Category Archive ความรู้กล้องวงจรปิด

Byadmin

Thai security market: Insights and growth opportunities from Dahua Technology’s Managing Director

With a presence in the Thai market for nearly 15 years, Dahua Technology has established itself as a prominent player in the local market. As one of the leading suppliers in Thailand, Dahua, along with Hikvision, controls a significant portion of the video surveillance market.

Traditionally working with the commercial channel (distributors and resellers), in the last 18 months, Dahua Thailand also added a dedicated project team for B2B or B2G projects that works directly with SIs and assist in integration and software capabilities.

As part of our coverage of the Thai security market, we had a chance to interview Mr. Aaron Ding, MD of Dahua Technology (Thailand). In this interview, Mr. Ding shares his analysis of the current market trends and future potential and discusses the challenges and growth drivers that shape the Thai security market.

asmag: Overall, how did the Thai security market perform in 2022? What were some of the major growth drivers that you have seen?

Ding: In 2022, the security industry faced tremendous challenges. There was post-pandemic economic slowdown and rising interest rate, individuals and companies were spending less on new investment and renovation of ELV equipment. Despite the adversities, there were still opportunities in AI-enabled solutions like intelligent recognition.

asmag: How do you think the Thai security market will perform in 2023? Will it experience higher growth compared to 2022? Will growth be generated more by public sector or private sector?

Ding: Overall we predict a fast recovery and are optimistic about the Thai security market performance in 2023. Tourism is recovering, and this brought up a need for modernizing hotels, retail and all the other facilities that cater to tourists and need security solutions. Apart from hospitality, FDI in the manufacturing industries in Thailand will be resulting in a 25 percent growth compare with last year, according to public information. If we look specifically at Chinese FDI, electric car manufacturer BYD also setup a manufacturing facility in Rayong. The Chinese investment in factories in Thailand is growing and there is demand for security solutions. They need safety, security and production efficiency.

asmag: Do you feel there is any special demand in the market for a specific solution (e.g. access control, video surveillance, parking, time and attendance, biometrics, etc.)?

Ding: Parking management and traffic management are two demanding sectors. We have a comprehensive solution for traffic management that can intelligently sync with traffic lights and help with traffic violation enforcement. Another sector where there is big potential is intelligent parking systems. Parking in Thailand is complicated, most of the parking spots are private and have different rates and regulations. Dahua is looking to provide a more systematic parking experience, build an ecosystem that can help parking lot management become more efficient. Besides, EV car charging will be a special demand in the market for a specific solution. Installing cameras not only can provide record to help address any potential security issues but also help car owners easily find and book an available EV charging station.

asmag: What security technologies (AI, cloud, etc.) are trendy in Thailand? What user challenges/needs do they solve?

Ding: I think that AI will be a really important trend not just in Thailand but in any countries. DAHUA has accumulated over 5 years of technical expertise and a large number of global application cases in the field of AI technology. We have provided services to various industries in Thailand. For example, AI-based recognition can help make factories safer by making sure employees wear safety helmets to avoid accidents.

asmag: What would you describe as the biggest challenge for market growth?

Ding: I think the biggest challenges for the development of the security market are twofold. Firstly, the increasing demands of national regulations and compliance requirements, such as The Personal Data Protection Act (PDPA) in Thailand. Secondly, although the world’s technology industry is rapidly developing, there is still a shortage of talent in certain areas, such as AI technology and data analysis, this can affect companies’ ability to drive technological innovation and development.

Byadmin

Hikvision adds two new 5 MP ColorVu TurboHD cameras to its lineup

Hikvision, a manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, introduces two new 5 MP ColorVu TurboHD camera models into its series of HD over analog products. The new 5 MP Non-Distorted ColorVu Audio Fixed Mini Bullet (DS-2CE10KF0T-FS) and the 5 MP Non-Distorted ColorVu Audio Fixed Turret (DS-2CE70KF0T-MFS0) cameras deliver high-definition imagery and 24/7 full-color visuals for the ultimate viewing experience.

John Xiao, Vice President of Marketing, Hikvision USA said, “The introduction of our 5 MP ColorVu TurboHD cameras means end users get crystal clear video and images over analog cabling, enhancing quality while eliminating the need to rip and replace existing cabling infrastructure.” He added that “Hikvision’s TurboHD lineup paired with innovative ColorVu technology is a game changer for customers who need outstanding quality and peace of mind.”

The new 5 MP ColorVu TurboHD Cameras promise no distortion during video preview or playback when applied to standard widescreen monitors. Integrated ColorVu technology further ensures consistently clear imaging day or night, capturing every detail in full color with absolute precision.

In addition to delivering high-quality imaging, the 5 MP ColorVu Bullet and Turret TurboHD Cameras are both equipped with a built-in microphone. This feature eliminates the need for an additional microphone and guarantees high-quality, real-time audio recording.

