynamic encoding? Benchmark has<br />
carried out several trials using various devices<br />
from a number of leading manufacturers,<br />
testing the algorithms using a variety of realworld<br />
scenes in various conditions.<br />
With the preservation of image quality as<br />
our main criteria, scenes with a low level of<br />
movement (occasional foot and vehicle traffic)<br />
saw average bandwidth reductions of up to 53<br />
per cent in good conditions. With medium<br />
levels of motion (more frequent foot and<br />
occasional vehicle traffic), this fell to an<br />
average of 37 per cent.<br />
Rain did have an impact on the performance<br />
of dynamic encoding. In scenes with low<br />
motion the reduction was on average 18 per<br />
cent during a rain storm; the busier scene saw<br />
reductions fall to 7 per cent as the lowest<br />
figure. However, a typical rain shower saw<br />
reductions of 22 per cent and 15 per cent for<br />
each scene. In short, the application of<br />
dynamic encoding was worthwhile.<br />
At night, with a low level of illumination<br />
(around 3 lux at the viewed scene), the<br />
general savings were roughly 20 per cent for<br />
low level motion and 14 per cent for medium<br />
activity. However, when infrared lighting was<br />
used during darkness, the savings increased<br />
to 49 per cent with low motion, and 34 per<br />
cent with medium levels of activity.<br />
It must be remembered that these figures<br />
will be particular to the circumstances during<br />
out test and the conditions at the site.<br />
Dynamic encoding will be more effective is the<br />
viewed area is a sterile zone, and the<br />
technology will be less effective if the area<br />
has a higher level of motion, or if the video<br />
stream is noisy during periods of low light.<br />
In some applications, such as retail<br />
establishments or in public areas, where there<br />
is some degree of motion present at all times,<br />
the savings will be significantly lower, if even<br />
measurable. However, many cameras include<br />
dynamic encoding as a core feature, allowing<br />
integrators and installers to experiment and<br />
see if it adds value.<br />
In summary<br />
In the right circumstances, dynamic encoding<br />
works well and delivers significant bit-rate<br />
savings. With an increasing number of<br />
cameras including this functionality, it is<br />
always worth testing a camera to see what<br />
savings are achievable.<br />
For many the debate will be whether it’s<br />
worth specifying better cameras to enjoy the<br />
benefits of high quality dynamic encoding.<br />
The answer is simple: where site conditions<br />
are right and bandwidth requires careful<br />
management, the technology does offer a<br />
solution, and often the camera upgrade cost<br />
will be less than upgrading the infrastructure.<br />
48
PROMOTIONAL FEATURE<br />
IP data switches vs. Video IP<br />
switches – an explanation<br />
The trend in CCTV to convert and integrate<br />
existing analogue CCTV systems into IP<br />
networks is accelerating, and a new trend<br />
in IP is emerging, one that demands careful<br />
consideration, as barox explain.<br />
Today’s PoE IP cameras are demanding<br />
more and more power to be supplied via<br />
network switches. A 60W network device is<br />
now common, but network designers face<br />
limitations on the availability of switches that<br />
can cope with that demand. In addition, IEEE<br />
standards for 60W are not yet completely<br />
ratified, leaving the world of video IP<br />
networks to forge ahead independently with<br />
the requirement for its own specification of<br />
high-performance switches and components.<br />
Power & agility<br />
IP cameras need to stream their video frames<br />
continuously and steadily, otherwise the eye<br />
immediately perceives the change. In<br />
comparison to the needs of traditional data<br />
networks and due to the synchronous nature<br />
of high-resolution video streams, to cope with<br />
modern IP cameras, video IP network switches<br />
need to be powerful, dynamic and fast.<br />
Megapixel cameras output large ‘jumbo’<br />
video frames, often around 9600Bytes, that’s<br />
up to 6 times larger than normal frames. So<br />
for video network installers, the problem is<br />
most network switches only support frames<br />
with a 1 Gigabit connection, but IP video<br />
cameras negotiate at 100Mbits. As a result,<br />
the switches discard the jumbo frames and<br />
data is lost, creating green/empty frames.<br />
Video network design<br />
Megapixels, 4K, 8K cameras …in the future<br />
we’re heading towards the need to cater for<br />
even greater data rates. A switch might be<br />
