CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCTV Handbook 2016
1
CAMERA SELECTION SELECTION GUIDE GUIDE
contents
From the editor’s desk ............. .......................... ..............4 .4 CCTV Round Table 2016 ............. .......................... .....................6 ........6 iLegal 2016............. ........................... ........................... .......................... .......................... .......................... ........................... ...................... ........ 12
Opinion ............. .......................... .......................... .......................... .......................... ....................... .......... 26 CCTV in 2016 ............ ......................... .......................... ........................... ........................... .......................... .......................... ............... 26 By Rob Anderson
Is surveillance learnable?.............................. ........................................... .......................... ........................... ........................... .................. ..... 28 By Dr Craig Donald
iLegal 2016 gets rave reviews ............................. .......................................... .......................... .......................... ........................13 ...........13 Effective operators mean effective intelligence ................... ................................ ..........................13 .............13
Trends ............. .......................... .......................... ........................... ........................... .......................... .......................... ........................... ....................... ......... 30
The control control room of the future.............. ........................... .......................... .......................... .......................... ........................14 ...........14
Seven video surveillance trends trends you can’t afford to overlook ............ ................. ..... 30
Megapixels in focus ............. .......................... .......................... .......................... .......................... ........................... ........................... ................... ...... 16 Partnerships succeed in fighting crime .................... ................................. .......................... .......................... ................. 16
......................... .......................... .......................... ........................... ........................... .................. ..... 32 City surveillance ............
Game of drones.................................. ............................................... .......................... ........................... ........................... .......................... ................... ...... 18
City surveillance surveillance:: 20 years later ............................. .......................................... .......................... ........................... ..................... ....... 32
Securing your security infrastructure .................................. ............................................... .......................... ................. .... 20 POPI and CCTV ............. .......................... .......................... ........................... ........................... .......................... .......................... .......................... ................. 20
Visual alarm verification ............ ......................... .......................... ........................... ..................... ....... 37
SLA consideratio considerations ns .............. ........................... .......................... .......................... .......................... ........................... ........................... ................... ...... 22
Camera within an alarm............................ ......................................... .......................... .......................... .......................... ....................... .......... 37
Securing your security systems.......................... ....................................... .......................... .......................... ........................23 ...........23 All about efficiency .......... ..................... ...................... ...................... ...................... ...................... ...................... ...................... ...................... ............. 24
Smart buildings
Focus on mobile surveillance ................................... ................................................. ........................... .......................... ................. .... 24
Video management integral to building management ................ ............................. ............... 38
.......................... ............. .......................... .......................... .......................... ........................... ..................... ....... 38
A risk management and intelligence platform............ ......................... ........................... ...................... ........ 25 Something old, something new ................................... ................................................ .......................... ..........................25 .............25
Thermal cameras............ ......................... .......................... .......................... ........................... ........................... .................. ..... 40 Thermals expand expand their operations operations ............ ......................... .......................... ........................... ........................... .................. ..... 40
High definition analogue ............ ......................... ........................... ........................... .................. ..... 42 Analogue fights back ............. .......................... .......................... .......................... ........................... ........................... .......................... ................ ... 42
Video analytics
........................... ............. ........................... .......................... .......................... .......................... ....................... .......... 44
Automated Automate d analytics with iSentry ................................. .............................................. .......................... .........................44 ............44 Counting people in retail...... retail................... .......................... .......................... ........................... ........................... .......................... ................ ... 46
Logistics
........................... .............. .......................... .......................... ........................... ........................... .......................... .......................... ................ ... 47
Logistics security with 4K ...................................... ................................................... .......................... .......................... ....................... .......... 47
2
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE
Camera selection guide ............ ......................... .......................... .......................... ........................48 ...........48
DVR/NVR round-up ............ ......................... .......................... .......................... .......................... ........................62 ...........62