“By integrating a microphone directly into the cameras, we offer our customers an all-in-one solution for both video and audio recording,” said Xiao. “This ultimately simplifies installation and reduces costs while ensuring users experience high-quality, real-time audio alongside exceptional visuals.”

Since their launch, Hikvision’ s TurboHD Series of analog products have been applauded around the world for their amazing capabilities. Designed to work over existing coaxial cables to deliver HD video and images, TurboHD Cameras eliminate the need to rip and replace cables to upgrade to IP cameras. This allows security professionals to enhance their situational awareness without the hassle and expense of replacing existing infrastructure.

Source: Hikvision Date: 2023/07/13 Related tags: Hikvision, surveillance cameras

Byadmin

Hanwha Vision’s latest innovation the SolidEDGE camera set to revolutionize video surveillance

Hanwha Vision, a leading provider of innovative security and video surveillance solutions, has launched the latest addition to its lineup, the SolidEDGE camera. This camera, which comes in two models, the PNV-A6081R-E1T and PNV-A6081R-E2T, is the first real Solid State (SSD) drive-based camera with an embedded server on the market. This unique and powerful combination of a server-less cloud-managed solution via Wisenet WAVE Sync and a camera with built-in SSD storage provides unparalleled performance and reliability for businesses of all sizes and industries.

One of the most significant benefits of the SolidEDGE camera is running the Wisenet WAVE VMS on the EDGE; in other words, a true server-less solution. In the world of video surveillance, there has been a growing need for a more efficient and cost-effective solution to ensure safety and security. Traditional video surveillance systems require a separate server to manage the cameras, events, record, and playback, which can be costly and time-consuming to set up and maintain. With the SolidEDGE camera, there is no need for a separate server, which could be a more cost-effective and practical security solution for businesses and organizations. This innovative system provides high-quality, reliable video surveillance without needing a complicated setup or scheduling OS and security updates.

The SolidEDGE camera runs on the embedded Linux operating system with a powerful hardware system on the edge, featuring a quad-core CPU, a dedicated encoder, and 4GB of RAM. But the real star of the show is the built-in Rugged Industrial-Grade SSD, which not only hosts the recording server but also stores the recorded video. This feature provides several advantages over traditional surveillance systems.
The SSD hosts the recording of video, database, and WAVE installation files, ensuring that any incident is captured without any delay.
It makes the system more reliable since there is no need to rely on external servers or cloud storage.
The recorded video is more secure, as it is stored locally and is not susceptible to hacking or unauthorized access.

The SolidEDGE camera allows scalability and flexibility. As each EDGE camera can connect and record up to 5 additional cameras, organizations can easily expand their surveillance systems as their needs grow. In addition, it comes equipped with cloud video management using WAVE Sync, which enables users to remotely access and manage the surveillance system, keep the camera up-to-date, and seamlessly manage its video footage and data on-premise and from the cloud. This allows users to customize their surveillance system according to their specific needs easily.

The SolidEDGE security solution comes equipped with a host of key features that set it apart from traditional security solutions. Let’s take a closer look at each of these features.
Server-less Solution
The SolidEDGE camera comes with a built-in rugged SSD drive that hosts the WAVE VMS server, which eliminates the need for a separate server. It also comes with two storage options that users can choose from: the PNV-A6081R-E1T model with 1TB SSD storage or the PNV-A6081R-E2T model with 2TB SSD storage, depending on their needs. This saves not only costs but also space and maintenance time, making it a practical and convenient solution.
Flexible System Structure
Each SolidEDGE camera with Wisenet WAVE can add and record up to 5 additional cameras, bringing the total number of cameras per EDGE system to 6, including the SolidEDGE camera’s video stream. This enables users to customize and tailor the SolidEDGE cameras to meet their specific security needs, providing a customized and flexible system structure.
Cloud Video Management with WAVE Sync
The SolidEDGE system architecture allows for the use of WAVE Sync, giving additional flexibility to the system. This feature enables remote access and management of on-premise security systems from anywhere in the world.
System Scalability
The SolidEDGE camera can be scaled further by adding additional SolidEDGE cameras, providing additional flexibility to organizations looking to scale their video surveillance systems. The maximum bandwidth per server (camera) is 33Mbps and uses H.265 on the primary stream and H.264 on the secondary stream. This feature allows the system to grow with the user’s security needs without impairing performance.
SSD Status Management
The built-in SSD drive of the SolidEDGE camera offers reliable storage for video data within a wide range of operating temperatures. The SSD status management feature provides information on the health of the SSD drive, ensuring the system is running smoothly.
Next-Level Cybersecurity
The SolidEDGE camera uses a TPM 2.0 (FIPS 140-2 level 2) certified P series AI camera that validates the boot process, securely stores key information, and preempts hacking risk through unauthorized access blocking. This ensures the security of data stored in the system, protecting against unauthorized access and cyberattacks.
Reinforced Durability
The SolidEDGE camera has been designed with reinforced durability features. The metal-shielded RJ-45 terminal and enhanced grounding frame structures protect the camera from transient voltage, including lightning and static electricity. In addition, the hard-coated dome bubble encapsulating the camera provides better resistance to scratches from external stimuli, preventing the degradation of resolution by minimizing the scratches.
Improved Weather Resistance
The SolidEDGE camera has a built-in air vent that provides water vapor control. This prevents condensation and allows long-term use while maintaining performance.

