Benchmark August 2020

Page 1

CoverAug20_001 10/07/2020 17:41 Page 3

Benchmark

TECHNOLOGICAL INNOVATION & SMART SOLUTIONS August 2020

Audio

The value of sound classification

Compliance

An ideal role for AI?

IoT

Increasing management benefits

VMS as a Service Milestone’s XProtect on AWS

Smart: Management Benefits with VMS

Video: The Challenge of Lighting

Smart: Enhancing the RoI of Alarms


Project2_Layout 1 09/07/2020 14:39 Page 1


contents aug20_000_Benchmark_feb15 10/07/2020 17:06 Page 1

AUGUST 2020

Contents 5 Editorial In a time of challenges for businesses and organisations, it is critical users understand the benefits on offer.

6

6 Benefits of Cloud-based VMS Milestone now offers XProtect on AWS, a cloudbased video management service which adds value for users and integrators.

10 Visual Value for Alarms Adding visual verification to an intruder alarm systems not only enhances security, but also increases the return on investment.

14 VMS as a Management Tool

Editor Pete Conway E-mail: pete.conway@benchmarkmagazine.com Advertisement Manager Paul Amura Tel: 020 8295 8307 E-mail: paul.amura@proactivpubs.co.uk Production Matt Jarvis Tel: 020 8295 8300 E-mail: matt.jarvis@proactivpubs.co.uk Administration Tracey Cole Tel: 020 8295 8306 E-mail: tracey.cole@proactivpubs.co.uk

There is no doubt video management software increases the protection for a site, but it can also enhance the entire solution for end users.

18 Compliance Management Smart systems can offer enhanced compliance management, adding to the overall return on investment for many users.

10

21 The New Normal Occupancy management and mask detection technologies can offer support for businesses looking to reopen.

23 Sound Classification New smart technologies make it simpler for solutions to address noise-based triggers where sound classification is used.

25 Sign up for Benchmark E-News

ISSN: 1750-1040 Editorial and Advertisement Office PO Box 332 Dartford DA1 9FF Š Pro-Activ Publications Ltd 2020 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Benchmark reserves the right to alter, abridge or edit any submissions prior to publication. The views published in Benchmark are not necessarily those of the publisher. While every care has been taken to ensure accuracy in the preparation of material included in Benchmark, the publishers cannot be held responsible for the accuracy of the information contained herein, or any consequence arising from it. In the case of all product reviews, tests and assessments, judgements have been made in the context of the equipment supplied at the time of the review. Any judgements are based upon situations relevant at the time of writing, and comments relating to cost are based upon published prices available from major distributors. Comments are based upon products and systems currently available in the UK market-place.

Stay updated with the Benchmark E-News service and keep informed about tests, assessments, innovation and smart technologies.

30 Low Light Image Capture Managing low light applications remains an issue for many applications, although there may be a simple solution.

14

35 Smart Integrations Increasingly the development of smart technologies is allowing users to enjoy bespoke integrations with advanced functionality.

38 Benchmark Innovation Awards 2020 The finalists of the Benchmark Innovation Awards 2020 are revealed.

44 Bulletin New products and news of interest of integrators and end users seeking to create smart solutions and bespoke systems.

50 Benchmark Online Benchmark’s website is a valuable resource for those seeking to benefit from smart solutions and innovative technologies.

3


Project2_Layout 1 09/07/2020 14:50 Page 1

Favourites

News Manuals

Texecom forum at your fingertips Ask away in our forum... TexecomPro features direct access to our installer forum, so you can share knowledge and ask away in our installer forum without leaving the app. With 25,000 users and a wealth of hints, tips and knowledge of all-things-Texecom, the Texecom forum is the installer community built for you.

www.texecompro.com


editorial aug20_000_Benchmark_feb15 10/07/2020 17:09 Page 1

COMMENT

The Growing Demand for Smart Solutions A

s new technologies and services emerge into the smart systems sector, it is not uncommon to see a growing number of manufacturers highlighting the use of AI and Deep Learning algorithms. Many companies will even have the terminology emblazoned across their marketing materials. References to the functionalities will also be highlighted in their product descriptions, their white papers and at times even incorporated into their company logos. The terms ‘AI’ and ‘deep learning’ have suddenly become a necessity for many manufacturers and service providers when presenting their offerings, increasingly so as the business world struggles to overcome a growing number of challenges relating to the on-going pandemic. In truth, terms such as ‘artificial intelligence’, ‘machine learning’ and ‘deep learning’ are very vague and cover a multitude of capabilities. Often, even the experts and scientists who are driving developments in the technologies have differing definitions for them. The boundaries of what constitutes artifical intelligence have always been fluid, and continue to be so. Pinning it down to a hard and fast definition is simply not going to happen in the near future, and every time someone gets close to an all-encapsulating definition, the boundaries shift again. In the past, the adoption of AI and deep learning could afford to be slower. However, as challenges to the commercial sector globally continue to build, it is only right that innovators adopt their products, services and solutions to meet the needs of businesses and organisations around the world. The key to ensuring end users are able to realise the benefits on offer is not to highlight the use of AI and deep learning, because the added value of the technologies often will not be understood.

Artifical intelligence and deep learning have become buzzphrases in the smart system sector, with manufacturers rushing to make use of the terms in their marketing materials and product descriptions. However, the unanswered question is how much of a difference this makes to the customers seeking real-world solutions. Simply declaring AI as a selling point is akin to stating ‘digital’ or ‘data’ on a system and leaving it at that. It’s not a great message, because it tells those looking at it very little about the reason for considering the solution in the first place. AI doesn’t mean superior performance, smart design or even technological innovation. The use of AI technologies and principles will have a significantly positive impact on the smart systems market as a whole, as will deep learning deployments, but end users won’t immediately understand how AI and deep learning can help their organisations today. End users are looking for benefits and value. They’re looking to buy solutions to the problems their organisations face today, and they want to invest in systems that allow their businesses to operate in current climate, in ways which are more efficient and more flexible. It is the benefits that AI and deep learning deliver – anomaly detection, reporting of exceptions, compliance auditing and management, smart search, building management automation, trend predictions, advanced reporting, behaviour analysis, site management and a host of other value-added services – that they will buy, because these give a return on investment and help them face the challenges which currently need to be faced.

The use of AI technologies and principles will have a positive impact on the security systems market as a whole, as will deep learning deployments, but end users don’t buy AI and deep learning. 5


Milestone_000_Benchmark_apr15 10/07/2020 15:20 Page 1

CLOUD DEPLOYMENT

Increasing benefits through Cloud Deployment Service-based solutions remove the need for long-term contracts or up-front financial commitments. Initial investments are reduced, and on-going costs are predictable via a subscription fee. The user only pays for the processing and storage resources they are using, and expansions to capacity are available in minutes. Some specialised IT tasks are outsourced to the service provider, and the delivery of core IT services are more cost-effective thanks to economies of scale. While many of these benefits are common to several cloud-based services, it is worth considering some of the specific added value available from XProtect on AWS.

Adding value

Milestone has launched XProtect on AWS to offer a fully functional and scalable cloud-based VMS deployment. While the benefits of Software-as-aServices (SaaS) are well understood, what are the specific advantages of an XProtect on AWS deployment?

W

hen considering the benefits of a cloud-hosted service-based VMS provision, there are several benefits, both for the end user and the integrator, which immediately spring to mind. Such an approach allows solutions to be implemented and configured, quickly and easily, in any location, and the required IT resources can be added as required, without the delay of ordering, delivery and installation. Additionally, as needs change, the system can be dynamically scaled whenever required. Remote or temporary sites can be easily managed, and where necessary cloud services can be combined with on-premises systems, allowing legacy investments to be retained. Adding additional services is simplified, as are upgrades and expansions without a need to replace infrastructure.

6

XProtect on AWS is a pre-packaged VMS application which can be implemented from AWS Marketplace using the AWS cloud platform. Leveraging AWS cloud services to allow the deployment of XProtect with full features, it provides immediate access to processing and storage which can be dynamically scaled to meet changing needs. This simplifies planning and allows systems to be expanded as and when required. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 services from global data centres. With millions of customers—including the largest enterprises and government agencies— AWS is proven to lower costs, enable businesses to become more agile, and allow service providers to innovate faster. Global availability, reliable infrastructure and advanced services were reasons why Milestone Systems chose to work with AWS. XProtect is available from AWS Marketplace, an online software store that allows customers to immediately deploy software applications and services. XProtect on AWS Marketplace automates the operating system and VMS installation, launching a preconfigured VMS in just a few clicks. Two products will be available: XProtect Essential+, Milestone’s free XProtect product which includes a license for up to eight devices, and XProtect VMS BYOL, Milestone’s


Milestone_000_Benchmark_apr15 10/07/2020 15:21 Page 2

CLOUD DEPLOYMENT

XProtect solution which offers full feature compatibility with an XProtect on-premise system. This product requires a license which can be activated to run any version of XProtect (Express+, Professional+, Expert or Corporate). The product is deployed as a single server system but can be manually extended to match customer needs. XProtect uses AWS’ highly reliable infrastructure to reduce initial investment in hardware and provide unlimited access to IT resources, immediate system scaling and deployment of multi-site systems. The secure cloud environment uses secure subnets, gateways and security groups to make the solution highly reliable. The cloud technologies make it ideal for organisations with extensive multi-site operations requiring a high level of flexibility and availability.

Accessing the VMS XProtect on AWS is run on AWS infrastructure and deployed directly from AWS Marketplace. To be able to buy and start using the software and services, you must be an AWS subscriber. Once subscribed, you can quickly deploy XProtect with just a few clicks. XProtect on AWS is identical in terms of features and functions to XProtect deployed on-premise,

meaning XProtect on AWS has full feature compatibility. With each new XProtect version released, a new AMI Amazon Machine Image of the same version will be made available in AWS Marketplace. Milestone customers can reuse existing XProtect licenses when migrating to AWS. Thanks to AWS’ BYOL Bring Your Own License concept, customers with existing XProtect installations can reuse their existing licenses when moving to a complete or partial AWS cloud deployment. Any existing XProtect license can be used to activate XProtect on AWS. Milestone’s service and support program, Care, applies to XProtect deployments on AWS in the same way as for traditional installations, and is transferable from onpremise to the cloud. This means Care agreements remain valid when a customer migrates to an AWS deployment. The first XProtect on AWS product will use XProtect 2020 R2, Milestone’s product version released in June 2020. Milestone will add the most recent product version of XProtect to AWS Marketplace on the General Availability date of its on-premise XProtect release. XProtect on AWS cloud environment is similar to a virtualised environment, so video analytics applications and other third-party partner solutions can be deployed.

49 7


Milestone_000_Benchmark_apr15 10/07/2020 15:21 Page 3

CLOUD DEPLOYMENT

The cost of cloud Deploying a VMS is dependent on traditional size parameters such as number of cameras, retention time, stream resolution, etc., as well as on the end-customer’s usage in terms of video viewing. AWS prices vary from region to region, and the type of payment plan the customer selects. AWS operates list prices as well as negotiated prices for larger accounts. The cost of running XProtect on an AWS cloud service infrastructure depends on a wide range of factors including the size of an installation, video retention time, usage patterns, use of reserved resources, and selected payment terms, plus possible negotiated conditions. Looking at this cost from a total cost of ownership perspective also depends on which costs are factored into the calculation. A direct comparison between physical servers and a corresponding cloud-based instance would most likely show a cost advantage to the physical server implementation. However, when adding all additional cost parameters, the outcome becomes much more nuanced. Factors include IT operations, speed of deployment and expansion, power and cooling, physical space for infrastructure, maintenance and repairs,

8

impact and cost of service outages, cost of over-specification to allow for future scalability, logistics, etc.. The native capability of the XProtect VMS software to utilise GPUs for heavy video processing means the AWS computer infrastructure can be optimised, which again saves costs. When deploying XProtect on AWS it is also possible to optimise data egress costs and operator workstation hardware using AWS AppStream. Milestone will publish an AWS price calculator covering typical AWS services that are used when deploying XProtect on AWS. This calculator will be available in AWS Marketplace as well as in the partner sales tool kit.

Reliability is key AWS cloud environment is managed and operated by skilled IT professionals, and AWS customers benefit from AWS data centres and a network architected to protect their information, identities and applications. With AWS, customers can improve the ability to meet core security and compliance requirements, such as data locality, protection and confidentiality with comprehensive services and features.


Milestone_000_Benchmark_apr15 10/07/2020 15:22 Page 4

CLOUD DEPLOYMENT

All AWS Services are GDPR ready and AWS is committed to offering services and resources to customers to help them comply with GDPR requirements that may apply to their activities.

Supporting deployment Milestone will create a training and eLearning program related to the AWS offering, and this will be available to channel partners and endcustomers, free of charge. The training modules are designed to build cloud and AWS competence. The following training courses will be available: Exploring Milestone Cloud Solutions; Communicating AWS values; Designing XProtect on AWS; Deploying XProtect on AWS. To be able to professionally propose, design, deploy and support XProtect VMS solutions, it is recommended that channel partners study suggested AWS training paths for different personnel categories on the AWS website. As a part of the introduction of XProtect on AWS, Milestone is developing a set of set of tutorial and educational resources, beyond

the normal sales and promotional materials. These include solution white papers, eLearning courses covering cloud concepts and how to sell XProtect on AWS, eLearning courses for AWS cloud design and deployment, guides for AWS cloud deployment, adaptations of XProtect hardening guides, solution sheets and sales briefs. In addition, channel partners should build their general competence on AWS cloud technology. Regarding system design, one of the major advantages of running XProtect on AWS is the ability to dynamically scale the compute and storage resources. This means the system design and dimensioning becomes less critical, as the underlying platform can be resized when and as needed. Milestone will provide technical support to system integrators (and end customers when having Care Premium or Care Elite services) on the XProtect VMS on AWS, in the same way as for traditional deployments. AWS maintains the cloud service infrastructure, while the end customer is responsible for maintaining the operating system and XProtect VMS software. 9


Optex_000_Benchmark_apr15 10/07/2020 15:51 Page 1

VISUAL VERIFICATION

Enhanced Intelligence with Visual Verification changed. At the time, audio confirmation was prone to issues as operators struggled to differentiate between innocuous sounds and noises created by intruders, and video verification was cost-prohibitive and resulted in alarm systems not being financially viable. Sequential confirmation was not expensive, easy to achieve, and quick to implement. Since then, costs associated with video have fallen, and communications have moved from the limitations of PSTN to networks and IPenabled devices. In short, the benefits of visual verification are affordable and easier to implement. OPTEX has launched its Intelligent Visual Monitoring service which even further simplifies the process of adding video verification, whilst delivering significant benefits for the integrator, the end user and the ARC.