labeled 24 Gigabit but can it handle that<br />
amount of data? Conductivity is determined<br />
by the so-called switching fabrics (SF). A<br />
switch with 24Gbits has twice the SF i.e.<br />
48Gbits.<br />
A comparable criterion for evaluating a<br />
switch is the forwarding rate (FR). Many<br />
access switches and Top Hat DIN rails are<br />
exempting switches, not built for Full Wire<br />
Speed on all ports, because switches in the<br />
industrial world only usually need to handle<br />
small amounts of data. When video is<br />
connected to these switches, the device is<br />
overwhelmed.<br />
Another consideration is the bottleneck<br />
uplink. For a switch, this should also be<br />
designed for video. As an example, a 24-port<br />
1/100/1000TX switch must be used with a<br />
minimum uplink of 10Gbits.<br />
Conclusion:<br />
Why buy a general purpose low cost 24 port<br />
switch which is likely to fail when only<br />
partially populated due to the switching fabric<br />
not being able to handle the traffic?<br />
Power budget – choosing the<br />
right switch<br />
IP cameras behave differently compared to<br />
other PoE devices, for example, on day/night<br />
switching current peaks are generated, or<br />
when PTZ domes move there is a short-term<br />
increase in power demand. In these<br />
situations, the network switch must cope with<br />
the demand and not fail.<br />
Typically, 75% of the switch power is used<br />
purely for PoE, the remaining 25% is required<br />
to cope with peak currents and for the switch<br />
CPU. So for example, a 24-Port Switch with<br />
Class 3 consumers equates to 24 x 15.4W =<br />
370W. However, effectively the switch needs<br />
to be specified as 370W / 0.75 = 500W, i.e.<br />
the remaining 130W is needed for the reserve<br />
of peak currents/switch CPU.<br />
In the event of a power failure, a fullyfeatured<br />
video switch must be able to timedelay<br />
port-by-port. Otherwise all cameras<br />
could receive peak power at a stroke.<br />
Example: All Domes are required to pre-set to<br />
their Home position at the same time, this<br />
generates enormous peak currents, impacting<br />
the power supply again and again. At the<br />
same time, modern video browsers should be<br />
able to ‘ping’ PoE devices directly and, if<br />
necessary, remove the PoE supply to<br />
successfully reboot cameras.<br />
For more information about<br />
the barox range of<br />
professional video switches,<br />
customers can contact Clear<br />
Vision Technologies on<br />
01580 212999, email<br />
info@cv-tech.tech, or visit<br />
www.cv-tech.tech<br />
49
INNOVATION AWARDS<br />
Rewarding Innovation<br />
INNOVATION<br />
AWARDS 2019<br />
At Benchmark, we passionately believe that the<br />
future of the electronic security sector lies in the<br />
creation of innovative and smart solutions. In order<br />
to allow installers and integrators to create such<br />
solutions, it is vital that manufacturers deliver<br />
innovation that both enhances the technological<br />
capabilities of their products, and allows those<br />
developments to be implemented in a realistic<br />
fashion. In order to highlight such advances,<br />
Benchmark runs its Innovation Awards scheme,<br />
which recognises and rewards innovative thinking.<br />
Here we highlight the finalists in the 2019<br />
Benchmark Innovation Awards.<br />
The security industry has never before<br />
enjoyed the sheer breadth of<br />
technological options that it does today.<br />
The security systems market is advancing on a<br />
daily basis, and alongside developments from<br />
security innovators we can also benefit from<br />
the constant advancements being made in the<br />
IT, communications, AV and consumer sectors.<br />
The impact of these innovations is immediate,<br />
and we can leverage what is on offer as and<br />
when they happen. In short, innovation has<br />
become our watchword.<br />
As advances in technology deliver ever<br />
greater levels of functionality, so the ability to<br />
integrate security elements increases. This is<br />
further added to by interoperability with other<br />
functions such as business intelligence and<br />
smart management. The result is that security<br />
systems offer a more valued proposition for<br />
all concerned, bringing together enhanced<br />
security with truly beneficial solutions.<br />
Through on-going innovation, and by<br />
embracing the new and emerging<br />
technologies, manufacturers can assist<br />
installers and integrators who wish to adopt a<br />
more holistic approach to system design. This<br />
allows the solutions to encompass the<br />
inherent flexibility that new technologies<br />
offer.<br />