To sum up, the SolidEDGE camera has proved to be a game-changer in the world of video surveillance. With a plethora of features, including the server-less solution, built-in SSD storage, flexible system structure, cloud video management, and enhanced cybersecurity, the camera has set a new standard in the industry. The SolidEDGE camera’s exceptional durability and weather resistance ensure the camera can withstand extreme conditions and provide uninterrupted surveillance. Overall, the SolidEDGE camera is ideal for organizations that demand a reliable, flexible, cost-effective, and advanced video surveillance solution. With unique features and advanced technology, the SolidEDGE camera offers unparalleled value to organizations of all sizes and industries.

Source: Hanwha Vision Date: 2023/07/17 Related tags: Hanwha Vision, IP cameras, security cameras

Byadmin

AI-low light surveillance: top firms share insights

Low-light surveillance solutions are becoming more and more sophisticated, thanks to recent advancements in hardware and software. Integrating artificial intelligence and machine learning has been the icing on the cake, enabling an incredible level of data capture.

Some of the leading video surveillance companies are at the forefront of this revolution, incorporating innovative strategies to take maximum advantage of cameras and algorithms. We recently spoke to Hikvision Digital Technology, Axis Communications, and Motorola Solutions to know more about their approach regarding this.

This article explores perspectives from these three companies and offers insights on how integrators can make use of what’s available in the market for better results.
AcuSense Technology from Hikvision
Hikvision has long demonstrated a deep engagement in the domain of low-light surveillance. Their proprietary AcuSense technology introduces a suite of intelligent features, empowering customers with a security solution that is not merely reactive but notably proactive.

“By integrating with AcuSense technology, our low-light imaging cameras can help achieve more security intelligence and effectively capture targets in true color,” said Rubio Hong, Product Director at Hikvision. “The AcuSense technology can distinguish persons and vehicles from other objects in the environment, minimizing false alarms triggered by animals, falling leaves, heavy rain, and other moving objects, which enables businesses and homeowners to focus security resources on real threats. While our low-light imaging cameras equipped with the Live Guard function can deter trespassers with visual and auditory warnings while sending notifications to users remotely.”

False alarm prevention is becoming increasingly important in today’s security scene. With the digital transformation of numerous industries, the number of alert events has increased exponentially. As more technology is integrated into the operations of businesses, households, and public safety groups, the volume of data produced – and hence the possibility for false alarms – has increased.

False alarms can be more than an annoyance; they can also be a considerable waste of resources. Responding to a false alarm frequently diverts law enforcement or security teams away from real dangers, compromising overall security preparation. Furthermore, these circumstances can lead to ‘alarm fatigue,’ in which many false alarms lead to complacency, increasing the danger of missing a legitimate alarm.

Furthermore, false alarms might have significant financial consequences. Repeated false alarm activations may result in fines in many jurisdictions, while in a commercial setting, they can result in lost labor and operational inefficiency. As a result, false alarm prevention is a critical performance measure for modern surveillance solutions and plays a vital part in establishing the technology’s return on investment.
Thermal and low-light performance with Axis Communications
Hiroshi Ochiai, Director of Alliances, Portfolio, and Customer Services in APAC for Axis Communications, said that one specific example here is the company’s edge-based intrusion detection analytics, AXIS Perimeter Defender with AI-based object classifications to be used with their thermal cameras.

“Using thermal cameras, you can visualize the scene even under complete darkness,” Ochiai said. “AXIS Perimeter Defender with AI-based functionality is based on deep learning algorithms, which can classify humans and vehicles without any user calibration. It provides optimal performance and greater reliability with fewer false alarms, even in challenging lighting and weather conditions. Another example is our edge-based object detection and classification analytics, AXIS Object Analytics.”

Utilizing AI-based algorithms, AXIS Object Analytics has the ability to detect, analyze, and classify various objects in a scene, including humans and vehicles. While this system is compatible with multiple cameras, it’s crucial to note that for optimal utilization of these analytics, effective low-light performance is essential. Ensuring adequate results in low light is key to reaping the full benefits of AXIS Object Analytics and ensuring accurate, reliable surveillance results.
Leveraging convolutional neural network with Motorola Solutions
Hamish Dobson, Corporate Vice President for Product – Video Security and Access Control at Motorola Solutions, pointed out that Avigilon cameras are built with AI-powered video analytics to extend the effectiveness of security teams by proactively flagging potentially critical events in need of attention without the need for constant live monitoring by security teams.