Intelligent Visual Monitoring

When considering the deployment of intruder detection systems, often the capabilities of current technology are overlooked, with an attitude which tends to oversimplify what the systems can offer. However, the introduction of video verification not only enhances the available protection, but elevates what were previously ‘reactive’ systems to ones which are proactive.

I

ntruder detection systems are, on the surface, fairly simple solutions. If motion is sensed in an area which should be secure, an alarm condition is generated. Because of regulations, in a graded system, the detection of motion needs to be confirmed, and the usual way of doing this is to require a sequential verification. This means motion must occur in two zones, thus delivering a sequentially confirmed alarm. Of course, the weakness of this approach is that any sensed motion (whether from a genuine intrusion or a nuisance alarm trigger) is treated equally. Sequential confirmation was introduced many years ago when the ACPO policy

10

The Intelligent Visual Monitoring service makes use of a hardware bridge which connects existing intruder alarm systems with legacy or new cameras. When an OPTEX sensor is triggered, the alarm signal is sent to the ARC. The Bridge also collects video data from a linked camera, and this is sent to the cloud-based server via a secure network connection. When the ARC operator responds to the alarm, the Visual Monitoring Portal opens, displaying the footage from the alarm event. The operator can also view the live video feed to assess the status in real-time. If further verification is required (and based upon agreements with the end user), the ARC operator can send an SMS message to an authorised person or keyholder, using the cloud service. The text will include a URL which allows them to remotely view the footage on a mobile device. They can also select one of two options: DISPATCH or DISREGARD. The ARC operator receives a realtime notification when they have viewed the video and responded.

Benefits for the Integrator OPTEX Intelligent Visual Monitoring allows


Optex_000_Benchmark_apr15 10/07/2020 15:51 Page 2

VISUAL VERIFICATION

integrators to deliver a more secure and flexible solution to their customers, offering an expanded service which enables them to filter nuisance activations. Because much of the service is cloud-based, the installation is simple. The required hardware is the OPTEX Visual Verification Bridge which links legacy or new cameras to the alarm panel. Set up and connection to any professional intruder alarm control panel is easy and intuitive. It allows linking of indoor and outdoor intrusion sensors, door contacts and panic buttons with ONVIF-compliant cameras or DVRs. Once this is done, it is straightforward to ‘map’ the alarm zones to associated cameras. Once installed, the Bridge is registered to the ARC and connected to the Intelligent Visual Monitoring portal. The ARC provides the integrator with a dedicated account on the portal, allowing the creation of customer accounts and registration of additional Bridge devices. The web-based portal delivers a platform to manage all connected systems. Interactive elements allow customisation of site details with map views showing the location of cameras, sensors and detection fields. All devices can be managed remotely. Alarm zones and sensors are supported by real-time

health monitoring, creating reports which show the system is operating correctly.

Benefits for End Users For end users, the OPTEX Intelligent Visual Monitoring solution ensures that all alarm activations can be verified, either by the ARC, the user themselves, or both parties. Where an alarm system is graded to receive a URN (unique reference number, essential for the provision of police first response), the system ensures that sites do not have first response cover removed due to false activations. As an example, one of the most significant causes of false activations is human error. A member of staff locking up at night remembers they’ve left something in the staff room, or spots they haven’t turned an appliance off. Rather than allow the system to set, and then unset it to carry out the task, they try to beat the time-out function. While this isn’t what would typically be considered a false alarm, in that the system detected human motion, the police do count it as such. Another issue is the incorrect use of panic buttons. If staff at a business or organisation are not au fait with ACPO regulations, they might not understand when the use of a panic alarm might be classed as a false alarm. For example, using the PA to summon police

49 11


Optex_000_Benchmark_apr15 10/07/2020 15:52 Page 3

VISUAL VERIFICATION

during an incident which is not an act of aggression or threatening towards the user can be ruled as a false alarm. By implementing Intelligent Visual Monitoring, such instances can be disregarded when the video is viewed by the end user. The alarm event is not passed to the police, and a ‘strike’ against the system is not issued. As many insurance policies for businesses include a requirement for police first response, the return on investment of Intelligent Visual Monitoring can be measured in terms of discounted insurance premiums, continued cover, and the removal of a need to upgrade systems to be reinstated to first response cover. Where a business or organisation has multiple satellite sites, a user can manage activations at all sites because the Intelligent Visual Monitoring solution can be installed across multiple sites sharing the same network.

Benefits for the ARC At a time when professional security solutions are facing challenges from the world of IoT and consumer-centric technology, building in added-value is imperative when providing service-based solutions. As a growing number of end customers appreciate and value the power of video, so they are demanding it in a growing number of applications. Given the strong business case for video verification, it makes sense to ensure this capability is

12

available in a cost-effective and easy-to-use format. The OPTEX Intelligent Visual Monitoring is a simple a solution which delivers added value without compromising on security or system integrity. When an alarm zone is triggered, the ARC operator is alerted in a few seconds. The Intelligent Visual Monitoring portal presents both pre- and post-event video recordings, the live view of the zone in which the alarm has been triggered, and a site map showing the location of additional cameras, which can be used to view other parts of the site. Dependent upon the agreed procedure between the customer and the ARC, and the assessment of the alarm situation, the ARC operator can either pass the alarm to the police for action, or push the notification to an authorised key holder or emergency contact for them to verify the alarm and instruct the operator accordingly. All interactions are documented in an audit trail.

In summary Visual conformation offers a wide range of benefits, and the cloud-based element of the OPTEX Intelligent Visual Monitoring solution allows a greater degree of filtering when alarm incidents occur. Cost-effective and simple to implement, it changes intruder detection systems from being reactive to proactive, while also increasing long-term security for the user.


Project2_Layout 1 09/07/2020 14:48 Page 1

CCTV Integration

Lift Access Control

Visitor Management

Lighting Control

Car Parking Access Control

Movement monitoring

Compliance with business systems & government regs

Manage from a single interface

Fire System Integration

INTEGRATED SECURITY MANAGEMENT SYSTEM

T: +44 845 470 5000 |

E: ireurope@innerrange.co.uk

innerrange.co.uk


Cathexis_000_Benchmark_apr15 10/07/2020 15:18 Page 1

SMART VMS DEPLOYMENT

Reaping the Rewards of Smart VMS Deployment

As an increased number of end users demand additional benefits to boost the RoI (return on investment) from their VMS-based solutions, so it pays to design and build solutions based on video management tools which are flexible, scalable and regularly upgraded to ensure compatibility with the constant changes in today’s rapidly evolving technological landscape. CathexisVision is capable of meeting these needs and delivering on users’ expectations.

M

odern VMS solutions, such as CathexisVision, can provide a wide range of benefits for security applications. VMS has increasingly become the platform of choice when designing smart video surveillance solutions, and the flexibility and scalability on offer makes the technology a natural fit for sites with changing needs and a requirement to adapt to various threats and challenges. Much of the power of a VMS relies on the use of Rules: simple logical relationships which allow actions to be linked with incidents. For example, using CathexisVision, Rules can be created to automate certain actions based upon a range of criteria.

14

CathexisVision Rules are fully customisable and can be defined to include AI-enabled object recognition. For example, a Rule might be created to alert an operator and instigate real-time high resolution recording if a vehicle is detected on site between certain hours. While many other VMS systems also offer Rules-based actions, many will simply generate the action if any object the size of a vehicle is detected in the prescribed time zone. What sets CathexisVision apart is the object recognition. The VMS can differentiate between people, animals and vehicles, using artificial intelligence. This means that when the example Rule is triggered, the object will be a vehicle. This capability increases the accuracy of detections and actions, enhancing security and delivering a superior level of protection. If the VMS has been installed to achieve a high level of security, then this functionality adds value and enhances the RoI. However, when deploying a powerful tool such as CathexisVision, it pays to consider the wider opportunities presented by a smart VMS. Integration with other systems adds value, and additional benefits such as business intelligence and site management can also be realised. The flexible Rules features are not just for alarm events. Rules are similar to Macros, but without a need to learn archaic data strings to perform tasks. The CathexisVision Rules engine uses drop-down menus and simple buttons to establish criteria and resultant actions. In a CathexisVision system, data gathered from the VMS and a host of sub-systems can be used to allow the creation of Rules. The data can come from many sources: video and detections from security systems, real-time on-site personnel information from access control and time and attendance systems, triggers and reports from environmental sensing, outputs from process control systems, communications networks, status updates from power management, etc.. Data can also be collected from third party sources. Because of the way Rules are constructed, the available options will be limited by the edge devices connected to the system and the


Cathexis_000_Benchmark_apr15 10/07/2020 15:19 Page 2

SMART VMS DEPLOYMENT

data being collected. For example, a system with monitored doors will be able to include conditions in Rules based on whether doors are open or closed, but the option will not be available if the doors are not monitored. Rules can use AND and OR operations for added flexibility. For example, a site might receive regular deliveries on weekday mornings before the start of the working day. Lorries need to access a loading area for this purpose. A Rule could be created to manage this using AND Operations. If video analytics detects a large vehicle entering the site AND it is a weekday between 6am and 9am, the system should automatically open the Gate to the loading area. It could also send a push notification to a relevant member of staff so they can accept the delivery. However, if the lorry is detected AND it is not a weekday between 6am and 9am, the system will not open the Gate, instead activating a call point so the driver can talk to staff. An AND Operation allows a filter to be included which can either verify a condition or

trigger a specific action, based upon two or more status conditions occurring together or within a defined time period. With CathexisVision, Rules can be filtered using an AND condition based on whether the detected object is a person, an animal or a vehicle. OR Operations differ, in that only one of a list of criteria needs to occur in order for an action to be taken. Using the previous example, the gate to the loading area could be configured to automatically open if the time meets the prescribed criteria OR if a relevant member of staff is on-site. OR Operations would be more commonly used in the example application if there were a number of access routes, multiple permitted time zones, or diverse criteria relating to relevant personnel on site. The use of Rules in CathexisVision can be realised via a wide range of systems including VMS, access control systems, fire detection systems or other compatible devices. Rules can make use of a wide range of data sources such as detectors and sensors, video and video-based analytics, access transactions, system status reports, operator or visitor

49 15


Cathexis_000_Benchmark_apr15 10/07/2020 15:19 Page 3

SMART VMS DEPLOYMENT

actions, time and date, environmental conditions, power status, etc.. CathexisVision allows forward-thinking integrators and consultants to create bespoke value-added solutions for end users seeking an enhanced return on investment. As the functionality is built in to the VMS, many do so while also ensuring the systems are competitive in terms of total cost of ownership.

Ski Dubai One example of how the flexibility of CathexisVision can add value is the solution provided to Ski Dubai, located in the Mall of the Emirates in UAE. Ski Dubai is an indoor ski resort offering skiing, sledding and tobogganing, climb towers, rides, a penguin experience, restaurants and retail options. Temperatures are held at a constant -4°C. The requirement was for a fully integrated VMS system that would support a combination of nearly 300 cameras, with the capability to be upgraded to support more than 400 devices in the future. The user required support for IP-enabled and legacy analogue cameras. There was also a need for smart video analytics, extending to additionally offer advanced video search. To ensure continuity of service, failover protection was needed. Because the site required flexibility and scalability, other important features included central alarm management and the ability to integrate third party solutions. The management team at Ski Dubai had specific requirements, both for the short- and

the long-term goals for the solution. It wanted a cost-effective solution with improved functionality and the capacity to allow future integrations with third-party systems such as access control, fire detection and point-of-sale systems in retail spaces. Another requirement was centralised recording via multiple servers, including failover servers, monitoring by a central control room with operator management and multiple server video walls. It was also important the VMS was open platform as the site needed to support cameras which operate reliably in the cold environment. CathexisVision provided an extensive range of surveillance options, along with tools and features to meet the site’s security and infrastructure management requirements. The VMS seamlessly supported new and legacy devices at the application while delivering the capacity for the site to expand its solution, all while enjoying a more cost-effective licensing structure. Performance benefits included accurate high-speed suspect tracking using the CathexisVision Adjacent Camera Mapping feature. This enables system operators to easily follow suspects and persons of interest across multiple cameras at the click of a button. The Advanced Video Search feature enabled control room operators to quickly locate and review recorded footage, and the Snap Search tool was ideal for high activity areas as it uses thumbnail images to pinpoint the time of incidents. Finally, the Motion Search Feature is used to automatically find footage associated with motion in operatordefined areas. CathexisVision allows for third-party integrations, meeting the user’s need to add access control, fire detection and point-ofsale support in the future. To provide Ski Dubai’s management team with complete peace of mind, CathexisVision includes failover redundancy.

A smarter solution As demands for technology-based solutions which deliver added value grow, so the VMS sector is expanding in terms of features and functions. By providing added value, modern VMS like CathexisVision can offer high level security and business management benefits. CathexisVision’s integration capabilities, reliability, flexibility and longevity through continual upgrades have made it an ideal solution for varied environments, providing real value across business operations, as well as a tangible return on investment. 16


Project2_Layout 1 10/07/2020 15:15 Page 1

INTEGRATION Our detection systems form an essential part of a wider security ecosystem

Our range of integrated PIRs, infrared beams, LiDARs & ďŹ bre optic sensors

Intrusion detection is the cornerstone of event driven security systems. Our sensors provide reliable outdoor detection, not affected by variable lighting, which enhance the accuracy of the security system. Our wide range of intelligent IP sensors can be integrated with all major Video Management Systems to deliver enhanced security and a faster response.