Defining innovation<br />
The Benchmark Innovation Awards scheme<br />
recognises and rewards innovations which<br />
deliver real benefits to installers, integrators<br />
and end users.<br />
Innovations must bring value; it’s not<br />
enough for a manufacturer to add features<br />
simply to expand a list of functions. If there is<br />
no tangible benefit for installers and<br />
integrators, or their customers, developments<br />
cannot be considered as innovative!<br />
Devices or systems must either deliver a<br />
new concept or different approach which is<br />
both effective and realistic, or should include<br />
a specific feature or function which ranks as<br />
innovative.<br />
Also, with an increasing focus on<br />
integration and interoperability, devices or<br />
software which add functionality and bring<br />
together other established systems are<br />
coming to the fore.<br />
Innovation is the lifeblood of the security<br />
systems sector, and is vital for a credible and<br />
profitable future.<br />
50
INNOVATION AWARDS<br />
Video Hardware<br />
FLIR: Saros<br />
DH-390<br />
FLIR’s Saros<br />
dome cameras<br />
include patented<br />
and patentpending<br />
technologies to<br />
deliver accurate,<br />
actionable alerts,<br />
and verified<br />
alarm data for<br />
outdoor<br />
commercial perimeters. The cameras integrate multiple<br />
technologies in one device, including two thermal sensors<br />
supported by onboard analytics, plus the choice of an<br />
HD1080p or 4K UHD video camera, IR and visible LED<br />
illuminators, two-way audio and digital input/outputs. The DH-<br />
390 features a thermal resolution of 320 x 120 with a 90-<br />
degree field-of-view.<br />
Hikvision: Thermal Smart Linkage Tracking<br />
Hikvision’s Thermal Smart Linkage Tracking Systems makes<br />
use of a single fixed thermal imaging camera and a videobased<br />
PTZ camera. The PTZ camera uses smart processing to<br />
track multiple moving targets, triggered by the fixed thermal<br />
camera which delivers an overview of the protected area. There<br />
are a number of models with differing detection ranges.<br />
Edesix: VB-300<br />
The VB-300 series of body-worn cameras are WiFi-enabled<br />
devices. With a 130 degree horizontal field of view, day/night<br />
recording capability, RFID touch-assign enabled and integrated<br />
pre-record functionality, the VideoBadges can record footage of<br />
ongoing incidents. Video and audio footage is kept securely on<br />
the camera with no removable media card, and is encrypted.<br />
Hanwha Techwin: Wisenet XNP-6550RH<br />
The Wisenet XNP-6550RH PTZ camera features a 55x optical<br />
zoom, gyro sensing for accurate stabilisation, optical Defog and<br />
integral IR LEDs with an effective range of up to 500 metres. The<br />
optical Defog uses an optical low pass filter which accepts a<br />
higher light range in front of the camera’s image sensor in order to<br />
reduce the influence of fog. Other features include adaptive IR<br />
technology, auto-tracking, integral video analytics, dynamic<br />
streaming and dual SD/SDHC/SDXC memory slots.<br />
IDIS: Super Fisheye 5MP Compact<br />
The Super Fisheye 5MP Compact camera (DC-Y6513RX) is a<br />
compact 360 degree camera designed for wide area protection<br />
applications. Features include Smart UX Controls for high<br />
accuracy and ease-of-use, smooth de-warping on the camera<br />
as well as on desktop applications, protection against video<br />
loss via built-in Smart Failover technology, and an intelligent<br />
codec. Intelligent video and event trigger functions utilise<br />
motion detection, active tampering and trip zones.<br />
Video Software<br />
Milestone: XProtect+ 2019<br />
XProtect+ 2019 extends the usability of the Smart Client, with<br />
support for one- and two-way audio in the Mobile and Web<br />
clients. This includes communication directly from a phone<br />
with the Push-To-Talk function. All software packages in the<br />
XProtect+ range include Milestone’s Rules Engine, support for<br />
H.265 video formats, hardware-accelerated video decoding,<br />
centralised management and Active Directory support.<br />
Bosch: BVMS Pro 9<br />
BVMS Professional provides seamless management of digital<br />
video, audio and data. The network-based system offers<br />
optimum results with Bosch devices, leveraging the proprietary<br />
capabilities of the cameras and recording solutions. The<br />
system is equipped with embedded resilience, allowing day-today<br />
operations to continue should the management server or<br />
recording servers fail. Edge-based video content analysis and<br />
advanced recording technology reduce the cost of ownership.<br />