“On the H5A Thermal camera, we have evolved our AI-powered analytics engine to a higher level with dedicated Convolutional Neural Network (CNN) training for the thermal imagers, improving object detection and classification accuracy,” Dobson said. “Previously, the analytics could only classify objects when they were moving, but now objects can also be classified even if they remain stationary (e.g., a parked car or a person standing still). Another significant benefit of the H5A thermal camera is its object detection and classification speed. The camera’s analytics can instantly detect and classify an object (person or vehicle) in real-time.”

In the past, analytics systems relied heavily on tracking an object’s movement, taking several crucial seconds to identify its motion and shape before a classification could be issued. However, in the realm of perimeter security, this time lag can pose serious challenges.

For instance, a trespasser might move swiftly across a camera’s field of view, potentially remaining undetected without comprehensive camera coverage. Therefore, speed in detection and classification is of utmost importance, and the advancements in today’s technology are geared toward overcoming these latency issues for optimal security.
Conclusion
In short, the physical security industry is in a transformative period where technology is reshaping our approach to protection. Low-light surveillance solutions, backed by advanced algorithms and artificial intelligence, are becoming critical tools in our quest for safety and security.

Companies like Hikvision, Axis Communications, and Motorola Solutions are spearheading this revolution, offering increasingly sophisticated solutions that not only capture and analyze data but do so proactively, enhancing the effectiveness of security teams.

The strides made by such companies in AI-integrated surveillance solutions – whether it be Hikvision’s AcuSense technology, Axis Communication’s edge-based analytics, or Motorola’s use of Convolutional Neural Networks – represent a seismic shift in the surveillance industry. These developments are enabling accurate object detection and classification, even under challenging conditions, and minimizing false alarms, allowing businesses and homeowners to focus on genuine threats.

Source: Prasanth Aby Thomas, Consultant Editor Date: 2023/07/11 Related tags: low light

Byadmin

Maximizing ROI in perimeter security: an integrator’s guide

In the swiftly changing security landscape, the need for dependable and cost-effective perimeter security and intrusion detection systems is greater than ever. Leaders in security are tasked with the crucial duty of preserving the integrity of vital infrastructures. In addition, they must guarantee a positive return on investment (ROI) from these systems.

Maximizing ROI in perimeter security: an integrator’s guide

To achieve this delicate equilibrium, a thorough understanding of the various factors in play is required. These include the deployed systems, their associated costs, and the potential cost savings that could be realized by preventing security breaches. In other words, evaluating ROI for perimeter security is not solely a matter of calculating immediate costs.

It goes even further, to incorporate a future-oriented perspective, one that considers the financial repercussions of prospective security threats and the protective value of existing systems. In this article, we examine the multifaceted nature of ROI evaluation, the benefits of device integration, and the advantages of open platforms, all with the goal of assisting security integrators in optimizing their ROI while maintaining the highest levels of security.

An all-inclusive approach to ROI evaluation
Evaluating the ROI of security solutions is a difficult undertaking, according to Alan Stoddard, President of Intellicene. It is not only about the initial price of a system, but also about installation, maintenance, and upgrades. It’s also about the future – the cost savings associated with avoiding security breaches, which can result in major financial losses due to disruption, data theft, or legal liability.

“Perimeter security within critical infrastructure plays a critical role in day-to-day activities that underpin economic and social stability,” Stoddard said. “The effective protection of these sites is paramount to facilitating a thriving global economy — one that relies on these facilities to deliver utilities and services in a safe and efficient manner. But security leaders must also ensure the systems they deploy are cost-efficient and deliver long-term ROI.”

A full understanding of several variables is required to assess the ROI of such technology. The most important of them is comprehending the whole cost involved, from system setup and current maintenance through potential improvements. Aside from that, it’s critical to consider the financial rewards of preventing security breaches. Given the possible economic dangers involved with operational interruptions, compromised data, or legal duties resulting from security breaches, these rewards can be significant.

Utilizing integration to save money
Stoddard contends that integrating devices onto a uniform platform can provide considerable cost savings. More efficient operations can be achieved through a better management, consolidated reporting, and the capacity to automate security response processes. This integration can result in significant cost savings by reducing the effort for security teams and lessening the risk of human mistake.

“Integrating devices onto one platform can also provide significant cost benefits such as streamlined management, more intelligent data and centralized reporting, and the ability to automate security response processes,” Stoddard added. “This can lead to more efficient security operations, reducing the workload for security teams, and lowering the risk of human error.”

Integration can also improve the performance of the security system. Users may benefit from gaining a wide range of information at scale by combining new and legacy devices, assisting teams in identifying critical data and assuring higher levels of perimeter protection. This integrated strategy has the potential to dramatically boost the system’s ROI.

“With the demand to simplify and improve the efficiency of existing technology investments, there is a greater interest in solutions that enable the integration of both legacy and new devices,” said Stoddard. “By integrating all devices and data points, users can analyze and visualize disparate information at scale to help teams identify the data that matters and ensure higher levels of perimeter protection. And they can combine legacy and new technologies into one system for greater ROI.”