For more information visit www.optex-europe.com/integrations INDOOR DETECTION | OUTDOOR DETECTION | TAILGATING DETECTION | PEOPLE COUNTING | ENTRANCE DETECTION

P41956-Optex-Integration-297x210-Jun20-v2.indd 1

18/06/2020 17:16


AI compliance_000_Benchmark_apr15 10/07/2020 17:49 Page 1

AI COMPLIANCE

The Role of AI in Compliance Monitoring

For modern businesses and organisations, compliance is a critical element of day-to-day operations. Whether user have to be compliant with health and safety directives, industry codes of practice, standards or simply internal operational policies, the issue of ensuring compliance takes up time and resources. For integrators and end users, the ability to implement enhanced compliance monitoring and management can be a significant benefit and adds to the return on investment.

I

n today’s increasingly regulated world, compliance is a significant issue for many businesses and organisations. While the exists a necessity to ensure legislation, codes of practice and regulations are adhered to, company policies and procedures are correctly applied and standards are met, the actual monitoring, recording and management of compliance issues can represent a drain on time and resources. As necessary as it is, compliance costs money, and with a growing emphasis on cost

18

efficiencies across the commercial and industrial sectors, anything that can reduce the amount of time and/or resources dealing with compliance issues should be welcomed by the vast majority of end users. For most businesses and organisations, there are two sides to compliance. The first is a case of ensuring the processes and procedures laid down for any given business – whether enshrined in legislation or regulations, or implemented by the company itself – ar adhered to. The second is to ensure that if an incident occurs, whether genuine or alleged, the business in question can provide evidence that it was fully compliant with any requirements and met its obligations with regard to duty of care, best practice and reasonable behaviour. As the world becomes ever more litigious, this latter concern is one many businesses are having to address, especially where they are welcoming members of the public onto their sites. As a single example, the cost of spurious claims for slips, trips and falls not only includes compensation which needs to be paid if a case goes against the company, but also covers costs for legal services, investigation, administration, etc..

The mechanics of compliance Compliance takes many forms, some prescribed by the relevant standards and directives. However, in the majority of cases the requirements of compliance hang upon the implementation of processes and procedures in specified circumstances. First, there is a need to ensure that some type of action is taken when an event or incident occurs. Second, there will be a need to notify specified people of the situation and report details about the event and subsequent actions taken. Finally, the user will need to record that the action has been implemented, usually along with details of the event. Compliance is often a key element of business procedures, as users will prescribe relevant actions to be taken for a range of alerts and events. In order to ensure the operators take the appropriate actions, a work-flow might be implemented which


AI compliance_000_Benchmark_apr15 10/07/2020 17:49 Page 2

AI COMPLIANCE

guides the operator through the processes, only allowing site status conditions to be cleared when the required actions have been taken. While compliance can be a critical business element, few end users are aware a smart system can support compliance-based functionality, such as action automation, compliance monitoring and management of procedures. The depth of flexibility available from many smart systems enables the creation of logicbased AND/OR rules which can be used to trigger actions or instigate automated procedures, either using connected equipment, other peripheral IoT edge devices or integrated systems and products from building management, IT, communications or process control systems. Advanced reporting can also be used to create audit trails, and vital data can be shared via mobile devices or a cloud connection.

Compliance options There are three ways in which a smart system can deliver benefits with regard to compliance. These are the automation of actions and triggers, the creation of a realtime audit trail, and delivery of notifications and reports to members of the management team. Depending upon the needs of the business or organisation, smart systems can deliver any or all of these three benefits. Where rulesbased event management is supported, additional criteria can be added to ensure

filtering makes the delivery of actions more specific to changing demands. Compliance often demands that specified actions are carried out or notifications delivered when certain events or incidents take place. On occasions these actions need to be instigated by a member of the relevant department, meaning an operator or member of the company’s personnel must follow a workflow to ensure compliance is met. Not only does this mean staff must be trained about all aspects of the workflow, including any deviations which might occur based upon site status, but it also places pressure on operators and staff when an event occurs. Usually it is during an event or incident that staff are under the greatest amount of pressure and therefore more liable to forget a step which must be taken or make mistakes. For many businesses and organisations, the real question is whether they’d prefer for system operators and other staff to focus on dealing with an incident or meeting compliance requirements. As important as compliance is, often the biggest priority is to address the situation. However, a smart system can allow the operator to focus on the incident by managing a number of the workflow steps. For example, if a vehicle enters a prohibited area, the workflow might be that barriers or bollards in the location are closed to prevent further ingress, an audio warning is played and/or visible warnings are displayed, a notification is sent to the management team, details of the vehicle and its registration

49 19


AI compliance_000_Benchmark_apr15 10/07/2020 17:50 Page 3

AI COMPLIANCE

number are checked against a white list, all details of the incident are accurately recorded and the operator assesses what actions the driver takes to decide how to progress incident management. It’s a lot to do simultaneously whilst also managing the situation. Using logic-based rules, the smart system can automate many of the steps, automatically closing barriers or bollards when a vehicle is detected in a prohibited area. This can also alleviate issues with an operator having to remember which zone the vehicle is in. Staff on larger sites or who are unfamiliar with a location might be forced to secure several locations to ensure the right one is locked down, whereas a smart system can target the area in which the incident has occurred. This makes actions faster and more accurate. The system can also ensure appropriate audio messages of visual displays are used, again only in the relevant area. If the incident is considered high risk, the system could also change the status of other locations considered vulnerable, allowing them to better prepared should the situation escalate. 20

The actions can be carried out as soon as a vehicle is detected, and using ANPR software its details can be checked against a white list. If it has permission to be in a prohibited area, the incident can be cleared within seconds. Actions could involve evacuating an area, playing a prerecorded message, switching lighting, opening or closing barriers, etc.. However, they might also be simpler building management tasks such as shutting down power on a floor or department, switching HVAC, directing a visitor to an appropriate parking space, displaying health and safety information, etc.. Because the processes are automated, the end user can be assured they will always take place when required. Details of events and incidents are recorded, with a high amount of detail, in realtime. The system’s operational log will include information about the event and subsequent actions taken. This will include time, date, information about the event, the identification of the user who interacted with the system and the actions they specifically took if the processes are not automated. The log will also include information about alerts which were cleared by personnel. If it becomes necessary to prove compliance, an authorised user can download the log, which is time-date stamped and often protected against changes. Smart solutions can also offer flexibility when it comes to delivering notifications. Any professional system will support mobile devices and, increasingly, cloud connections. This makes it simpler for notifications to be sent to multiple users. The recipients can be selected for alerts, ensuring that those in the relevant departments seeking compliance support can receive information only when it is relevant to their tasks. Additionally, cloud-based services allow data to be searched and shared without users having to interact with the core system. This also makes it a quick and simple task to generate customisable reports. Authorised managers can access the data and create their own reports, freeing up operators to continue with site management tasks.

In summary When it comes to compliance matters, AIenabled smart systems offer comprehensive solutions to businesses and organisations. The AI technology allows the system to ‘learn’ about incidents and events which have compliance requirements, and allow operators to focus on incident management, creating a more efficient and effective working environment.


Hanwha_000_Benchmark_apr15 10/07/2020 16:41 Page 2

TECHNOLOGY

O

ne of the main considerations when looking at operations in a COVID-19 Secure environment is social distancing. For some sites where maintaining the two metre distancing is not realistic, there is the potential to reduce the distance to one metre when other measures are taken. For businesses, the challenge is to maintain an environment which protects staff, customers, visitors and contractors, but which also allows businesses to operate in a profitable and sustainable way. Additionally, businesses and organisations need to be seen to be acting responsibly and in accordance with the guidelines, and need to maintain an audit trail to prove compliance should any claims be made. Because various industry sectors have differing needs and face varied threats and risks, the Government has issued guidance aimed at commercial vertical markets. This therefore demands that any technology-based solutions are both flexible and scalable, allowing users to respond as the requirements change. Even within defined industries, sites will differ due to layout and physical restrictions, size, number of entrances and exits, etc.. For integrators, this means there isn’t a simple approach which can be deployed on a site-bysite basis. Every application needs to be bespoke, and as such this highlights the need for solutions which are customisable and offer the ability to adapt and change as required. Social Distancing Key to most businesses reopening is the implementation of social distancing policies. Often this requires businesses and orgnisations to control occupancy to ensure those inside a building or area are able to maintain distancing with ease. Hanwha Techwin offers a licence-free Occupancy Monitoring application designed to offer retailers, places of worship and museums, as well as leisure facilities, pubs, clubs and restaurants, with accurate data on the number of customers in their premises at any given time. Compatible with Wisenet P-Series AI cameras, the edge-based Occupancy Monitoring application simultaneously counts the number of people entering or leaving a building. When the maximum permitted number of people has been reached, the application generates alarm outputs to control automatic doors or a traffic beacon, as well as displaying Wait or Enter messages which can be displayed on a local monitor. The Occupancy Monitoring application can aggregate and process data from multiple

Operating safely in the COVID-19 era In recent weeks, an increasing number of businesses and organisations have been allowed to return to some degree of operational status, albeit with a need to manage certain aspects of the way in which they work. While many people refer to the ‘new normal’ as a significant challenge, there are ways in which current technology can assist. cameras, making it ideal for buildings with multiple entrances and exits. As a serverless solution, integrators do not have to spend time configuring server-side software. This also reduces the capital costs of a project as the end-user does not need to invest in server hardware or on-going maintenance. Support for Deep Learning AI is built into the cameras, so the Occupancy Monitoring application can accurately count people, even when a camera is wall mounted. Unlike people counting solutions which use conventional video analytics, the camera does not have to be mounted on a ceiling to provide an overhead field of view. This allows it to be simultaneously used for security purposes and people counting, and users are also able to take advantage of a host of additional video analytics applications which can be run onboard the device. Wisenet P Series AI cameras will continue to deliver benefits beyond immediate

For more information, visit: www.hanwha-security.eu 49 21


Hanwha_000_Benchmark_apr15 10/07/2020 16:42 Page 3

TECHNOLOGY

requirements to support compliance with regulations during COVID-19. In addition to being used to detect and monitor criminal activity, the cameras can be redeployed to capture valuable business intelligence and help companies improve productivity. Retailers can analyse the impact of marketing activities on footfall and manage the peaks and troughs of customer flow at checkouts. The cameras are supported by Wisenet Retail Insight, a business intelligence solution which utilises people counting, heat mapping and queue management applications to display statistical analytics on a centralised dashboard, along with other practical information such as weather reports. With the help of AI algorithms, Retail Insight is also able to display an estimated age and gender of store visitors.

Mask Detection

For more information, visit: www.hanwha-security.eu 22

In some applications, the two metre social distancing rules can be relaxed if additional measures are taken, such as visitors wearing face covering. To link with the launch of the Occupancy Monitoring application, Hanwha Techwin has also introduced a Face Mask Detection application which further helps businesses operating in a COVID-19 affected world. Wearing a mask is believed to prevent the spread of COVID-19 and has already been adopted as a safety measure in many workplaces. The availability of the Face Mask Detection application follows the World Health Organisation (WHO) recommending the use of face masks wherever social

distancing is difficult. The UK government is also making it compulsory to wear a face covering when visiting or working within healthcare facilities and when using public transport. The UK is not alone in introducing regulations to ensure the wearing of face coverings. In Germany it is necessary to do so when on public transport and shopping, and in Spain anyone over the age of six must wear a mask in indoor public spaces and outdoors when it is not easy to keep more than two metres apart. The Face Mask Detection application was developed by Hanwha Techwin technology partner a2 Technology, and runs on openplatform Wisenet X Series cameras. It uses video analytics to detect if a person entering an area is not wearing a mask. This will trigger the playing of a customisable audio message. The audio message is generated via an audio support feature built into Wisenet X cameras, negating the need for a PC or a separate audio storage device to be installed. A short cable is all that is required to connect a speaker to the camera. An alarm output can also be used to turn on a device such as a warning beacon. The application, which simultaneously detects and analyses up to four people, has a detection range of up to five metres. Detection performance is not affected by people wearing glasses, hats or scarfs. It is also able to detect if a mask is not being correctly worn. A digital zoom function, which is designed to be used with fixed lens cameras, assists in the configuration of the application so it can focus on a specific region of a camera’s field of view if it is considered to be too wide. The Face Mask Detection application can be ordered pre-loaded on selected Wisenet X models as an out-of-the-box solution. The Wisenet X Series cameras are equipped with SD/SDHC/SDXC memory slots, enabling images associated with incidents of people not wearing masks or wearing them incorrectly, to be stored locally. There is also the option for the images to be uploaded to an FTP server. A web-based interface enables users to receive alerts via a desktop PC. The application has also been integrated with the Wisenet WAVE 4.0 VMS platform which, with its ‘Layout-as-an-Action’ feature, enables a predefined screen layout to be automatically opened when an event occurs. This makes it easier for operators to verify there has been an infringement of mask wearing rules.