Johnson Controls: TrickleStor<br />
The VideoEdge TrickleStor feature provides an integrated<br />
camera-NVR connectivity solution protecting against video loss<br />
by recording video locally . By recording directly onto SD cards<br />
when a connectivity failure to the VideoEdge NVR takes place,<br />
video is protected. TrickleStor automates the process of media<br />
database repair, reducing the risks when a network<br />
communication failure event occurs.<br />
Mobotix: Mx6 Second Generation Platform<br />
MOBOTIX offer its second generation Mx6 camera line with a<br />
new platform that includes the integrated MxBus functionality.<br />
The MxBus technology is based on an extended camera board.<br />
This two-wire cable system is encrypted against cyberattacks<br />
and expands camera functions by including practical additional<br />
modules such as the MX-GPS-Box, a reliable time server for a<br />
complete video system. Mx6 cameras without MxBus can also<br />
process and use the data from an MxBus module connected to<br />
a camera within the same network.<br />
IPS: VideoManager 3D VMS<br />
VideoManager VMS makes use of 3D technology, which<br />
enhances the management suite’s operational feature-set.<br />
The software’s 3D technology automates tracking and camera<br />
handover, meaning operators can follow suspects without a<br />
need to manually control PTZ-enabled cameras. The cameras<br />
automatically use IVA to track suspects, and if the target<br />
moves from one<br />
camera’s protected<br />
area to another, the<br />
system automatically<br />
hands over.<br />
VideoManager includes<br />
VMD and sabotage<br />
detection, and IPS<br />
intelligent video<br />
analytics can be added<br />
via licence upgrades.<br />
51
INNOVATION AWARDS<br />
Access Control Hardware<br />
Paxton: PaxLock Pro<br />
PaxLock Pro is Paxton’s third generation of electronic door<br />
handle, offering a robust, wireless and aesthetically pleasing<br />
product suitable for a wide range of sites. It can be installed to<br />
operate as part of a networked access control system or as a<br />
standalone device. It is available in two options for internal<br />
and external facing doors. Simple to install, it is compatible<br />
with DIN standard locks so replacement of an existing door<br />
handle creates minimal disruption.<br />
Nortech: FeeMaster Smart Range<br />
The FeeMaster Smart system provides a simple, cost effective<br />
means of managing revenue collection while simultaneously<br />
controlling short-stay, long-stay and seasonal parking access.<br />
The FeeMaster system is also ideal for controlling access for<br />
staff, long stay and seasonal parkers due to the ability to<br />
validate smart cards for any given duration of time.<br />
Pacom: 8003 Controller<br />
The 8003 controller is an intelligent IP-enabled hybrid<br />
controller that provides flexible intrusion detection and access<br />
control for up to eight doors. As an access control device, the<br />
8003 can support up to 8 doors, each with an IN and OUT<br />
reader, enabling anti-passback. The 8003 controller can<br />
operate standalone for smaller or remote environments or can<br />
be easily incorporated as part of a fully integrated access<br />
control system for larger buildings or multi-site applications.<br />
Comelit: VIP Mini HF WiFi<br />
The VIP Mini HF WiFi features an integral WiFi port and gateway<br />
for forwarding video entry phone calls to smartphones and<br />
tablets running the Comelit app. All functions and<br />
programming can be performed from a graphic menu, using<br />
eight soft-touch keys. The unit is powered by PoE, and includes<br />
an induction loop with T position for users of hearing aids.<br />
ASSA Abloy: Aperio H100<br />
The H100 door handle offers integration with a number of<br />
third-party systems. Available in online and offline versions, it<br />
can be retrofitted without drilling for doors with a thickness of<br />
30–80mm. The H100 is battery-operated and supports iCLASS,<br />
Mifare, Mifare Plus, Desfire SE and EV1 card technologies.<br />
Access Control Software<br />
Vanderbilt: ACT Enterprise<br />
The latest release of ACT Enterprise includes a number of<br />
updates to enhance the solution. To help with integration, ACT<br />
Enterprise integrates seamlessly with the company’s SPC<br />
intrusion system. ACT Enterprise is also supported by intuitive<br />
smartphone apps delivering real-time monitoring, system<br />
management and user administration. To facilitate smart<br />
functionality, one of the headline additions is rules mapping,<br />
allowing triggers to implement actions.<br />
Qognify: Qognify ACI<br />