The benefits of open platforms
John Rezzonico, CEO of Edge 360 emphasizes the need of open platform approaches in a multi-layer perimeter security strategy. He believes that an open platform may supplement personnel by allowing for real-time monitoring, situation management, and assistance with investigative and forensic needs.

“From facing evolving terrorism threats and crime to complying with rules and regulations, perimeter security environments are high-risk and leave little room for error,” Rezzonico said. “Video surveillance technology is part of any multi-layer perimeter security strategy. It augments personnel and enables operators to effectively engage in real-time monitoring and situation management while supporting investigative and forensic needs. An open platform approach combined with integrating with other third-party systems allows organizations to benefit from other best-in-class technologies to promote a more robust security posture and permit a coordinated emergency response when necessary.”

Rezzonico also emphasizes the many advantages of open and future-proof video management technologies. These platforms provide increased versatility by combining with various cameras, sensors, and third-party applications, resulting in cost savings and improved ROI. Customers can alter system components as needed without having to replace the complete system, resulting in cheaper overall expenditures.

“Open and future-proof video management platforms have multiple benefits that can increase the return on investment in these environments,” Rezzonico said. “These solutions provide enhanced flexibility by allowing integration with different cameras, sensors, and third-party applications. This flexibility can result in cost savings and a better ROI.”

Moreover, open platforms may adapt to changing technology and industry norms, ensuring the investment’s relevance and efficacy for years to come. They can also communicate with other security systems, such as access control or video analytics, to improve situational awareness and response times. All of these qualities add up to a higher ROI over time.

“These platforms offer scalability, which enables customers to add or remove cameras and sensors as needed without replacing the entire system, leading to lower overall costs,” Rezzonico added. “Another advantage is future-proofing, which ensures that the investment will remain relevant and effective for years to come by adapting to emerging technologies and industry standards.”

Conclusion
To summarize, measuring ROI in perimeter security involves a comprehensive methodology that takes into account not just the current system expenses, but also future savings from averting security breaches. Integration solutions, such as combining devices into a unified platform and utilizing open platform approaches, provide considerable benefits.

They improve cost-efficiency, streamline management, and enable flexibility and adaptability to new technology. These systems’ scalability decreases overall costs by allowing for adjustments without replacing the entire system.

Integrating other security systems also increases situational awareness and saves response times, increasing ROI. In short, optimizing ROI in perimeter security requires a combination of cost, efficiency, adaptability, and futureproofing to ensure long-term success in today’s complicated security context.

Source: Prasanth Aby Thomas, Consultant Editor Date: 2023/05/11 Related tags: perimeter security

Byadmin

Hikvision releases new 5 MP network fisheye camera

Hikvision releases new 5 MP network fisheye camera

Hikvision, a world-leading manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, continues to add products to their extensive lineup by announcing a new 5 MP AcuSense Fisheye Network Camera (Model DS-2CD3956G2-ISU).

This new camera delivers high quality images with efficient H.265+ video compression and employs Hikvision AcuSense technology, which is powered by deep learning algorithms to bring human and vehicle target classification alarms to front and backend devices to minimize false alarms. This latest addition to Hikvision’s lineup of emerging security technologies was developed in response to market demand for security products that deliver reliable high-performance operation and extreme value.

“Our fisheye cameras are a great way to cover large areas with outstanding image quality and dynamic range,” said John Xiao, Vice President of Marketing, Hikvision USA. “This new AcuSense fisheye model incorporates some of our newest and most advanced technologies. Hikvision is committed to innovation and bringing users technology that improves security and situational awareness.”

Hikvision’s AcuSense technology embeds deep-learning algorithms into cameras and video recorders to automatically detect through real-time analytics and push instant notifications to users’ mobile devices. False alarms are minimized by only identifying humans or vehicles, and avoiding triggers from animals and falling leaves, for example.

The new 5 MP AcuSense fisheye network camera also features:

• Support for Hikvision Embedded Open Platform (HEOP) and importing third-party applications
• 1.5 TOPS computing power, 60 MB system memory, 400 MB smart RAM, and 2 GB eMMC storage for sharing resources
• 180° fisheye views
• 360° and 180° de-warping display modes
• High quality imaging with 5 MP resolution
• Up to 4 live-view display modes
• Clear imaging against strong backlight with 120 dB true WDR technology
• Extensive network security functions
• Built-in microphone

 

Source: Hikvision Date: 2023/05/10 Related tags: Hikvision, fisheye camera

Byadmin

Cloud and on-prem access control: navigating privacy, compliance, and training

With the increasing acceptance of cloud-based solutions, the access control market has seen a considerable transformation in recent years.

Cloud and on-prem access control:

Scalability, cost-efficiency, remote management, and real-time monitoring are all appealing features for security integrators. As more businesses migrate to cloud-based systems, integrators must stay aware on the privacy, legal,

and regulatory issues that come with implementing these solutions.