Audio Detection_000_Benchmark_apr15 10/07/2020 18:16 Page 2

AUDIO DETECTION

T

he use of audio detection in video surveillance solutions has always created a fair degree of controversy. While many people are willing to be subjected to videobased surveillance as a part of creating secure and safe environments, any mention of audio surveillance immediately instigates debates about privacy. People have more liberal attitudes to being ‘watched’ than ‘listened to’. This is based upon the thinking that if you are behaving within the law, you have nothing to fear, but ‘eavesdropping’ is perceived as being a negative approach and an invasion of personal rights. In any society that values free speech, the ability to speak without fear of reprimand resonates highly with data subjects. As such, while audio offers a lot in terms of situational awareness and qualifying what might be inconclusive surveillance, its value is rarely realised in security systems used for surveillance and/or monitoring. However, audio-based functionality does not solely consist of speech capture and review, and it is non-speech implementations of audio technology that are increasingly useful in a wide range of smart applications. Often, debate about the rights of data subjects to enjoy free speech is something of a red herring, as in many applications it is not speech which is being detected. What the system monitors are certain sounds which are exceptions to ambient background noise, and these are then used as a trigger. Whether the exception is created based upon volume or sound type depends very much upon the application and the exceptions being detected. Audio, as a term, has numerous connotations with regard to features and functions in video surveillance. It is predominantly associated with verbal communication. For example, the term ‘two-way audio’ is generally understood to indicate a device or system component which allows verbal communication between a person close to an edge device and an operator in a control room or administrator at the ‘centre’ of the system. Acceptable uses of two-way audio include help-points, customer support, intercom services, communications with personnel, verbal warnings with regard to security or safety, etc.. However, as soon as the functionality is used to ‘listen in’, it becomes a taboo subject. Via the implementation of intelligent video analytics in recent years, the boundaries of system performance have been significantly expanded, allowing many of the benefits of video to be fully exploited by those seeking an advanced level of protection. The power offered

Audio Detection and Sound Classification

by a well designed and correctly implemented video system using IVA will often be unsurpassed by most other technologies. Audio also has a role play in such solutions when deployed as a trigger element.

Detection and Classification Audio detection and the classification of sounds have become realistic and affordable options in surveillance applications. The technology has been driven by advances in specific audio-based analytics algorithms, coupled with the shift to GPU-based hardware. As a result, a more proactive approach to the use of audio data as a trigger event is possible. Systems can initiate actions, events and alerts based upon a wide range of sounds. Triggers can be caused by ‘exceptional’ volume levels or by certain types of sounds. In the first instance, audio detection generally senses changes in typical ambient sound levels, such as sudden increases in volume. These can work well within certain environments. For example, an office which handles customers or clients may generally have a low level of ambient noise. If a customer starts shouting or screaming, the volume spikes and audio detection will identify this. If basic audio detection only uses volume levels as the basis for judging exceptions, then a wide range of other sounds – laughter, calling

Audio can play a role in ensuring events and incidents are automatically detected . While some audio detection options have specialist applications, such as gun shot detection, others enable sounds to be used as full or partial triggers for alarms and automation.

49 23


Audio Detection_000_Benchmark_apr15 10/07/2020 18:16 Page 3

AUDIO DETECTION

after a customer who may have left an item at the counter, staff issuing general instructions to a crowd, a passing vehicle backfiring – could also trigger an alert or action. The issue with basic audio detection is that it is monitoring for defined parameters across a wide range of sounds. A shout, a loud laugh, a dog’s bark, a window being broken or an item being dropped can all be seen as exceptions, because there is a chance the resulting sound will go beyond the established threshold. Volume-based systems are simply looking for a spike in sound intensity rather than a specific type of noise. In the case of sound classification, a more complex and accurate layer of analytics is added. It is still possible to trigger an event following unexpected noises and volume increases, but these can be filtered by the type of sound. By recognising specific classifications of sound to generate triggers, the system will be able to differentiate between different types of sound.

Analysing audio Audio analytics deploying basic volume-based audio detection will be somewhat limited. This approach is best suited to closed sites or locations where exceptional sounds are unlikely to be confused with innocuous noises. In such cases, unless filters can be applied, it must be accepted that a window being broken, a gun shot or a scream may all be treated in the same way as thunder, a vehicle with a faulty exhaust, an emergency services vehicle with siren sounding, etc.. Audio analysis algorithms have improved in recent years (due in no small part to the greater use of GPUs), and today sound classification makes audio detection a worthwhile consideration. Detected sounds need to match a range of criteria before triggering an action or alarm: these might include (but will not be limited to) sound type, frequency or multiple frequencies, volume, duration and characteristics. In some applications, it might also be appropriate to include key word recognition and behavioural analysis to spot high risk exceptions. Whether such an approach is acceptable or not will ultimately depend on the operational requirements of the system and the risk being protected against. If the role of the analytics is to alert an operator or security personnel to a high risk event such as threat being made at an airport, it may be acceptable. However, if it used in the workplace to trigger an action when a member of staff complains about their employer, the system may be violating rights with regard to privacy. 24

Where sound classification can make a significant difference is with regard to filtering out false activations. For example, in a closed building at night or during weekends, sounds such as those created by the general building fabric will be ignored. With sound classification, breaking glass can specifically be identified as a trigger that should warrant further investigation. If the security team has an on-site presence, such alerts could be sent to an operator or to a patrol via a handheld device. As with any detection technology, if the rate of nuisance alarms is high, the effectiveness of the system may suffer as events will be ignored. Therefore, sound classification becomes more important to ensure an effective solution. If a more intelligent approach is required, the ability to filter and identify whether an alert is created by breaking glass, a gun shot, a crying baby, an impact, aggressive behaviour, fire or smoke alarms, keywords or machinery malfunctioning allows audio analytics to automate actions both for security and business management purposes.

The right delivery There are a variety of ways to implement audio analytics. Many camera manufacturers are utilising spare processing power in devices to add audio detection or audio classification analytics. Where a more specialised approach is required, many of the ‘open platform’ cameras and encoders allow third party Apps to run, offering dedicated audio analytics. These provide specific audio analytics options. The app-based approach reduces costs, as often there is not a requirement for a full suite of audio sensors. App-based analytics permit a ‘mix and match’ approach to maximise the potential from significant and powerful detection options. Where site-wide sound classification is required, the best approach is to deploy a dedicated server running multiple channels of analytics software. This allows audio analytics to operate on an optimised platform, but does increase the capital investment for the end user. Increasingly, VMS providers are also working with providers of audio analytics. This means audio detection options can be added and managed directly from the VMS GUI, and processing can be allocated to specific cameras or groups of devices. Whichever route is taken, professional audio analytics can significantly enhance situational awareness.


eNewsBM_000_Benchmark_feb15 09/07/2020 14:54 Page 1

Benchmark

TECHNOLOGICAL INNOVATION & SMART SOLUTIONS

Follow Benchmark eNews and Social Channels Benchmark is the smart solutions sector’s only magazine that targets system integrators and end users who are implementing bespoke and innovative solutions. Written to help those who are designing, specifying, installing and using bestof-breed smart systems, Benchmark helps its readership by seeking out the most flexible and effective smart solutions.

Every week Benchmark sends registered readers e-mail-based content including new independent technology assessments, informative articles, buying guides, news and technical bulletins to ensure you are kept up to date. Registration to receive Benchmark’s E-News service is free-of-charge and ensures you stay ahead of the curve and can access the latest information. Because Benchmark generates all of the editorial content, you can access information not available elsewhere.

Visit www.benchmarkmagazine.com today and sign up


iot building aug20_000_Benchmark_apr15 10/07/2020 17:55 Page 1

INTERNET OF THINGS

IoT and its role in Building Management embedded with software and sensors to Any technology only really becomes adopted into exchange data over the Internet’. It is a pretty mainstream use when a credible business use-case broad vision, and not one that’s helpful when trying to pin down how IoT can be defined in a is made for it. The often discussed Internet of business application. Things (IoT) is often paid lip-service, but not enough Because the term IoT is bandied about by a whole range of manufacturers and service is being done to deliver credible implementations providers, many end users have become which deliver business efficiencies. Too often, this is convinced that creating credible and robust IoT systems is easily achievable. They are because the core benefits of the approach are seeking a range of intelligent objects, all communicating and working together to overlooked. IoT is less about connecting disparate deliver a host of business efficiencies, but is devices and more about forging creative solutions that practical given today’s technological landscape? which make businesses and organisations more efficient in their day-to-day operations. Not a singular system

A

doption of systems based upon the Internet of Things has spread across a wide range of businesses and organisations, and just as there are a variety of system types and implementations, there are also a whole range of opinions concerning the impact IoT will have on future system design. IoT is a cumbersome system designation, as it covers a vast number of technologies. Data capture devices such as cameras and door readers are part of the IoT, as are cars which report performance status and fridges which alert users when they’re running low on certain products. App-controlled appliance switches are every bit as much a part of the IoT ecosystem as motion detectors which create notifications for a security team, or track monitoring systems which alert train operators if a level crossing is blocked. It’s for this very reason that a growing number of integrators shy away from references to IoT systems. The general public are buying IoT devices on the High Street and from internet sales giants, and therefore at times the typical reaction to the term is to imagine consumer goods and gimmicky devices. Like many technology trends, IoT is one that seems to be mentioned far more often than it’s ever explained. When it is, the definition is usually vague. One such definition describes IoT as: ‘implementing physical objects 26

The first task when considering IoT implementations is to realise that any business or organisation is unlikely to have one single all-purpose IoT system. No one with any sense is asking for such a solution, nor would one make sense. Businesses and organisations will have a core function: the operation which makes it money. This might be retail, logistics, financial management, transportation, manufacturing or a whole host of other trades and functions. If the core function fails, the company goes out of business. Most commercial entities or public service operations will build an IoT implementation specifically focused on their core functions. The system will be created and managed by experts in the given field, and the system will invariably be ring-fenced and include redundancy to ensure it is robust and resilient. Businesses and organisations also have additional functions which invariably need to be performed to keep the place of business operational. These peripherals include management of lighting, heating, energy, access control, security, health and safety, asset management, parking control, system monitoring, communications, etc.. Again, an IoT implementation makes sense as it can add efficiencies and streamline these non-core functions. In short, an IoT implementation will be created for building and site management.


iot building aug20_000_Benchmark_apr15 10/07/2020 17:56 Page 2

INTERNET OF THINGS

This building management system will operate independently of other IoT systems managing core functions, plus other sitespecific IoT deployments for other tasks. Many manufacturers and service providers like to herald IoT as a single system that does all things. Often, by digging deeper into the claims, what you find is a large selection of random internet-connected devices on offer with little consideration of how or why an end user would gain benefits from them.

Connectivity and sharing A thing connected to the Internet is not the same as the Internet of Things. Internetconnected devices typically offer one benefit: the ability to allow remote control and/or connection. The difference between this and an IoT implementation is like night and day. In IoT systems, a range of devices communicate, share data, and enable each other to take actions based upon a range of criteria. To achieve this, a common language is required. The connected devices need to be able to communicate something meaningful to each other, or the situation is no different to what exists with siloed systems. Most businesses have a plethora of legacy devices connected to the internet discretely, with a multitude of confusing protocols preventing meaningful and beneficial connections being made. However, to realise the added value IoT offers, it’s not enough to simply ensure the various devices have a common language. They also need to have a common purpose in order to be effective.

As an example, a number of IoT devices could communicate using a common language, but unless the data shared through the connections has validity, the IoT implementation makes no sense. Monitoring the temperature of freezers in a warehouse is a good example of how IoT can add efficiencies for a food distribution business. If freezers fail while the facility is closed, the losses to the business – both financially and in terms of continuity of supply – would be significant. However, by linking temperature sensors, secure communications, alarm data reporting and other elements of the IoT system, a solution can be created which simplifies the necessary actions. When an increase in temperature is detected, the first step could be to send a push notification to a manager. This might include a snapshot so they can ascertain whether or not the freezer has been left open, for example. If this is not the case and there is a fault, a message can then be sent to an engineer. They could also be sent a specially created temporary access code to allow them to enter the facility. Such a scenario makes sense, because the various IoT devices share a common purpose. However, if the temperature sensor shares its data with a device which cannot action the necessary steps to deliver a resolution to the problem, it offers no value to the end user. A common language between devices is necessary, but so is a common purpose. This is why dedicated IoT implementations to handle building and asset management are vital. 49 27


iot building aug20_000_Benchmark_apr15 10/07/2020 17:56 Page 3

INTERNET OF THINGS

the door’. The access control software could compare a database image of the user with the one captured by the camera.

Defining building management

The ability for devices to communicate is not what will drive the adoption of IoT implementations; unless a real and genuine benefit is created for the end user, designing a connected system is little more than folly. By linking devices with a common purpose, it becomes simple to create added value. If a sensor on a door communicates with a surveillance camera to report it has been opened, the camera could then automatically position itself to capture video of the door. The interaction would be more beneficial if combined with additional sources of information. By adding information from an access control system, the IoT implementation is able to make more sense of the situation. The message changes from the fact a door has been opened to: ‘John Smith has just opened

28

So, what should be included in a building management-based IoT implementation? At it’s core, such a system would be primarily made up of sensors and controllers, but it is important to think of sensors in the broadest application of the word. Under that category could be cameras, access control points, pressure and vibration sensors, thermal and temperature sensors, audio, motion detectors and any other item which can provide accurate real-time site status information. Each connected device is relatively simple, and performs a task either related to capturing data or controlling other parts of the system. It encompasses the driving principle behind the IoT, in that specialist devices are able to deliver additional capabilities as a result of connectivity and data sharing with other specialist devices. Alongside the connected devices, there is also a need for a management layer made up of software which handles the data received from and transmitted to the edge devices. With the high levels of flexibility, customisation and logical switching and control of edges devices, modern VMS solutions are ideal for the role as a central software element. As the breadth of supported devices incorporates a growing number of IoT elements and sensors, so the appeal of such solutions becomes obvious. Because they were also designed for critical operations, the reliability of such software options ensures continuity, even in hostile conditions. It is worth considering a typical IoT site management scenario, such as controlling traffic in a logistics business. A site would need to ensure vehicles were directed to empty loading bays, and all traffic movements complied with health and safety directives. The site would deploy cameras to monitor the routes in, out and around the site. These cameras would provide real-time data ensuring management knew which loading bays were vacant, how many vehicles were waiting, where any bottlenecks were occurring, etc.. The system could provide realtime notifications as and when vehicles were waiting and suitable bays were vacant. If vehicles were parked in a dedicated waiting area, the barriers could automatically open when a loading bay was available, and any instructions could be displayed for drivers on a monitor.


iot building aug20_000_Benchmark_apr15 10/07/2020 17:57 Page 4

INTERNET OF THINGS

If an incident occurs, such an accident or a delay which exceeded a prescribed time window, the relevant video would automatically be forwarded to the depot management. Equally, this could be used to detect vehicles parked in restricted areas, vehicles travelling in the wrong direction or even people walking in areas where vehicle movements are occurring. Accurate status reports could be delivered to management teams, allowing them to monitor personnel levels, ensuring delays were minimised. It would also be possible to switch off power and lighting on loading bays which are not in use, or to activate security monitoring when required. An important element of such IoT implementations is the way that the devices are able to be used in an ad hoc way, as they are needed. Proximity to other devices, or simple requests from other devices for information, mean they are brought into the system when the data they can supply is of optimum use. Until it is, there is no need to share information. This highlights an additional element when planning an IoT system for building management. It is not only important that the various devices can communicate using a common language and are sharing data which is relevant to a common purpose, but there is a need to ensure the data used is relevant to a specific task at any given moment in time. In short, when confronted with a situation, the central management software should be able to request appropriate data. This is easily achieved with VMS platforms, because of the way they have been designed. It’s worth remembering that building management IoT deployments can effectively exist as a closed system. Because the solution will impact on issues such as security, safety, personal data management, etc., the devices will not be connected to the wider internet. This increases resilience against cybersecurity attacks, and ensures site management remains in the hands of specialist departments.