Access Control Insights (ACI) is designed to analyse access<br />
control system data to deliver operational insights, detecting<br />
abnormal behaviours and identifying critical events.Utilising<br />
machine learning data analytics, Qognify ACI detects unusual<br />
card holder activities associated with potential fraud, theft or<br />
other risks, alerting the system operator of threats. All<br />
functionality is delivered without changing legacy access<br />
control systems.<br />
Evva: Xesar 3.0<br />
The Xesar system is an innovative electronic access system<br />
which is fully scalable, allowing use in residential<br />
developments, educational facilities and office buildings. Xesar<br />
can be simply and securely managed, either from within a<br />
locally installed network or via the cloud. The Xesar system can<br />
be created from a number of modules. These include cylinders,<br />
escutcheons, readers, door handles, cam locks and padlocks.<br />
BQT Solutions: Net2 Integration<br />
BQT offers a software integration between its miPASS Access<br />
TMS software and Paxton’s Net2 access control software. The<br />
integration enables the seamless addition of BQT biometric<br />
readers to new or legacy Net2 systems, facilitating a smooth<br />
transition from less secure card technologies to more robust<br />
options like fingerprint biometrics and BQT’s own miPASS<br />
credentials.<br />
TDSi: GARDiS<br />
GARDiS access control management software boasts ease of<br />
installation across a number of Windows versions, with a<br />
graphical user-friendly interface developed specifically to<br />
accommodate the needs of a wide variety of users. The<br />
software’s installation wizard reduces complexity during the<br />
set-up. GARDiS is a<br />
web-based<br />
application which<br />
runs as a service.<br />
This ensures that is<br />
always operational.<br />
The software will be<br />
enhanced with a<br />
selection of<br />
hardware products<br />
designed to fully<br />
integrate with<br />
Cloud-hosted<br />
security solutions.<br />
52
INNOVATION AWARDS<br />
Site Protection Hardware<br />
Takex: PIR-<br />
T40NAM<br />
The PIR-T40NAM is<br />
a long-range<br />
external PIR with a<br />
maximum range of<br />
40 metres. The<br />
sensor boasts four<br />
selectable<br />
operational modes<br />
which allow<br />
flexibility when it<br />
comes to<br />
positioning the unit.<br />
With a mounting<br />
height range of<br />
between two and six<br />
metres, it allows freedom when finalising device locations. The<br />
PIR-T40NAM delivers vertical curtain protection. Other<br />
headline features include triple mirror optics and intelligent<br />
signal processing.<br />
OPTEX: OPTEX Bridge powered by CHeKT<br />
The OPTEX Bridge powered by CHeKT combines remotely<br />
monitored intruder alarm systems and ONVIF cameras to<br />
create a visual verification platform. The solution has been<br />
developed to be compatible with most intruder alarm systems,<br />
and any ONVIF camera, as well as being integrated with most<br />
ARCs’ monitoring software platforms. The Cloud hosted<br />
platform allows collaboration between the ARCs and the users<br />
by sharing video clips to confirm alarms.<br />
SICK: Visionary-T DT Sensor<br />
The Visionary-T DT sensor is a configurable, plug-and-play 3D<br />
detection sensor. The device makes use of single-snapshot<br />
Time of Flight technology for a range of detection, notification<br />
and security applications. The sensor uses integral image<br />
processing, ensuring it can be added to installations without<br />
additional IT-based infrastructure.<br />
InnoSent: iSYS-5021 with Tracker<br />
The iSYS-5021 is a 24GHz radar system. InnoSent has<br />
developed it with the aim of fusing together radar and<br />
cameras. The integrated Smart Tracker detects multiple<br />
moving objects within the detection area. It combines radar<br />
detections with tracked data and allows the anonymous<br />
monitoring of relevant events. The targets are recorded even if<br />
a person stops moving, changes postures or starts crawling.<br />
Raytec: Urban-X<br />
Urban-X is a range of high-performance general area<br />
luminaires designed for industrial applications. Urban-X<br />
delivers several performance advantages compared to<br />
traditional lighting, such as a lumen output up to 14,000lm.<br />
The range achieves powerful illumination through the use of<br />
Platinum SMT LED technology. High thermal performance<br />
ensures the luminaires run cool, providing long-life.<br />
Site Protection Software<br />
BT Redcare: Redcare Ultimate<br />
Ultimate is claimed to be BT Redcare’s best alarm signalling<br />
system yet, suitable for every level of risk. It uses a private IP<br />