In addition to comprehending the privacy and regulatory context, integrators must be aware of the training and support required when dealing with cloud-based access control systems. Providing integrators with the necessary knowledge and resources can have a significant impact on the success of installing these advanced security solutions for clients.

This article seeks to provide essential information that will assist access control systems integrators stay ahead in this ever-changing business by addressing the problems and issues around privacy, legal and regulatory compliance, and the training and support required for integrators. Integrators who are well-informed and prepared will be in a better position to successfully deploy cutting-edge security solutions for their clients, ensuring both security and customer satisfaction.

Considerations regarding privacy and the law

Several legal and regulatory factors must be taken into account when installing a cloud-based access control solution. Personal data must be secured and processed in accordance with data privacy legislation such as the GDPR. HIPAA for healthcare and PCI for finance are two examples of industry-specific rules and standards that must be followed.

“It does depend on the region,” explained Andrew Scothern, Security Chief Architect at Gallagher. “GDPR is the most well-known legislation, but many countries have their own standards, especially at the High Security end of the market, for how systems should be architected and operated when in the Cloud. System and Organization Controls (SOC2) compliance is a major consideration for many when considering Cloud hosted services.”

John Szczygiel, EVP and COO of Brivo, pointed out that customers demand solutions that meet internationally recognized security standards and audit practices such as SOC 2 and ISO 27001 to ensure that the solution and any sensitive data are protected.

“A cloud-based security provider must have a solution where security is baked into its products and applied in data centers, field hardware, people and processes,” Szczygiel said. “Everything from how products are built to how applications are deployed must be designed with cybersecurity and data protection in mind.”

Integrators’ training and support
Experts agree that training and support for integrators working with cloud-based access control systems should be similar to that offered for on-premise systems. The majority of the installation work (doors, readers, panels, inputs, outputs, etc.) is done on-premise. The quantity of training necessary to configure a system is determined more by the quality of the client software than by the location of deployment.

“For a well-designed system the training shouldn’t be too different between Cloud based and on- premise systems,” Scothern said. “In both cases most of the work installing the system is on-premise, and it is only the client server software that is deployed differently. The amount of training required to configure a system is then dependent on how good the Client software is rather than where it is deployed.”

The same is true for integration points. A well-designed set of APIs is far more impactful than where the software is deployed. In saying that, a system that makes it easy and secure to connect from other cloud systems can be a big help to cloud based integrations.
Szczygiel suggested that beyond the typical technical training and certification, integrators may need assistance with connecting the customers enterprise applications such as HR and Identity Management systems with the access control solution via application programming interfaces (APIs).

“Solution providers should be prepared to support the integrator and end-customer with a professional services team that can smooth the way to achieving value from these API integrations,” Szczygiel added.

Seongbin Choi, Head of R&D Center at Suprema, added that both cloud-based, and on-premise solutions require integration and data transmission with third parties. Training about REST API and JSON (JavaScript Object Notation) will be essentially needed for the integrators.

To ensure success, integrators should acquire high-impact training and technical certifications. In-person and hands-on training, as well as virtual choices, should be available, allowing integrators to work at their own pace or attend live sessions. Furthermore, API support should be provided for linking customers’ corporate applications, such as HR and Identity Management systems, to the access control solution.

Conclusion
As cloud-based access control systems continue to acquire traction in the security industry, it is imperative that integrators keep abreast of the most recent advancements and best practices. Integrators can ensure that their clients’ systems are both secure and compliant with applicable laws and regulations by addressing privacy, legal, and regulatory considerations. This not only helps maintain a positive reputation within the industry, but also fosters trust between integrators and clients.

In addition to compliance, integrators must prioritize the training and support necessary to operate cloud-based access control systems effectively. By investing in exhaustive training and certification programs, system integrators can acquire the skills and knowledge required to navigate the unique challenges presented by cloud-based solutions. This, in turn, will enable integrators to provide superior service and support to their clients, further solidifying their position as industry leaders.

In conclusion, the successful deployment and management of cloud-based access control systems depend on the ability of integrators to navigate the complex landscape of privacy, legal, and regulatory considerations, as well as their dedication to continuous learning and improvement. By remaining informed and proactive in addressing these challenges, access control systems integrators can not only enhance their own expertise, but also contribute to the success and security of their clients’ organizations. This commitment to excellence will unquestionably pave the way for continued growth and innovation in the world of access control in a rapidly evolving industry.

Source: Prasanth Aby Thomas, Consultant Editor Date: 2023/05/09 Related tags: access control

Byadmin

CyberLink releases People Tracker, using the latest in AI technology for greater surveillance and security

Tracker using the lastest in AI

CyberLink, a pioneer in AI and facial recognition technologies, has announced the People Tracker solution. Widely used in the fields of surveillance and  security, AI people tracking technology uses artificial intelligence to recognize and track the movements of individual subjects. Video search efficiency and investigation times are greatly improved, enhancing surveillance capabilities in tracking persons of interest, finding missing or lost people faster and overall security.