In the building management IoT, detection of a person in a secure space outside of working hours, without the access control system reporting the presence of an employee, would activate an alarm. In a business IoT implementation, this wouldn’t be of concern, unless it was flagged as an issue relating to opening hours. During normal business hours, cameras might measure customer footfall, register dwell events or monitor stock levels and feed this information to business managers, but out of hours the purpose changes to security as a part of a building management implementation. With increasing use of artificial intelligence, systems could be taught to improve their performance on an on-going basis. This will be further enhanced by the rapid increase in the processing power of edge devices. At present, much of the data transferred between devices is binary – on/off, yes/no for a given value – but increasingly this will become smart metadata, and then rich or intelligent metadata. Decisions will be made faster as devices are able to provide only the most relevant and crucial information for a given scenario, filtering out other data but archiving it for other purposes.

In summary For many end users and integrators, the Internet of Things is both a significant opportunity to create business efficiencies and a potential liability if the planning does not establish and provide added value. However, by focusing on a common goal such as building management, IoT can enable businesses and organisations to reap significant rewards. The first step is in recognising how IoT can help to create a smarter and safer business environment, and concentrating on real efficiencies can ensure a tangible return on investment for all stakeholders.

Managing crossover The fact most sites will not have a single allencompassing Internet of Things has already been addressed. However, one area which requires consideration is that some connected devices might play a role in more than one IoT, governed by different needs. For example, a camera may have a security or safety role, while at the same time performing heat mapping or asset tracking for core business functions. 29


assess low light_000_Benchmark_apr15 10/07/2020 16:36 Page 1

LOW LIGHT IMAGE CAPTURE

Assessment: Low Light Image Capture One of the major challenges in around-the-clock video surveillance is low light image capture. The vast majority of security-based surveillance applications are in action 24 hours every day, and given that many crimes take place in the hours of darkness, protection during this period is vital. Additionally, as many sites operate all hours, the added value of video enablement needs to be effective in all conditions. There are a number of ways to improve on video performance in minimal light situations, but which gives the best results?

M

odern video-based systems are sought after by end users for two reasons. The first is that video plays a significant role in the security of a site and protection of people and assets. Whether used to record footage for analysis after an event, or increasingly as a proactive tool to identify threats and instigate actions, video surveillance is well proven as effective and reliable. Increasingly, end users are also using video data as an enabler when it comes to business intelligence, building management and delivering site status information in real time. Video has become understood and appreciated by a growing number of businesses and organisations, and its increased use by systems and solutions outside of the security market is continuing to raise interest in what the technology can offer in the way of reporting. By its very nature, security-based video surveillance needs to work 24 hours a day, seven days a week. It needs to be able to perform efficiently and consistently when risks of an attack or event are at their highest. In short, when the risk increases, reliance on video surveillance becomes more important for those who have invested in surveillance technology. In many risk-based scenarios involving burglary, theft, attacks against people or property or other criminal activity, risks

30

increase when light levels fall. It’s a simple formula: criminals want to evade detection and identification, and therefore there is less chance of them being spotted by passers-by or persons at a site if it is dark. Additionally, most sites are less populated – or even unpopulated – during the hours of darkness. The practice of flooding an area with white light has fallen from favour for a number of good reasons. First, concerns about light pollution have meant many sites need to take their responsibilities seriously. With a growing number of councils implementing ‘dark sky’ policies, enforcement action is being brought against businesses who flout the guidelines. Second, lighting up large areas of a site throughout periods of darkness is not a cost-effective solution. It is not just the cost of electricity which companies consider, but also the impact such a step makes on their overall carbon footprint. Finally, passers-by viewing a well illuminated site will often assume that any activity is innocuous, as a well lit site is indicative of one that is operational. As a result, it is not unusual for securitybased video surveillance to contend with delivering video streams for security purposes – detection and identification – in circumstances which are often far from ideal. Typically, light levels will be minimal, which forces integrators and installers to consider a wide range of design criteria to ensure specified cameras can capture images to an acceptable level of quality. Of course, it’s all too easy to ignore the important criteria when today’s cameras boast outstanding performance in low light applications. If a camera can operate in 0.001 lux, how much additional light is required? In many cases, the specified low light performance doesn’t tell the full story. In some cases, it doesn’t even scratch the surface.

Sensitivity specifications For those trying to assess how well a camera will perform in low light applications, there isn’t much point in looking at quoted sensitivity specifications. The criteria for judging sensitivity was never a standard, although


assess low light_000_Benchmark_apr15 10/07/2020 16:37 Page 2

LOW LIGHT IMAGE CAPTURE

there was an industry ‘understanding’ of how these figures should be produced. This was based on the minimum light level required to create a 1 volt peak-to-peak video signal, with certain conditions dictating where the measurement was taken. As competition increased, some manufacturers started to measure in different ways. Some measured the light level at the viewed scene rather than the camera face plater, others opted to quote figures for lower strength signals. A few manufacturers would mention the variances, by many did not. The measurement definitions given by some soon disappeared, and before long there were dozens of different ways of measuring sensitivity, none of which allowed a clear comparison to be made. For many years, sensitivity figures have been something of a nonsense. As mentioned, there is not, and never has been, a standard for how sensitivity is measured. What drives the specifications is often tender documents. Specifiers or consultants will often identify a camera which they believe will fill the brief. In the interests of impartiality, they will not identify the device, but instead will use its technical specification for the tender document. On some occasions they might just lift the specs from a previous document for a site with similar needs. If the selected device’s specification comes from a manufacturer which quotes sensitivity in a different way to others, then similar or better performing cameras will not seemingly meet the specification. In a way, this pushes other manufacturers to adopt methods of measurement which provide the lowest figures.

The loser of this approach is the integrator, because what should be a very useful specification has become a figure which often doesn’t help to indicate the level of performance achievable in low light conditions.

Vital light Light is an essential element for the generation of any video image. If there is no light, there is no video image. You simply cannot get around that fact. If no light falls onto the sensor of the camera, no electrical signal can be produced. Cameras need light, at a certain level, if they are to produce anything in terms of a usable image. The debate around sensitivity always falls to that one single consideration: usable images. What is usable for one application may well be unusable for another. There are basic and costeffective ways of improving image quality in low light, but often these are not suitable for security applications, or even for supplementary uses such as site management, flow tracking, etc.. In the past few decades, the video surveillance sector has seen a lot of technological advances; it could be argued it has developed more than any other security discipline. Manufacturers have R&D teams working around the clock to deliver an ever higher level of performance to those seeking to deploy video systems. Resolutions have been raised from 330 TV lines to today’s HD and 4K UHD streams, with higher multi-megapixel devices also available. Resolution hasn’t been the only advance. Functionality has also increased. Previously surveillance cameras offered a few basic image manipulation functions. Additional features 49 31


assess low light_000_Benchmark_apr15 10/07/2020 16:37 Page 3

LOW LIGHT IMAGE CAPTURE

such as WDR, privacy masking, multistreaming, VMD and IVA all started out as select options on top-of-the-range devices, before becoming standard features. It is fair to say that over the years, video surveillance has developed significantly in terms of performance. If you look at the specifications for products over this period of change, you’ll also see a significant shift in figures quoted for sensitivity. While it would be wrong to state that many of the reductions had more to do with changes in how sensitivity was measured than technological advances, things have changed in more recent times. The advances in processing have not only allowed cameras to stream higher resolutions at full frame rates whilst also offering a wide range of features and functions, but also help boost performance in low light applications. The most basic approach to low light image capture was often to implement slow shutter speeds or use frame integration technologies. Such approaches must be treated with caution, as it is easy to demonstrate the performance by showing a static scene, where the image will be detailed and sharp. However, as soon as motion is introduced, blur and smear become obvious. When fast motion occurs with slow shutter speeds, at times it can be difficult to ascertain 32

what passed through the scene, and it would be impossible to achieve identification of an individual for evidential purposes. While many cameras feature some level of adjustable shutter speed or frame integration, they are not suitable for many low light applications. Increasing aperture sizes does allow a greater level of light to fall on the camera’s sensor, but at the cost of depth of field. This can be critical if a camera is covering a large open area. Again, while this can be used to some effect in a few applications, it’s not considered the best approach. The market leaders in camera technology are providing steps forward in low light performance. This comes as a result of several enhancements which, when combined, can deliver an increase in image quality without introducing compromise. Obviously, overprocessing images can result in unwanted anomolies, and in the past some of the low light functions required a delicate balance as on-board processors were pushed to their limits. Todays more powerful processing engines are better able to carry out the load balancing themselves, making things simpler for integrators and installers. The first benefit is the use of precision sensors. As with most IT and technological components, CMOS image sensors are advancing and quality is being improved. There is also a trend towards optimising chipsets for the challenges of surveillance. This is more likely to happen with manufacturers who are involved in the manufacture of chipsets, although economies of scale do mean many brands now use the same or very similar sensors. Sensors are electro-optical devices which are populated by arrays of light sensitive picture elements (pixels), which convert the light into electric signals based upon its characteristics. The more sensitive a CMOS sensor, the better it will perform in low light applications. It stands to reason that this increased sensitivity also impacts on cost, so the better sensors are typically found on higher-end devices. Combining a sensitive image sensor with an advanced image signal processor (ISP) is also vital to deliver good quality images in challenging conditions. As with CMOS sensors, there are ISP modules which have been optimised specifically for the delivery of video surveillance in hostile conditions. Roles performed by the ISP include colour balance, noise reduction, white balance, exposure control, gamma correction, dynamic range, etc.. Again, the leading manufacturers will have optimised these algorithms for surveillance needs.


assess low light_000_Benchmark_apr15 10/07/2020 16:38 Page 4

LOW LIGHT IMAGE CAPTURE

With higher resolution cameras, the pixels get smaller, which means it becomes critical that a signal can be created from very low levels of light. Achieving this without introducing noise is critical. When a weak signal is amplified, the noise is also boosted. Thankfully, the leading cameras can apply filtering which removes much of the unwanted noise while maintaining critical video data, retaining required forensic information. When the digital algorithms have been correctly tweaked by the manufacturer, cameras can deliver a high level of performance in most light conditions.

A question of focus? The major challenge with low light performance is getting a sufficient level of light to fall on the individual pixels which make up the camera’s sensor, and this becomes more difficult as resolutions rise. This has some grounding in basic physics. Theory indicates achieving consistent low light performance with higher resolution devices will often be more challenging than it is with lower definition cameras. The reason higher resolution cameras can sometimes struggle with low light performance has to do with pixel size and the density of pixels on a chip. Image sensors require light to fall onto the individual pixels to create a charge which sets the relative values for each individual picture element. If you consider a HD720p camera chip, it contains just under 1,000,000 pixels. In effect, this means that the surface of the chip is divided up into around 1,000,000 picture elements. Onto each one of these, a sufficient level of light must fall to create a signal every time a frame of video is created. The strength of the light dictates the level of the signal, which in turn decides the value of that pixel. Indeed, the pixels also have separate elements for red, green and blue. The size of the picture elements affects the low light capabilities of the camera, which is why 1/2 inch sensors are typically better performers in low light than 1/3 inch sensors. With this in mind, consider that a 4K UHD camera has around 8,000,000 picture elements, often on a sensor which is the same size as an HD720p component. Because the pixels are subsequently so much smaller, getting the required level of light to fall on each element is an increased challenge. Whilst we can accept processing power has gone through the roof, enabling the development of enhanced feature sets in the better cameras, and intelligent signal boosting and light scavenging features add benefits, these functions only work well if light is

accurately focused onto the sensor. One solution lies in the use of quality lenses. It is not uncommon for integrators to select a high quality camera capable of delivering decent low light performance, and then use an average lens. The result could be the additional low light performance in the higher quality camera is restricted, as the lens does not deliver enough accuracy. In tests using high quality correctly specified lenses, pitched against lower specification general purpose optics, cameras fitted with higher quality optics consistently delivered increased quality in regard of fine details and enhanced low light sensitivity. The truth is lenses are not perfect. They are only as good as they need to be! One of the more costly stages when manufacturing a lens is the precision grinding of the glass and setting up the lens combinations. The more precise the grinding and accurate the placement, the longer the process takes, and the more care required in the manufacturing process. It stands to reason that if a lens is intended for use on a mainstream surveillance camera, there is no point in investing time and effort in grinding the glass or building the lens to a higher tolerance. Therefore, when the lens is manufactured, it only need be made as accurate as required for its intended use. Where high levels of detail are required in low light applications, a high quality lens can increase the accuracy with which light is focused onto the pixels, thereby improving image quality and ensuring the camera’s processing engine has the best possible quality images to start with. Another important point is to ensure selected lenses are rated for use with IR light if additional infrared illumination is being used. White light and infrared light have a slightly different focal point. This is because the wavelength of infrared light causes the refraction in the lens to be at a different angle. The result is a need for focus changes in day and night conditions. An IR coating corrects this and allows a single focus setting for all conditions. High quality lenses do carry a slight price premium over standard lenses, but the difference is less than the increase needed to but a camera with a significantly higher sensitivity. Therefore, selecting a quality lens is a cost-effective move to enhance low light performance.