Remote monitoring ............ ......................... .......................... .......................... ........................... ...................... ........ 68 Weighing up the benefits of offsite monitoring ........................... ........................................ ................. .... 68
Management platforms ............ ......................... .......................... .......................... ........................72 ...........72 How to choose video management software ............................... ............................................ ................. .... 72 The right VMS VMS decision ....................... .................................... ........................... ........................... .......................... .......................... ................. 74
Security lighting
......................... ............ .......................... .......................... ........................... ........................... ................... ...... 77
Throwing light light on the dollar dollar price ............. .......................... ........................... ........................... .......................... ................. .... 77
Storage
White papers
........................... .............. .......................... .......................... ........................... ........................... .......................... ............... 90
........................... ............. ........................... .......................... .......................... ........................... ........................... .......................... ................... ...... 78 Cyber security: Is your CCTV system secure from cyber attack? ............. ............. 90
Storage: what is the right choice? ................... ................................ .......................... .......................... ..........................78 .............78 Video compression technology: More video, less storage............. .........................92 ............92
IP surveillance
......................... ............ ........................... ........................... .......................... .......................... ..........................81 .............81
Panoramic cameras: Exploration of panoramic surveillance............. ..................... ........ 94
Maximise surveillance with the right technology ............ ......................... .......................... ................. 81
Hyperconvergence
Case study
......................... ............ .......................... .......................... ........................... ........................... .......................... .........................97 ............97
.......................... ............. .......................... .......................... .......................... ........................82 ...........82 4K in your trolley.......................... ....................................... .......................... ........................... ........................... .......................... .........................97 ............97
Converged Conver ged data centres.......................... ........................................ ........................... .......................... .......................... ....................... .......... 82 Four cameras watch 7000 cars ............ ......................... .......................... ........................... ........................... .........................98 ............98 Plug & play gigabit switch ...................... .................................... ........................... .......................... .......................... ........................83 ...........83 Long-term upgrade to AHD ............. .......................... .......................... .......................... .......................... ........................... ................. ... 99
Home surveillance
.......................... ............ ........................... .......................... .......................... ..........................84 .............84
Protecting history at Petra...................................... ................................................... .......................... .......................... ...................100 ......100
Home is where the surveillance is ....................... .................................... .......................... ........................... ..................... ....... 84
Luxury virtual service ............ .......................... ........................... .......................... .......................... ........................... ........................... ..............101 .101
........................... ........................... .......................... .......................... ................. 86 Market consolidation .............
Indian Railway opts for Mirasys ........................ ..................................... ........................... ........................... .......................102 ..........102 Suburb gets ANPR............ ......................... .......................... ........................... ........................... .......................... .......................... .....................103 ........103
Market consolidatio consolidation, n, good or bad? ............................. .......................................... .......................... ........................86 ...........86 Wild connectivity on safari......... safari...................... .......................... ........................... ........................... .......................... .....................103 ........103
Mobility
........................... ............. ........................... .......................... .......................... ........................... ........................... .......................... ................. .... 88
Video management in the age of the mobile Internet............. .......................... ................... ...... 88
Company listings
.......................... ............. .......................... .......................... .......................... ........................... ...............104 .104
www.securitysa.com
CCTV Handbook 2016
3
from the editor’s desk CAMERA SELECTION SELECTION GUIDE GUIDE
It’s a buzzing industry
The CCTV Handbook is published by
solutions
www.securitysa.com
Welcome to the CCTV Handbook 2016, 2016, our annual foray into what’s happening in the world of surveillance in Africa and globally. We’re re particularly fortunate in this issue to
Published by Technews Publishing Technews Publishing (Pty) Ltd 1st Floor Stabilitas, 265 Kent Avenue, Randburg Box 385, Pinegowrie 2123 Tel: T el: 011 543 543 5800 Fax: 011 787 8052
be able to include not only our usual round table discussion with a few users and integrators about the realities they face in the surveillance world, but also a review of iLegal 2016. It certainly is a busy and buzzing industry.
ISSN 1562-952X
iLegal has become something of an icon in the local surveillance market. It’s a one-day
Editor Andrew Seldon:
[email protected]
conference Hi-Tech Security Solutions and Solutions and Dr Craig Donald host that has repeatedly been able to deliver outstanding presenta-
Contributors
tions and pass on useful information to those
Rob Anderson
involved involve d in surveillance decision making.