connection on the Redcare network, backed up by two 4G<br />
SIMs. Resilience is ensured as the panel includes battery backup.<br />
Real-time monitoring means any problems with the<br />
connection can be notified in 90 seconds. The service can<br />
deliver alarm and fire signalling, as well as monitoring of<br />
business elements.<br />
Pyronix: ProControl+<br />
Pyronix has added voice push notifications to both the iOS and<br />
Android versions of the ProControl+ app. When an alarm<br />
occurs, if the system is set or unset, or if an event is triggered<br />
by any life safety devices integrated with the system, the user<br />
receives a voice push notification. The feature adds value<br />
without any additional cost. When combined with cameras for<br />
video verification, users can also see what is happening.<br />
Teleste: S-AWARE<br />
S-AWARE provides users with a smart platform to centralise<br />
system information and manage daily operations. Data from<br />
various sources can be collected, identified, analysed and<br />
distributed in a single, easy-to-use, web-based graphical user<br />
interface. S-AWARE can be deployed as a standalone product,<br />
or integrated with Teleste’s S-VMX video management<br />
solution. It stores and records information from all system<br />
components and tracks events to generate reports for analysis.<br />
Reconeyez: Video Verification System<br />
Reconeyez offers a battery-powered alarm system with video<br />
verification, providing a flexible solution for outdoor security,<br />
with a particular emphasis on mobile/temporary security. The<br />
standalone system can be used where there is no mains power<br />
and the PIR-managed cameras work with a battery-powered<br />
2G/3G/4G bridge to send alarms and images back to a control<br />
room for verification purposes.<br />
Texecom: Texecom Cloud<br />
Texecom Cloud delivers enhanced system management<br />
options to integrators and installers. The cloud platform<br />
enhances day-to-day remote management. Benefits include<br />
remote maintenance and healthchecks across the full portfolio<br />
of systems, remote access to systems via any web-connected<br />
device, access management, reduction in time of on-site<br />
configurations, flexible reporting and a number of additional<br />
benefits which enable additional value and add-on services.<br />
53
INNOVATION AWARDS<br />
Intelligent Systems<br />
Business Intelligence<br />
Herta: BioFinder<br />
BioFinder makes it possible to search for a specific subject,<br />
through facial recognition, in one or various recorded videos.<br />
By working with GPU architecture, it processes all the images<br />
at a high speed, making it possible to locate a specific subject<br />
more rapidly. BioFinder delivers forensic analysis and the<br />
classification of information.<br />
Avigilon: AI Appliance<br />
The AI Appliance adds patented Avigilon self-learning video<br />
analytics and Appearance Search technology to almost any IP<br />
camera. When connected to Avigilon Control Center (ACC)<br />
software, integrators and installers can create powerful AIbased<br />
solutions, with automatic alerts of potentially critical<br />
events and the ability to search for and locate a person or<br />
vehicle of interest across an entire site.<br />
Axis: AXIS Guard Suite<br />
AXIS Guard Suite encompasses motion, intrusion and loitering<br />
analytics for Axis network video products. It detect threats and<br />
instigates configured actions. The analytics are suitable for use<br />
in a range of locations. The analytics can be used with Axis<br />
network video products running firmware 7.x or higher. They<br />
are available at no extra cost for Axis Q-line products and at a<br />
low cost for other compatible products. The applications<br />
support multiple profiles, allowing trigger settings for different<br />
times of day.<br />
Davantis: Daview Mini<br />
Daview Mini offers a comprehensive security solution for small<br />
sites, centralising video analytics and alarm verification,<br />
enabling system operators to take immediate action. The<br />
appliance is quick and easy to install and features intuitive<br />
software. The system is compatible with devices using the<br />
ONVIF protocol. The appliance features relays for activating<br />
external devices, and perimeter protection is enhanced thanks<br />
to a SmartWalk function which aids configuration.<br />
Genetec: Streamvault Appliances<br />
Streamvault is a complete line of secure, ready-to-deploy<br />
security infrastructure solutions designed to help integrators<br />
and installers design a system that meets project<br />
requirements. With Security Center, the Genetec VMS product,<br />