More light? If integrators and installers are seeking a simple formula to make managing minimal light applications a breeze, there is something 33


assess low light_000_Benchmark_apr15 10/07/2020 16:39 Page 5

LOW LIGHT IMAGE CAPTURE

else which can be considered: add more light. Nothing does the job better than implementing additional illumination. Today’s illuminators are cost-effective, energy efficient, easy to install and commission, and are available in a huge variety of options. Although cameras using integral illuminators are very popular and can be beneficial in some applications, there is a good case to be made for the use of dedicated illuminators. Because of size limitations, integral LEDs can lack sufficient power to be useful over extended ranges. Longer distances are available from some PTZ cameras, because the dome housing allows for larger LED arrays. With static cameras, there often isn’t enough room to fit sufficient LEDs to provide an increased distance. Tests have shown many devices with integral illumination suffer from light pooling at the extreme of the specified range. Often the field of view is larger than the coverage of the light. This is because a narrower angle of light will deliver a longer range. Cameras with integral illumination often have the LEDs mounted around the lens, because it is a simpler manufacturing option. This can result in issues with camera siting. With discrete illuminators, range can be specified for the specific site, with 34

extreme distances still achievable. Also, there is no issue with pooling, as differing angles of coverage are available. Dedicated illuminators also allow the power output to be adjusted, ensuring the coverage is consistent throughout the field of view. Importantly, dedicated illuminators can be positioned away from the camera and any reflective surfaces, allowing them to illuminate the viewed scene without flare or reflections. Dedicated illuminators can provide consistency throughout the specified range and across the entire field of view, along with reduced noise and therefore lower bitrate needs. Where light pollution isn’t an issue, white light allows colour information to be retained. Also, white light can be used to help with site management issues during the winter months when an application may be open for business in hours of darkness. Many standalone illuminators make installation a simple task. Most manufacturers offer PoE versions of their illuminators, and with a number of cameras offering RJ45 power outputs, connecting an illuminator via an edge device makes financial sense. Adding illumination is also cost-effective solution if you consider the price/performance ratio. Most camera ranges increase in cost as processing functionality is added. Seeking the best low light performance pushes model choice towards the top of the range. However, often the standard models will be suitable if illumination has been enhanced, thus offsetting some of the cost of an illuminator. Adding illumination delivers significantly better low light performance for average cameras. Where legacy devices are in use, adding illumination can be more cost-effective than upgrading cameras.

In summary Dealing with minimal light in security environments has been a challenge for many years, and going forwards it will remain a challenge. The bottom line is this: without light, you have no video. That said, the leading manufacturers are pushing low light performance to levels that previously haven’t been possible, and clean colour video at low lux levels is now a reality. Image signal processing advances have pushed the boundaries in terms of performance, and the increased use of high quality CMOS sensors allows significant improvements to be realised. Add in high quality optics and again performance improves. Plus, you could always add more light.


Driving Smart Integrations_000_Benchmark_apr15 10/07/2020 18:12 Page 2

SMART VMS DEPLOYMENT

W

hen considering the potential impact of intelligent buildings and smart cities, it is very easy to think of the associated technologies as being separate to the solutions on offer from the systems-based security industry. Our focus has always been the prevention of crime, the mitigation of risks and the management of incidents when they occur. As vital as these tasks are, the reality is that the security industry arguably sells itself short on many occasions. Intelligent buildings or cities rely on one thing to function to an optimum level: data. The collection of accurate data, in real-time, is essential for the decision-making processes such solutions carry out. If the data used to make decisions is inaccurate, untimely or based upon suppositions, then any smart environment will inevitably fail. As such, smart systems are data hungry. However, it’s not just a case of collecting as much data as possible. The value for end users comes from smart buildings and cities having access to accurate and credible data which can be actioned. It is too easy to think that all data is vital. Even if captured data is important, it will be of little use in a smart building scenario if it cannot be used to create relevant actions. There is an IT industry term: GIGO. This stands for ‘Garbage In, Garbage Out’, and it is very much true in smart building and smart city applications. Integrators and end users looking to branch into the delivery of smart site implementations need to understand that ‘Garbage’ does not solely refer to inaccurate or outdated data. It can also include data which, while accurate and credible, simply cannot be actioned effectively. If you consider security solutions, they are effectively data collection and analysis systems. Because of the nature of security and risk mitigation, the systems are designed to capture accurate real-time data, and often to verify that data. The data collected is usually relevant to site and building status, and therefore it can be exploited to achieve many intelligent building goals. Because of its nature, typical data collected by security systems is often the type of information which intelligent building and smart city solutions require to make accurate and credible decisions.

Relevant data By considering the various technologies involved in a complete security solution, it becomes possible to understand the vast range of data that is being captured and the roles it can play in smart integrations.

Driving Smarter Integrations

Smart solutions such as intelligent buildings and smart cities are grabbing the headlines at present, and with good reason. Businesses and organisations understand the value of ‘big data’, and how it can be mined with the results used to introduce efficiencies across a wide range of corporate needs. It is a rare company or organisation that does not want to become more efficient, and in modern systems we have much of the capability to offer such services. Access control systems capture and process data about who enters (and often who leaves) a building. It is also possible to track people around a site, knowing who is where at any given time. This enables definite occupancy data to be captured, along with easily searchable records of who is on and off site. Access control records can contain much more information that a user’s identity and access permissions. Supplementary information can include qualifications such as first aider, H&S trained worker, fire marshal, etc.. They can also link specific individuals with assets, tools or other items to enhance management. Access control data can be used to manage intelligent tasks based upon specific 49 35


Driving Smart Integrations_000_Benchmark_apr15 10/07/2020 18:12 Page 3

SMART VMS DEPLOYMENT

individuals being on site, or non-specific individuals from certain access groups, or persons with defined qualifications. Actions can also be based upon occupancy levels, expected personnel or vehicular flows. Processes can also be triggered and controlled dependent upon whether rooms, departments floors or buildings are either occupied or unoccupied. Because access data is often used for security, muster reporting and payroll information, the data has to be accurate and delivered reliably in real-time. As such, it provides an important data source which is of significant value to intelligent buildings or smart environments. Moving on to site protection systems, the potential for exploiting the data captured by intruder detection systems is not always appreciated, even within the security industry itself. Whilst data which identifies users is predominantly gained from User PIN numbers employed for setting and unsetting the system or the implementation of configuration changes, there is still a wealth of general data relating to the site status. The site status information gathered by alarm systems does offer a number of benefits when creating an intelligent building solution. For example, areas and partitions can be identified as set or unset, and zones with or without motion can be identified in real-time. Also, the status of doors and windows can be monitored, with the opening and/or closing of portals being able to trigger actions. With secure wireless options available, this allows the use of contacts on a wide range of 36

items as well as entry/exit points or windows. Cupboards and drawers can be monitored, as can cabinets, fridges and freezers, storage boxes and even mobile assets with the use of accelerometer-based devices. Whether using external or internal detection, contacts, shock sensors, or peripheral devices such as temperature or humidity sensors, the power of intruder-based systems is the ability to create double-knock scenarios, timer-based actions and advanced logic rules. The latest intruder alarm systems include a plethora of additional features and functions, many of which can be applied to create smart events. By using the flexibility of zone types in modern systems, devices can be used to send push notifications when the system is unset, and generate alarms when it is set. Video is a great enabling technology, and as well as enhancing security it can deliver a variety of data which is of great value in smart integrations. In recent times, advances in processing power and the increased use of GPUs to manage off-loaded data processing has seen the potential for capturing and exploiting data from video surveillance systems grow in an exponential way. Video surveillance data offers a number of diverse benefits as it allows visually detectable information to be exploited without the need for human intervention or verification. While CCTV was predominantly a reactive technology, today’s video surveillance solutions are proactive thanks to the increased use of IVA and AI-based technologies for search and filtering. Video surveillance offers data which can be processed for a very wide range of status reports. These range from simple events such as motion-based triggers, through a whole range of intelligent analytics triggers, to site status reports based upon activity, occupancy, flow and direction, entry and exit times, condition reporting, etc.. As the use of GPUs increases, so a growing number of video systems also offer object recognition based upon deep learning algorithms. These can differentiate specific objects, even though they might be of a similar size and shape as other objects, or even display the same types of behavioural characteristics. Object recognition is different to object detection. With detection, the IVA simply detects that an object is in the viewed scene, typically by putting a bounding box around targets which were not in a reference image or which move. Some object detection


Driving Smart Integrations_000_Benchmark_apr15 10/07/2020 18:13 Page 4

SMART VMS DEPLOYMENT

algorithms will estimate whether the object is a person or vehicle based upon rudimentary criteria such as size, shape, speed, etc.. However, this is not object recognition. Object recognition is made up of various algorithms which use advanced analysis to identify objects in images. The algorithms predict the classification of the object in an image. It does this based upon machine learning, and therefore needs to be ‘taught’ about objects and their parameters. The accuracy of the classification increases as more images of an object are used for learning. The development of deep learning technologies adds another dimension. Deep learning techniques use convolutional neural networks, or CNNs, to learn an object’s features in order to identify it. This allows a system to learn to identify differences between cars and vans by analysing training images and learning the differences between the two types of vehicles. Deep learning ensures the potential on offer from video surveillance in smart buildings goes far beyond security, by allowing a depth of filtering choices to provide data about a wide range of conditions. In essence, any data that can be visually captured can then be processed as a part of a smart solution. Data can be collected about moving or stationary objects, appearing or disappearing people or items, speed and direction of travel, size and shape of objects (or object classification where implemented), dwell or loitering times, motion or lack of motion, behavioural trends, anomalies and exceptions, coloured objects, etc.. Increasingly, rules based upon multiple criteria can be initiated, either at an edge device or at a central management software platform. The information can be pulled from any of the security system technologies, and as a result can provide significant benefits in an intelligent building or smart city implementation.

the customer will not have thought about how they’d like to utilise data from the security system, often because they don’t realise the potential available from the system. Therefore, the key to additional business lies in ensuring users appreciate the power and flexibility of modern solutions. The options range from general site management, such as controlling power when a department, floor or building is vacant or managing access to car parks out of working hours, through to very specific tasks such as alerting staff if occupancy in a public area reaches a predefined level, or directing delivery vehicles to a certain loading bay. Through a combination of system features and functions and logic-based rules, advanced automation and building management actions can be established with relative ease. Not only does this enhance the return on investment for the customer, but it also allows the use of additional budget from other cost centres. This in turn ensures systems can be created which exceed the user’s expectations.

In summary End users are investing in smart technologies to create intelligent buildings and campuses. Such investments add business efficiencies, and offer an enhanced return on investment. The additional business that offering smart functionality will bring is essential to future growth. However, unless the functionality is sold to the customers, they are unlikely to fully understand just how flexible their systems are.

The right implementation It is important to realise a smart building or city will not have every single function integrated. Few users want that. Many will already have legacy systems that perform certain tasks, and will be more than happy with how these function. Additional smart functionality which exploits the data being captured by the security system can be added incrementally, delivering proof of concept for the end user. As their requirements grow, so additional elements can be introduced. In many cases, 37


awards_000_Benchmark_feb14 09/07/2020 14:31 Page 1

INNOVATION AWARDS

Rewarding Innovation At Benchmark, we believe the future of the systems sector lies in the creation of innovative and smart solutions. In order to allow integrators to create such solutions for end users, it is vital manufacturers deliver innovation that both enhances the technological capabilities of their products, and allows those developments to be implemented in a realistic fashion. In order to highlight such advances, Benchmark runs its Innovation Awards scheme, which recognises and rewards innovative thinking.

Smart Solutions single intuitive GUI ensures security, energy management and maintenance teams can easily access real-time, accurate status information about the systems on a site.

Avigilon: Appearance Search

BriefCam: Video Content Analysis Platform BriefCam offers an intelligent video analytics platform which delivers innovative capabilities, allowing end users to quickly and effectively search, analyse and act on intelligence gained from real-time or ondemand video content. Through AI, Deep Learning, advanced object detection, identification and classification, it allows operators to make sense of the video data by filtering objects to pinpoint and track targets.

COSMO: COSMO PSIM+ To deliver seamless integration of security and energy management systems, COSMO PSIM+ allows flexible connectivity as it is an APIbased technology-agnostic solution. The 38

Avigilon Appearance Search is a feature of the ACC Enterprise (Avigilon Control Center) VMS. Sites using Appearance Search can deploy Avigilon’s cameras with self-learning analytics, or use the Avigilon AI Appliance with third party cameras. Appearance Search sifts through hours of video, across multiple devices, to quickly identify people and vehicles of interest, using deep-learning to find multiple appearances.

Qognify: VisionHub VMS+ VisionHub VMS+ is a security management solution which offers more than management of video streams. It includes workflow support, situational awareness and system management capabilities. It offers advanced geo-positioned maps, incident management with actionable guidance, and facilitates collaboration to help manage incidents.

DAVANTIS: DFusion Deep Fusion combines video analytics with Deep Learning. Deep fusion allows the system to detect all intruders, even in hostile and demanding situations, with an unprecedented reduction in the number of nuisance alarm activations.


awards_000_Benchmark_feb14 09/07/2020 14:31 Page 2

INNOVATION AWARDS

Video Solutions Milestone: XProtect 2020 R1 The 2020 R1 of XProtect adds features to the VMS and extends the offering with a Video Processing Toolkit. A Centralised Search feature makes it easy to find incidents by aggregating data, and uses AI, video analytics and machine learning.

Bosch: BVMS 10 BVMS 10.0 features improveddata security and privacy, greater flexibility with ONVIF Profile S certification and enhanced monitor wall functionality to deliver a more flexible VMS, including integration with access control. BVMS 10.0 is also secured using state-of-the-art IT technologies.