People Tracker expedites video investigations by combining three AI people tracking technologies.

Person attribute recognition

Deep learning extracts physical attribute information from image data (gender, age, clothing, and accessories). When an image isn’t available, known attributes can be set as search criteria.

Person re-identification

Using full-body images, people can be tracked in chronological order across multiple cameras based on their physical attributes – helping to expedite the search process.

Facial recognition

When a clear facial image is present, CyberLink’s AI facial recognition engine, FaceMe, improves search accuracy by identifying people through the recognition of their faces captured by cameras.

Applications for People Tracker

Any area with video surveillance can add People Tracker to improve speed and efficiency of video search and total security, but in areas with high foot traffic People Tracker can be crucial, particularly shopping malls, department stores, and sports stadiums. People Tracker is also an excellent tool for locating lost individuals. Hospitals may have lost and wandering patients due to head trauma, dementia, or medication side effects – People Tracker can help locate them faster. Residents at assisted living facilities may be disoriented with dementia or Alzheimer’s, People Track can help ensure they are found quickly to ensure proper ongoing care.

“People Tracker is an AI computer vision trifecta with superior recognition and computing powers,” said Dr. Jau Huang, Chairman and CEO of CyberLink. “Compatible with major VMS providers, People Tracker takes security and surveillance to the next level without the need for equipment upgrades or additional resources.”

Source: CyberLink Date: 2023/05/04 Related tags: CyberLink, AI

Byadmin

Taiwan shows the world why it’s a leader in smart transportation

Smart transportation is a key objective in smart city initiatives. But how many projects have actually been deployed? This note examines some interesting case studies from Taiwan.

Needless to say, urbanization is in full swing. More residents are migrating from rural to urban areas. This then leads to certain municipal issues like crime and pollution.

Also, transportation has become a source of headache. Cars are on the increase, making it more difficult to park or drive on congested highways. In this regard, AI and IoT can address traffic-related issues and turn driving/bus rides into a greater experience.

In its report, Grand View Research points out: “The necessity for presenting real-time traffic information of different regions to passengers and drivers is one of the significant factors driving the demand for intelligent transportation systems across the world.” According to the report, the global intelligent transportation system market size was valued at US$26.58 billion in 2019. It is projected to register a compound annual growth rate of 5.8 percent from 2020 to 2027.

Indeed, this all sounds very good. But how many real use cases are there? In the Taipei Smart City Summit and Expo (SCSE) held March 23-26, the city is demonstrating many interesting projects. Below are some of them.

Dynamic traffic lights

Traffic bottlenecks are oftentimes caused by inefficiencies in static traffic signals. For example, a green light lasts for minutes even when there’s little vehicular or pedestrian traffic. This then causes traffic congestion to form on the intersecting roadway.

One answer to this is dynamic (or adaptive) traffic signal control. Under such scheme, each signal cycle is automatically adjusted to the traffic situation at the time.

Taipei City, in collaboration with International Integrated Systems (IISI), has developed and deployed dynamic traffic controls at various intersections. The system entails IP cameras that process video data on the edge. The resulting metadata is then transmitted to the backend, which controls the signals.

“Regular-hour and rush-hour traffic conditions are different. Signal cycles can be adjusted accordingly, as seen by the IP camera,” said Gw Chen, Planner for Intelligent Transportation Division at IISI.

“Also, a pedestrian crossing tends to have more people during daytime and fewer people during the night. Our dynamic traffic control system can adjust the length of green lights accordingly, ensuring smoother traffic,” Chen added.

The solution has already shown positive results. IISI data shows the average traffic idle time has reduced by 15 percent and carbon emissions by 1,114 tons at intersections where the signals are installed.

Autonomous buses, 5G and V2X

Needless to say, the concept of autonomous vehicles is gaining traction. In many cities, not just vehicles, but autonomous buses are being trialed. This includes Taipei City where a lane on Xinyi Road is dedicated to autonomous bus trial runs. The city is currently collaborating with telecom operator Far EasTone (FET) which provides the 5G network.

Why use 5G over 4G? The answer lies in low latency.

According to Internet of Vehicles protocols, autonomous vehicles must work within a latency timeframe of 100 milliseconds. This is only achievable through 5G. Under 4G, a back-and-forth communication cycle takes some 15 seconds.

“The autonomous bus needs to constantly interact with its surroundings. Sometimes the bus lane becomes a bit curved. Sometimes, something is in the front. The bus needs to respond in matters of milliseconds,” said Edward Cheng, Asisstant Manager for Enterprise and Carrier BU at FET.

“In this sense, only 5G can provide the low-latency communication that makes this possible,” he said.

Through this collaboration, Taipei autonomous bus trial has entered into its second phase. If all goes well, commercial operation can begin in the near future.