pre-loaded, Streamvault appliances simplify deployment and<br />
maintenance, and unify a site’s security operations.<br />
Briefcam: Briefcam Protect<br />
BriefCam’s video content analytics platform adds value to<br />
video surveillance system investments by making captured<br />
video searchable, actionable and quantifiable. Using a fusion<br />
of computer vision technologies, together with patented Video<br />
Synopsis technology, Briefcam enables video system operators<br />
to review hours of video in minutes, rapidly identifying people<br />
and objects of interest. The software provides robust<br />
detection, classification and recognition.<br />
A.I. Tech: AI-PARKING-DEEP<br />
AI-PARKING-DEEP is a video analytics solution for parking<br />
management. Using deep learning techniques, it is able to<br />
analyse car parks, including indoor and outdoor areas, to<br />
assess if spaces are empty or occupied. The solution is aimed<br />
at parking management, and delivers occupancy rates for<br />
parking areas. It can operate in enclosed spaces or on streets,<br />
and can inform users about parking spaces.<br />
Allgovision: Flow Map<br />
The Allgovision analytics packages offer a diverse number of<br />
modules, including a host of business intelligence options. The<br />
AGV-VA-FLOW module implement flow mapping, allowing<br />
footfall traffic is a surveyed area to be quickly and easily<br />
mapped. The analytics module produces a movement trend<br />
map which highlights the percentage split for various<br />
movement paths taken by people in the monitored zone, over a<br />
defined time period.<br />
Anyvision: Better Tomorrow Platform<br />
Better Tomorrow is a state-of-the-art platform that enables<br />
one-to-many recognition on-demand. The platform can either<br />
be based in the local premises or in the cloud. It can be used<br />
for recognition of persons of interest, as well as recognition of<br />
humans or other specified objects. Other features include heat<br />
mapping. The technology can be applied across multiple sites,<br />
and results can be filtered by adding variants as required.<br />
SAST: IoT Platform<br />
SAST offers a global platform for the next generation of<br />
security cameras. It has been created to harness the potential<br />
available from emerging innovative IP-based security cameras<br />
and devices. With surveillance technologies being deployed<br />
using internet connectivity and processing at the edge, the<br />
increased use of next generation processing and advanced<br />
video<br />
compression<br />
and stream<br />
management<br />
requires a new<br />
approach. The<br />
SAST IoT<br />
platform is<br />
designed for<br />
edge-based<br />
video analytics<br />
as well as<br />
business<br />
applications.<br />
54
INNOVATION AWARDS<br />
Infrastructure<br />
Seagate: SkyHawk AI 14TB<br />
SkyHawk AI HDDs are available in 14TB<br />
variants and have been designed for use in AIcapable<br />
surveillance systems. Traditional<br />
SkyHawk drives are optimised for<br />
predominantly write-based performance but<br />
the AI models are configured for higher<br />
workloads, such as the in-depth searching<br />
and logging that AI-enabled systems perform.<br />
The drives also include data protection<br />
coverage as they are supplied with a two year<br />
Rescue Data Recovery Services plan bundled<br />
with every AI drive.<br />
ComNet: CTS24+2<br />
The CTS24+2 is a managed layer-2<br />
commercial grade Ethernet transport system<br />
and provides up to 24 ports of 10/100TX<br />
Ethernet and two ports of 10/100/1000TX or<br />
1000FX transmission. The CTS24+2 series<br />
allows for flexibility in combining standard<br />
copper, optical and extended distance<br />
Ethernet in one device. Optional PoE supplies<br />
of 400 or 720 Watts are available. Up to three<br />
8-channel modules can be fitted to each<br />
chassis: the modules are CAT5/6 10/100 Mbps<br />
Ethernet, 100FX optical SFP, or CopperLine<br />
Coax or UTP interfaces.<br />
D-Link: DIS-700G<br />
The DIS-700G Series Industrial Layer 2+<br />
Gigabit managed switches are designed to<br />
withstand temperature variations, vibrations<br />
and shocks, making them ideal for security<br />
applications. The rugged switches feature a<br />
hardened design combined with high<br />
availability network features which are vital<br />
when considering surveillance and wireless<br />
connectivity. The switches provide high<br />
throughput and reduced response time which<br />
is critical for security-based video, voice and<br />
data applications.<br />
NVT Phybridge: EC Extender Kit<br />
The NVT Phybridge EC Extender solution is<br />