Cathexis: CathexisVision 2020 CathexisVision’s video analytics suite has been enhanced through the addition of Object Classification algorithms, which use sophisticated Neural Network technology. The algorithms allow an additional rule, only triggering events if the detected object is of a

pre-determined type, for example a person or vehicle.

FLIR: Elara DX The FLIR Elara DXSeries includes multispectral PTZ security cameras which provide full situational awareness. Combining thermal and visible light imagers, the Elara DX-Series gives operators the ability to monitor large areas in complete darkness, glaring light, and adverse weather conditions including fog and snow.

Vicon: Valerus 20 Valerus 20 includes interactive mapping, bookmarking, and historical event search so users can react to events more quickly, monitor incidents more efficiently and perform thorough forensic investigations.

Access Control Solutions Paxton: Paxton10 Paxton10 offers a simple path to integrated access control and video solutions. It also enables interoperability with intruder and fire alarm systems as well as building management .It allows a return on investment, which makes the solution cost-effective.

3xLogic: infinias Corporate infinias Corporate access control software provides advanced features for securing and managing sites. The interface is presented as a simple, intuitive browser-based GUI. A powerful ‘rules engine’ makes it possible to perform a variety of functions based upon logical relationships.

Vanderbilt: BLE Readers Vanderbilt offers Bluetooth Low Energy (BLE) readers in conjunction with the company’s ACT Enterprise software, enabling the use of smartphones as credentials. Vanderbilt offers a range of BLE readers, a contactless door release button, virtual credentials and an app.

Johnson Controls: EntraPass v8.2 EntraPass v8.2 simplifies how users remotely access the EntraPass go mobile app. Improved search capabilities and other upgrades deliver remote and real-time access. EntraPass go Pass requests are not attached to a selected SmartLink, eliminating the need to configure every connection. Users will now be able to access inbound connections with ease.

Proxyclick: Proxyclick Proxyclick is designed to create efficiencies when managing visitors and contractors. Security functions alert users when a visitor checks in, or creates notifications if they fail to check out. Advanced reporting allows the user to collect data and spot trends, produce reports and use surveys to gather feedback. 39


awards_000_Benchmark_feb14 09/07/2020 14:32 Page 3

INNOVATION AWARDS

Site Protection Solutions TAKEX: PR-30BE The PR-30BE from TAKEX is a reflector-based photoelectric beam which uses Time-of-Flight technology. The PR-30BE has a 30 metre range. It determines the distance of any beam break with a high degree of accuracy , ensuring that genuine alarms are not missed. Because the sensor does not require power at both ends of the link, installation costs are lower.

OPTEX: WX Shield The four models in the WX Shield series provide outdoor intruder detection with a wide (180 degree) coverage. The sensors feature two independent 90 degree detection areas with the flexibility to configure individual settings, sensitivity levels and triggering outputs for the left and right areas.

Texecom: Impaq SC-W The Impaq SC-W from Texecom is a wireless shock and contact sensor. The detector makes use of VIBER Accelerometer Technology, and

is independently certified to EN50131-2-8 Grade 2, the new Standard for shock sensors.

Redcare: Redcare Ultimate Redcare Ultimate uses a private IP connection on the Redcare network and also supports a back-up signalling path which is powered by two 4G SIMs. The signalling system includes battery back-up in the alarm panel to deliver continuity. Monitoring ensures problems with the signalling infrastructure are notified within 90 seconds.

Pyronix: ProControl+ Voice Push Notifications The ProControl+ app from Pyronix allows the use of voice-based push notifications when alerts occur. For example, with the use of a camera, the user can view the exterior of their property, receiving instant notifications when motion is detected. This then enables them to visually verify the security of the property.

Analytics Solutions Vaion: vcore

VCA Technology: VCAserver

Vaion’s vcore software incorporates embedded video and audio analytics powered by machine learning algorithms, along with intuitive interfaces to simplify operational and installation processes. The vcore VMS supports cameras with integrated directional audio analytics, security appliances and a hybrid cloud service.

VCAserver is an appliance which can be used to integrate VCA’s analytics with a VMS, or as a standalone server for smaller installations. When used in standalone mode, it is ideal for projects of 128 channels or less. Scalable, it provides cost-effective Deep Learning analytics for legacy systems.

IPS: Critical Infrastructure Protection IPS Critical Infrastructure Protection is an intelligent video analytics module designed to deliver real-time alerts if an intrusion occurs at a sensitive site. The analytics uses a patented three-zone concept, and recognises suspicious behaviour, allowing exact ‘friend or foe’ recognition to be carried out. 40

Hikvision: AcuSense Technology AcuSense Technology provides accurate sensing. Powered by deep learning algorithms, it distinguishes people and vehicles from other moving objects. Supported devices will only generate an alarm when the preset intrusion type (human or vehicle) takes place.

IDIS: IDLA IDLA is an artificial intelligence-optimised video analytics solution. By leveraging artificial intelligence and deep learning , the technology is claimed to have an accuracy rate of 98 per cent. The deep learning is based on an artificial neural network.


awards_000_Benchmark_feb14 09/07/2020 14:32 Page 4

INNOVATION AWARDS

Service-Based Solutions Arcules: XProtect Hybrid VMS Arcules-XProtect Hybrid VMS solution is a combination of Arcules’ VSaaS integrated with XProtect Corporate VMS. The result is a flexible hybrid video surveillance solution. Customers can deploy systems to remote sites quickly, with minimal IT resources and downtime, while still benefiting from the capabilities of XProtect’s on-premise VMS.

Videoloft: Cloud Adapter The Cloud Adapter from Videoloft is a plugand-play appliance which allows cloud connectivity to be added to legacy or newly installed systems. It provides an additional layer of security and encryption to ensure systems are cybersecure. Purchase is a oneoff cost, with cloud services billed on a recurring basis.

Brivo: OnAir The Brivo security platform and Brivo OnAir API enables the design of access control systems making use of cloud-based services. Users can create schedules, and personnel

can be managed, with permissions adjusted to grant different levels of user access.

Morphean: Management Platform Morphean’s Management Platform combines hosted video surveillance, access control, business intelligence analysis. Maintenance and updates are automatically provided by Morphean, and the ‘as a Service’ model is available with a monthly subscription.

Agent Vi: innoVi innoVi provides AI-powered video analytics for real-time detection of events, along with object tracking and quick discovery and export of events and related data from captured video. innoVi is available as cloudbased software as a service.

Business Intelligence Hanwha Techwin: Serverless ANPR Hanwha Techwin offers cost-effective serverless ANPR solutions. The use of camerato-camera IP-based communications enables up to four cameras to capture and transmit ANPR data. The cameras are configured as a single master unit and three slave units; the latter send data back to the master.

Genetec: Mission Control Mission Control is a decision management system that provides organisations with new levels of situational intelligence, visualisation, and incident management capabilities. It allows users to make the right decision when faced with unanticipated situations. It collects and qualifies data from sensors and devices, spotting complex situations and incidents.

AI Tech: AI-DASH-PRO AI-DASH-PRO is a dashboard tool for data collection and management. It collects data from AI-empowered IVA plug-ins. Data is sent

to AI-DASH-PRO, which can then be visualised in an intuitive web interface which aids the decisionmaking process.

Herta: Biomarketing Biomarketing iuses facial detection and analysis. The system allows parameters such as gender, approximate age and other characteristics or facial expression to be recognised. This information is used to target marketing messages to the individual.

Spica: Time and Space Time and Space is an access control and time and attendance solution. It provides real-time information about absence and attendance for employees, regardless of how complex the organisational structure, the number of employees or the number of locations. 41


awards_000_Benchmark_feb14 09/07/2020 14:33 Page 5

INNOVATION AWARDS

IoT Devices Axis: Network Audio Solutions Axis offers a range of networked audio devices which form complete high-quality audio systems, either as standalone solutions or integrated with other systems. Eventtriggered announcements and direct callouts can be initiated, and users can make live or scheduled announcements to different zones.

NVT Phybridge: FLEX24 The FLEX24 switch provides a cost-effective transition to IP-based infrastructure, allowing the use of numerous IoT devices in a simple, secure and cost-effective option. When the FLEX switch is paired with FLEX adapters, the enterprise-grade unit delivers fast Ethernet and PoE over multi-pair UTP cable with up to 610 metres reach.

SICK: LMS LiDAR Sensors The LMS series detectors are cost-effective 2D LiDAR sensors capable of delivering mid-

distance detection ranges. The sensors use multi-echo technology and algorithms to ensure reliable and consistent performance. Data is output in real time, enabling applications to benefit from high accuracy.

Nortech: NorParc NorParc is a Windows-based counting and parking guidance system which provides centralised count management, monitoring and guidance control for parking facilities. It includes a range of RGB variable message signs using low profile LED matrices.

Mobotix: M16 Thermal TR The M16 Thermal TR is a thermal imager which features a calibrated sensor, allowing variances in temperatures to be detected. Thermal radiation measurements can be used to trigger events based on the temperature increasing above or decreasing below a trigger level.

Infrastructure Intercoax: IPIFY Range The IPIFY range is made up of Ethernet over Coax (EoC) devices, including a comprehensive long range offering. This allows transmission of data over any copper cabling, up to a distance of 2,400 metres. The links can include PoE, with power budgets of up to 60W for any IP end device.

Security and Safety Things: Camera OS and Application Store The smart camera OS allows third party manufacturers to leverage smart applications. The operating system is based on the Android Open Source Project, and delivers developers’ libraries, an API framework, and codecs. The 42

Application Store allows users to download ready-to-use AI-based apps for cameras.

barox: RY-LGSP28-52/740 The RY-LGSP28-52/740 is a Layer 2/3 switch with L3 functions. Connected devices are supplied PoE, and support for 48 10/100/1000Mbps PoE+ allows use in projects where additional devices are deployed. It also supports four SFP 1/10Gbps ports.

Seagate: Seagate Secure Seagate’s self-encrypting drives offer hardware-based data security as an essential component of modern data protection. The integration of multiple levels of security protocols adds an additional layer of protection.

ComNet: CNGE20FX4TX16MS The CNGE20FX4TX16MS is a managed switch supporting 16 10/100/1000BASE-TX and 4 100/1000FX SFP ports. The hardened units are available for use with CAT-5e or optical transmission media. Plug-and-play design with no need for adjustments makes their implementation fast and cost-effective.


Project2_Layout 1 09/07/2020 14:40 Page 1

CathexisVision

CATHEXIS

Video Surveillance Management Solutions

Providing real return on investment efficiently and effectively in each and every industry sector.

The CathexisVision Software, with its extensive range of features and seamless integrations, provides clients with efficient and effective surveillance solutions, helping them to get the most out of their surveillance investment to reap multiple rewards for their companies. CathexisVision Standout Software Features include: • Open Architecture VMS Platform

• Sophisticated Command Centre Environment

• Enterprise, Multi-Site Architecture

• Advanced Video Search

• Video Analytics / AI Object Classification

• Cyber Protection and Failover Redundancy

• Automatic License Plate Recognition (ANPR)

• Third-party System Integration

CONTROL ROOM BACnet Weighing Scales

PSIM

Retail POS

Video Wall Escalators Metal etal al Detectors D te

Server

Failover Server

Weighbridges

Intercoms

ANPR

Parking Systems

Alarm Management

Mass Network Storage

Access Control Elevators

Client Viewing

Remote Viewing

Cathexis Mobile

Fence Systems

Fire Management Video

Effective Innovation

DVR/NVR’s

info@cathexisvideo.com | www.cathexisvideo.com


bulletin aug20_000_Benchmark_apr15 10/07/2020 18:03 Page 1

BULLETIN

Bulletin Benchmark looks at news and product launches of interest to those involved in the design, implementation and use of smart solutions

barox joins the Alliance for Cybersecurity

360 Vision relaunches VR Dome 360 Vision Technology has announced its iconic VR Dome, with a heritage spanning almost two decades, is being relaunched in today’s competitive PTZ camera marketplace. With an increasing focus on total cost of ownership by many end users, the VR Dome offers a compelling proposition commercially. The decision reflects an increase in demand from end users seeking UK manufactured security products. Built with the high performance Sony StarVis chip and with 20:1 and 30:1 zoom options, both internal and external HD 1080p dome camera ranges are now available with a multitude of mounting options, and full integration with all ONVIF compatible VMS platforms and DVRs. The dome products also have proven longevity of over 15 years. 360 Vision states more end users are seeing the virtue of the VR Dome’s less obtrusive design. People know a camera is there, but not where it is facing. Additionally, demand has increased significantly in conjunction with the launch of the Wireless TX 4G/5G/LTE base unit. The VR Dome is the most common choice of camera to be paired with the wireless product in local authority applications. 44

In the company’s drive to implement the highest standards of cyber protection, barox Kommunikation has joined The Alliance for Cybersecurity. An initiative of Germany’s Federal Office for Information Security (BSI), the Alliance for Cybersecurity is an association of major players in the field of cybersecurity in Germany. The Alliance’s mission is to increase national cybersecurity and strengthen resistance to attacks. To help ensure the highest standards of resilience, the Alliance fsupports the exchange of information and experience from its members, to build a comprehensive knowledge base. In this way, the Alliance acts as an adviser, working with its partners to defend against threats and promote collaboration to build more secure and resilient network infrastructures and devices for the future. ‘The implementation and management of secure communication data is a top priority for barox,’ states Rudolf Rohr, barox Cofounder and Managing Partner. ‘Joining the Alliance will be a great asset for barox, supporting its drive to guarantee and continuously improve video and data security safety standards. On this platform, manufacturers of switches, firewalls, cameras and servers can all share their knowledge in order to develop robust cyber solutions.’ barox has invested heavily in its ISO 9001 and ISO 27001 certification, and partnering with the Alliance for Cybersecurity will add an extra dimension to its ability to support customers with an unparalleled level of cybersecurity for video switches, media converters and IP extenders. The Alliance investigates security risks associated with the use of IT and develops preventive security measures. It provides information on risks and threats relating to the use of information technology and seeks out appropriate solutions. This work includes IT security testing and assessment of IT systems, in co-operation with industry.


bulletin aug20_000_Benchmark_apr15 10/07/2020 18:04 Page 2

BULLETIN

Hanwha Techwin launches PoE Extender cameras Hawha Tecwin has launched Wisenet PoE extender cameras which are designed to save integrators and end users time and money when there is a requirement to install two cameras within 80 metres of each other. For retrofit applications where an additional camera is needed, system integrators need to simply substitute an existing Wisenet camera with a PoE Extender camera, and then reinstall it at the new camera location, with both devices being able to share the same cable run. With the ability to support all PoE cameras within the entire Wisenet range, the new 2 and 5 megapixel PoE Extender indoor and outdoor dome cameras provide an equally cost-effective solution for new installations as they reduce the number of network ports and switches, as well as the amount of cabling required. Installation ease is matched by a considerable reduction in the cost and time integrators would normally have to spend on site to install a new camera. There is also the option to connect other PoE enabled devices to the PoE extender cameras, such as a supplementary lighting unit, I/O controller or PIR sensor. The dome cameras all have built-in IR LEDs which illuminate objects up to 50 metres from the camera and feature Digital Image Stabilisation (DIS) which helps capture sharp, stable images by reducing motion blur caused by wind or vibration. All are equipped with WDR technology, with the 2 megapixel models performing at up to 150dB and the 5 megapixel models at up to 120dB, to produce clear images from scenes containing a challenging mix of bright and dark areas. Part of the Wisenet X Plus series, the PoE Extender cameras offer a number of other practical features including magnets which lock sensor modules into the dome housing. A waterproof gland, through which a network cable can be inserted with the aid of an RJ45 plastic push-through device, negates the need to re-make cables. The new cameras come supplied with a diverse range of license-free specialist analytics such as directional detection, virtual line, enter/exit, appear/disappear and loitering detection. In addition, an audio analysis function is able to recognise critical sounds such as explosions, screams and broken glass, and then generate an alert to enable emergency services to reactto any incident. In a retail environment, for example, this functionality could be used to alert security personnel that a customer is behaving aggressively.