FET, meanwhile, is also planning V2X proof-of-concept in Taiwan. V2X refers to vehicle-to-everything, an umbrella that includes various sub-technologies.

V2I, for example, allows communications between vehicles and the infrastructure. This way data picked up by the roadside unit can be transmitted to the vehicle’s onboard unit. Drivers then can avoid congested roads or full parking lots. V2V, on the other hand, enables communications between vehicles and vehicles.

Other smart transportation solutions

Several exhibitors also showcased their latest transportation-related solutions at the show. LILIN for example demonstrated their solution for law enforcement. LILIN IP cameras can catch activities including: illegal parking, illegal U-turns, illegal left turns, etc. Their license plate recognition software can further help police with fine issuances. Projects are already deployed in several cities in Taiwan.

LILIN also has a fisheye solution. It can identify all vehicle types – cars, trucks, bikes – in a given area with no missing spots. The resulting data can be used by city administrators for traffic management and planning.

Byadmin

Axis Communications and Robotics Cats provide early wildfire detection to animal sanctuary

AXIS Q6215-LE PTZ Network Camera and AXIS P1378-LE Network Camera together with RoboticsCats AI-Cloud wildfire detection SaaS (Software-as-a-Service) automatically sent alerts with smoke images to the staff of Big Tree Animal Sanctuary and Adoption Center (Big Tree) if any potential risk of wildfire is detected near the center. The staff can take timely action to save the animals if necessary.

Big Tree Animal Sanctuary and Adoption Center (Big Tree) is located in Kam Tin, a remote rural area in Hong Kong. The Center operates one of the largest animal sanctuaries in the city with more than 180 dogs and cats living in the center. Their mission is to advocate animal rights by protecting abandoned animals with shelters and care. The center is surrounded by hills and trees which faces high risks of wildfire especially during the period of Ching Ming Festival and Chung Yeung Festival.

On the late evening of 25 October 2020, a wildfire ignited the day before was spreading out and was just meters away from the center. Nearly 300 people heeded an online call for volunteers and rushed to rescue the animals in the center. Luckily, all animals were rescued and kept safe during the evacuation. But it highlighted for the need to have a solution to avoid this kind of incident from happening again in the future.

An early wildfire detection solution had been suggested to Big Tree. It included AXIS Q6215-LE PTZ Network Camera and AXIS P1378-LE Network Camera together with RoboticsCats AI-Cloud wildfire detection SaaS (Software-as-a-Service). Alerts with smoke images are automatically sent to the Big Tree staff members if there is a potential risk of wildfire. The staff can take timely action to save the animals if there is wildfire nearby.

Reliable surveillance around the clock

AXIS Q6215-LE PTZ Network Camera is a reliable and robust network camera specially designed with high precision 360º pan, -/+90º tilt and long-range IR to cover wide and long-distance surveillance which is perfect to perform the 7/24 patrol monitoring 1 km surrounding the center. Guard tour can be performed or it can remotely control the direction and angle of the network camera according to the needs of the center. AXIS P1378-LE Network Camera provides 4K image quality surveillance around the clock on specific high risk area. The smoke can be detected as far as 7 km away from the center.

Automatic and efficient wildfire alert to staff for timely action

By setting the action rules in the two network cameras, the videos are transmitted to RoboticsCats AI-Cloud via 5G router regularly. If AI-Cloud detects potential wildfires, alerts and smoke images will be automatically sent to the Big Tree staff members with the ReportFires mobile app. The staff can take timely action to save the animals if there is wildfire nearby.

Robust operation under extreme weather conditions

Since both network cameras were installed in a remote outdoor area, it was important to minimize the maintenance need. “AXIS Q6215-LE PTZ Network Camera is a heavy-duty network camera which can withstand winds up to 245 km/h. The vandal-resistant IK10-rated casing and IP66/IP68 ratings will protect the camera from harsh weather conditions and impacts. With built in wiper, the staff can remotely clean the network camera to ensure that useful images can be obtained even in heavy rain,” said Bede Lau, Key Account Manager at Axis Communications Hong Kong.

Excellent image quality regardless of light conditions

“Big Tree is surrounded by hills and trees and rarely has light during the night time. Both network cameras feature Axis Lightfinder technology which can deliver high-resolution, full color video even in near darkness. This technology can help recognize and identify potential wildfires in large open areas even in poor light or complete darkness,” said Peter Chiu, Senior Key Account Manager for Hong Kong, Macao and Mongolia.

“This early wildfire detection solution acts like a virtual security guard which provides non-stop surveillance for the center around the clock. The network cameras provide 24-hour patrol around the center. Although we cannot stay in the center throughout the day, we can still feel safe and secure by this remote and proactive monitoring solution,” said Jojo Chan, Volunteer, Big Tree Animal Sanctuary and Adoption Center. Big Tree can now be monitored remotely and more efficiently detect the potential risk of wildfire 24 hours a day, 365 days a year, keeping the animals safe and secure in the center.