designed to upgrade the downlink capabilities<br />
of a standard Ethernet switch, delivering<br />
10/100Mbps symmetrical (full duplex) data<br />
and PoE over coax. The solution offers<br />
enhanced range with distances of up to 1.2km.<br />
IP-based IoT devices can be connected to the<br />
existing coaxial infrastructure, delivering<br />
optimal performance while saving costs and<br />
time. Cost savings can enable system<br />
designers to transfer budget and resources<br />
towards higher-quality applications and<br />
devices.<br />
InfiNet: InfiLink 2x2<br />
InfiLINK 2X2 is a point-to-point wireless<br />
transmission solution, combining high-speed<br />
capabilities of up to 280Mbps throughput,<br />
with a range of features and benefits such as<br />
leading-edge radio protocols providing<br />
spectral efficiency and wireless transmissions<br />
over long distances. The wireless solution can<br />
be deployed to provide Ethernet extensions,<br />
such as simple LAN-to-LAN connectivity,<br />
between two locations where physical cabling<br />
might be cost-prohibitive.<br />
56
Stay Untouched.<br />
And Secure Your Security.<br />
www.cactusconcept.com<br />
At MOBOTIX, we have developed the unique cactus concept for a reliable and complete protection of endto-end<br />
video security systems. Protect yourself against serious hacker attacks – with an intelligent video<br />
system that is ready to go, but can also stand up to the ever evolving challenges of our world.<br />
Stay untouched with MOBOTIX!
BENCHMARK – driving innovation<br />
and smart solutions in the security industry<br />
The Benchmark website is a supplement<br />
to the printed monthly magazine, and<br />
includes a variety of tests and<br />
assessments of the latest technologies,<br />
including videos where relevant, as well as<br />
guides to product selection, independent<br />
technology-based articles and information<br />
about the latest influential products and<br />
systems comprising security and smart<br />
technologies.<br />
TESTS AND ASSESSMENTS<br />
All tests and assessments are fully independent, and<br />
manufacturers have no involvement in the process.<br />
Additionally, Benchmark makes no charge, financially or of any<br />
other kind, for inclusion in tests. All products are selected by<br />
an independent team. In short, it’s the only way you can<br />
ascertain the truth about product and system performance in<br />
real-world applications! Tests are carried out by an<br />
independent team of experts, telling you the whole truth about<br />
the performance you can expect.<br />
DRIVING INNOVATION<br />
Benchmark believes that the future of the security sector lies<br />
in the creation of innovative solutions which deliver credible<br />
security, flexibility and smart value-added benefits. With<br />
unrivalled technical expertise, Benchmark ensures you are upto-date<br />
in an increasingly technical environment.<br />
LONG-TERM SYSTEM EVALUATIONS<br />
The Benchmark website now includes information from the<br />
newly launched long-term system evaluation. There are many<br />
theories about how systems can deliver added value;<br />
Benchmark sees what is and what is not possible by creating a<br />
long-term system to investigate the various possibilities.<br />
@benchmarkmag<br />
STAY UP TO DATE<br />
Benchmark is always testing and assessing<br />
new products and technologies. Keep up to<br />
date with the latest reports by following<br />
Benchmark on Twitter.<br />
www.twitter.com/benchmarkmag<br />
www.benchmarkmagazine.com
thepaper<br />
Business News for Security Professionals<br />
Pro-Activ Publications is embarking on a revolutionary<br />
launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />
latest financial and business information for<br />
professionals operating in the security sector<br />
The Paper will bring subscribers (including CEOs,<br />
managing directors and finance directors within the<br />
UK’s major security businesses) all the latest company<br />
and sector financials, details of business re-brands,<br />
market research and trends and M&A activity<br />
FOR FURTHER INFORMATION<br />
ON THE PAPER CONTACT:<br />
Brian Sims BA (Hons) Hon FSyI<br />
(Editor, The Paper and Risk UK)<br />
Telephone: 020 8295 8304<br />
e-mail: brian.sims@risk-uk.com<br />
www.thepaper.uk.com
Secure operations 24/7 to see all the details,<br />
all the time with Bosch FLEXIDOME IP starlight 8000i.<br />
With quick installation plus wireless and remote commissioning, camera<br />
adjustments can be corrected whenever needed plus up to 4k Ultra HD<br />
resolutions and starlight technology so you can see all the details all the time.<br />
Find out more at boschsecurity.com