The processing power of the chipset enables the cameras to support edge-based people counting, heatmapping and queue management applications. These offer retailers, art galleries, museums and other businesses which are open to the public the opportunity to gain a greater understanding of customer behaviour and improve productivity, with the option to display the captured data on the centralised dashboard of the Wisenet Retail Insight business intelligence solution.

Eagle Eye completes Mexico City project Eagle Eye Networks has completed a large scale, fully integrated city-wide surveillance program, installing 13,720 cameras in 4 months. The project has been a large success for Mexico City C5, contributing to the City’s Citizen Safety mobile application. This mobile application facilitates content sharing for more effective neighbourhood watch and a panic SOS button. Jaime Abad Valdenebro, CEO of Omnicloud.mx, stated, ‘Effective citywide surveillance is more than installing cameras in a few key locations; it’s about creating a platform that meets the unique needs of each municipality. In partnership with Eagle Eye Networks we leveraged the Eagle Eye Video API and SDK to customise a unique web application that is designed to integrate fixed, mobile body worn and vehicle cameras into one interface, providing an unprecedented level of insight and awareness into our cities operations.’ 4G connectivity with Eagle Eye Networks’ bandwidth optimisation was utilised in order to facilitate this quick deployment, installing approximately 250 cameras per day at its peak. The cameras are all operational, remotely monitored and providing safety and security to citizens today. This fast-paced installation occurred amidst the global supply chain challenges caused by COVID-19. However, Eagle Eye Networks’ strong partnership with both Omnicloud.mx and suppliers provided alternatives and solutions to keep the project on schedule. The solution was chosen because the Eagle Eye Cloud Video API Platform provides an open solution that allows integration of new technologies (AI, advanced analytics, search, number plate recognition) and new devices from third party suppliers at any time. Future-proof technology and cybersecurity were crucial elements in the decision-making process. Dean Drako, CEO of Eagle Eye Networks, added, ‘When deploying a citywide surveillance project, scalability, retention and cellular transmission must be considered. Eagle Eye’s cloud video retention and massive ondemand scalability make it ideal for large scale deployments. To operate a large data centre system for video recording is expensive and challenging. With Eagle Eye’s subscription service we provide a more robust and lower cost answer for large scale deployments. Furthermore, our open platform provides a future proof solution, integrating AI, video analytics and advanced search at the click of a mouse.’ 45


bulletin aug20_000_Benchmark_apr15 10/07/2020 18:04 Page 3

BULLETIN

360 Vision reduces power needs 360 Vision Technology has announced the launch of a new generation of its Predator and Invictus PTZ cameras with s a significant reduction in power requirements. Attributed to an increase in demand for remote and ‘offgrid’ site surveillance both in the UK and overseas, 360 Vision Technology has released a new ‘low power mode’ feature which reduces camera power draw to an unrivalled low 12W when idle and a maximum of 50W at full load (Invictus range), with simultaneous PTZ control and IR lighting. Sara Fisher, Business Development Director at 360 Vision Technology, stated, ‘In recent times, the demand for remote site surveillance has been on the increase, particularly in locations where there is no localised power available and renewable or alternative energy sources are the only option. Obviously in these scenarios, keeping power requirements of the camera to a minimum is a crucial factor in being able to maintain system operation. Our development team has really stepped up to the challenge on this point and the result is that we now have the most energy efficient ruggedised PTZ cameras on the market.’ Other new features include the unique ‘attack detect with base scan’. On taking an impact from a vehicle or perpetrator, this allows the camera to get a 360 degree view of the base of the pole before reconfiguring automatically to the home position, allowing potential identification of the attacker. 360 Vision’s expansive client base, which includes local authorities, CNI sites and numerous other public sector agencies, will be able to benefit significantly from these developments on new installations. Fisher added, ‘By far the most significant spin-off benefit to the increased power efficiency is a substantial reduction in lifetime running costs of the camera system. On a 100 camera system, our clients could save as much as £18,700 in energy costs and in turn, reduce their carbon footprint by 37 tonnes over a 5 year period, when compared to the closest equivalent camera models on the market. That’s a compelling return on investment.’

46

Synergy 3 deployed in London locations Synectics has secured a competitive public space contract to provide integrated surveillance solutions for a number of prestigious sites across London. Comprising government properties, heritage sites and high-profile public event venues, the contract uses Synectics’ tailored, open-architecture solutions incorporating integration to third-party systems such as access control and intruder detection. Synectics, which supports more than 70 per cent of London’s boroughs as well as major retail stores and stadiums across the city, will upgrade all sites to its Synergy 3 command and control software platform. The sites include listed buildings, highsecurity ‘closed-to-public’ assets and venues with high levels of public footfall. Martin Bonfield, UK Sales Manager at Synectics, stated, ‘Each of these sites falls under our specialism in public space, but individually they each have unique requirements. That plays to our strengths in terms of the flexible technologies we offer and the broader sector experience we hold, from gaming and critical national infrastructure to city surveillance, retail, and public transport.’ The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras — totalling around 500 across the sites — alongside integrated third-party systems such as access control and intruder detection. Linking all locations for eventual multi-site monitoring was a crucial component of the project brief, ensuring the sites continue to support future needs and incorporate the latest camera technology and system features as required.


bulletin aug20_000_Benchmark_apr15 10/07/2020 18:05 Page 4

BULLETIN

Hikvision offers cloud-based service Hikvision has launched Hik-ProConnect, a convergent, cloud-based service solution with a suite of signature features and benefits. With Hik-ProConnect, users can converge Hikvision devices to cover video, intrusion, access control, intercom and more to address their various needs. Users can also authorise their professional security partners to complete necessary system management, such as remote system health checks and maintenance. Frank Zhang, President of the International Product and Solution Center at Hikvision, stated, ‘Today, millions of devices are being connected into networks, including cameras and other security equipment, making them part of the IoT world. We believe the security industry is ready for a new type of cloudbased systems and services. Hik-ProConnect addresses the needs of today’s market, offering cutting-edge technologies, convergence, straightforward system configuration and service delivery, greatly boosting users’ security capabilities and providing increased efficiency and peace of mind. Because the system is cloud-based, it can be deployed on-demand, with no server or local VMS needed, which means no large upfront investment. Through HikProConnect’s unified web portal, devices can

be added in batches and configured quickly, reducing installation time and costs. Users who incorporate and authorise Remote System Management and Health Monitoring will enjoy an always-on system supported by their professional security partners. The Hik-ProConnect portal can identify and resolve device failures, communications loss, and other issues remotely and efficiently; users are automatically notified of the latest updates on their mobile devices. Hik-ProConnect brings disparate devices together to increase security as a whole, expanding both performance and value for users. This goes beyond conventional systems made up of disparate elements. Integration of devices provides users with flexible methods for setting rules for event types, time schedules and triggered actions. Examples of device linkage include merging intercom calls and intrusion or access events with video verification. Users can access and manage their connected devices with one login and on one platform from anywhere, at any time. The solution supports both web-based portal and mobile app. Hik-ProConnect employs industry standards and protocols for maximum security and reliability. This includes the TLS protocol for private and secure data transmission, a user-defined AES encryption key for stream encryption, and more.

47


bulletin aug20_000_Benchmark_apr15 10/07/2020 18:06 Page 5

BULLETIN

Bosch unveils open platform cameras Bosch has launched INTEOX, a new camera platform designed to modernise the security and safety industry. The first fully open platform of its kind, INTEOX gives users, system integrators and application developers unlimited freedom for innovation and customisation. The Internet of Things (IoT) presents new opportunities for individuals and businesses. However, to take full advantage of the opportunities that the IoT brings, the safety and security industry must embrace change. Bosch is demonstrating the vast potential of the IoT with INTEOX. The INTEOX open camera platform combines built-in Intelligent Video Analytics from Bosch with a commonly used open OS, and the ability to add software apps securely. The new powerful platform supports latest technologies. For example neural network based analytics, the next step in machine learning and Artificial Intelligence, is supported. INTEOX enables app developers and integration partners to take advantage of its built-in intelligence and capabilities to easily develop unlimited software apps based on a common language. At the same time, system integrators can customise their solutions to meet specific and changing customer requirements by adding apps and deploying them into INTEOX cameras. ‘As sophisticated sensors with Intelligent Video Analytics built-in as standard, INTEOX cameras can provide valuable data that can be analysed and used in a wide variety of new and beneficial ways, many of which the

48

industry can only imagine,’ stated Michael Seiter, senior vice president, responsible for the Bosch Video Systems & Solutions business. An open platform approach has already proven successful in the computer and mobile phone market, where software and apps have become an integral part of daily life. For example, apps provide immediate information, instant communication and connection, improved work productivity, and simplified daily tasks. These benefits extend to security cameras. By having an open platform, developers can work with integrators to address their customer’s business challenges. The INTEOX camera platform will power an entirely new line of MIC, AUTODOME, FLEXIDOME, and DINION fixed and moving cameras supported by an open IoT infrastructure. Developed by Security and Safety Things GmbH, a Bosch start-up company, this IoT infrastructure is based on four pillars: an open OS based on Android Open Source Project and strengthened for increased security; an application store to access relevant apps; a web portal for app developers and designers; a device management portal that shows app and device health statistics and enables easy management of apps. The INTEOX cameras, together with the IoT infrastructure, enable app developers, system integrators, integration partners, and other market players to create customerspecific apps and insert them easily into INTEOX cameras.


Project2_Layout 1 10/07/2020 16:53 Page 1

Build confidence back into the workspace

The new Genetec Occupancy Management Package Monitor the number of people in your facility. Learn more about the Genetec Occupancy Management Package. Find out more at www.genetec.com


wwwBM_000_Benchmark_april15 09/07/2020 14:39 Page 3

Benchmark

TECHNOLOGICAL INNOVATION & SMART SOLUTIONS

BENCHMARK Driving innovation and smart solutions The Benchmark website is the leading information resource for those implementing smart solutions for security, safety, site management and business intelligence. It includes assessments of the latest technologies and solutions, as well as guides to system design, independent technology-based articles and information about the latest smart technologies. Benchmark believes the future of many businesses and organisations lies in the creation and use of innovative and bespoke smart solutions which deliver multiple benefits to end users, and which can provide a tangible return on investment across a number of departments. As converged solutions become increasingly important in the modern commercial world, it is vital businesses and organisations can realise the wealth of efficiencies on offer. To ensure this is achieved, it is critical that the added value available from modern technology resources is fully exploited.

Benchmark delivers the information needed to enable integrators and end users to fully realise the potential from modern smart solutions. As the technological landscape evolves and the business community faces ever greater challenges, so the deployment of smart solutions becomes critical for the success of a wide range of ventures. With expertise in a number of technological fields, Benchmark provides unrivalled coverage across a number of sectors. Designed to be easy to navigate, and with a strong focus on presenting the pros and cons of various technologies and design approaches, Benchmark makes it easy for those with an interest in smart solutions, intelligent buildings, IoT and smart cities to access up-to-date independent information to help create a more efficient future.

www.benchmarkmagazine.com


Project1_Layout 1 10/07/2020 18:19 Page 1

TOUCH-FREE,

ACCESS IS EASIER THAN EVER MinMoe FACE RECOGNITION TERMINALS • Access control and time attendance tracking • Optional version with thermographic camera built-in delivering efficient skin temperature measurement

• Accuracy rate over 99% and recognition speed under 0.2 seconds • Fast recognition in low-light environments - Search Hikvision


Project2_Layout 1 09/07/2020 14:48 Page 1

Bosch IP 3000i cameras. Extend smart video surveillance to general surveilance applications. Bosch all-new IP 3000i cameras offer high-quality, 24/7 performance and something never seen before in such competitively-priced cameras; built-in Essential Video Analytics as standard. Micro dome, mini dome, bullet and turret options are available with resolutions of up to 5MP for indoor and outdoor use. This intelligent solution is an industry first for general, cost-effective video surveillance.

Find out more at boschsecurity.com


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.