Dr Craig Donald
This year was was no exception. exception. We had a full
Allyson Koekhoven
house, despite the economy, and the reviews
Brett van den Bosch
from the attendees were overwhelmingly Business Manager Vivienne Dorrington:
[email protected]
positive. On a personal note, I would like to take this opportunity to again thank the attendees for their time as well as our presenters who put a significant amount of work into their presentations, and once again delivered
and you will see it popping up throughout the
beyond expectations. The team organising
handbook. Big data, as the IT world calls it, is
the event at Hi-Tech Security Solutions also Solutions also did
no longer the domain of IT; there is no bigger
a fabulous job in tough conditions – you
data than hours upon hours of high definition
know the economy sucks when even the
video footage.
luxury goods companies complain about a lack of budget.
It is also pertinent to thank all the people who contributed to this handbook in their
In the 2016 handbook you will be able
different capacities. I would hand out bottles
to read a short review of the presentations,
of red wine as thank you gifts, but I seem to
but it has to be said: you had to be there. You
have finished them all in the process of
can’t do justice to a full presentation in a page
finalising the publication.
or less of editorial, but we try to convey the
book and the information we have to offer.
Jeff Corkill set the scene. He spoke about the
As always, your comments and criticisms are
importance of extracting intelligence from
very welcome. It’s less than a year before we
your surveillance operation as well as the
start the next CCTV Handbook and and your input
traditional evidential footage.
is invaluable.
The concept concept of intelligence intelligence was one that that repeatedly raised its head in the conference
Andrew
LETTERS TO THE EDITOR
Letters to the Editor should be addressed to Andrew Seldon at
[email protected]. Sending material to this publication will be considered automatic permission to use in full or in part in our Letters column. Be sure to include your name, e-mail address, city and postal code. We reserve the right to edit all letters.
CCTV Handbook 2016
www.securitysa.com
Subscription Subscriptio n Services To subscribe to Hi-T Hi-Tech Security Solutions Solutions To subscribe to CCTV Handbook contact:
[email protected] Design and layout: layout: Technique Design Printed by: Paarl by: Paarl Media KZN, Pinetown, KwaZulu-Natal, +27 (0)31 714 4700
Nevertheless, I hope you enjoy the hand-
salient points. The keynote from Australia’s
4
Advertising Advertisin g sales Tracy Wolter:
[email protected] Laura Dorrington:
[email protected]
All rights reserved. No part of this publication may be reproduced, adapted, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Technews Publishing (Pty) Ltd, Reg No. 2005/034598/07
Disclaimer While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements, Advertise ments, inserts and company contact details are printed as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.
CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCTV Handbook 2016
5
CAMERA SELECTION SELECTION GUIDE GUIDE
What keeps security and surveillance leaders up at night? By Andrew Seldon.
6
CCTV Handbook 2016
www.securitysa.com
CCTV ROUND TABLE CAMERA SELECTION GUIDE SELECTION GUIDE
Left to right. Seated: Rian Giesing, Gerhard van Den Bergh, Logan Naidoo. Standing: Massimo Carelle, Sydney Nonyongo, Ruben Tshwene.
What is really happening out in the world when it comes to surveillance installations and operations? Hi-Tech Security Solutions asked a few people involved in surveillance security for their opinions. It’s easy enough to find success stories about surveillance installations from almost any-
operations manager at Mowana Properties. Starting off with the million-dollar question,
Giesing adds that, from the RMB perspective which is naturally different from the retail
where in the world. It’s also simple to get the
we asked the round table attendees whether
environment, the direct or immediate benefit
specifications of various cameras, storage sys-
they could elaborate on the benefits they have
is in the ability to do a review of footage and
tems and management platforms. What is not
attained through surveillance installations. More
give business an immediate answer as a result
so easy is to actually install and manage the
specifically, what have their systems delivered
of incidents, occurrences, accidents and similar
installation and operations of a security system
and how did they get to the stage where they
events. In addition, the banking environment is
that relies in part or as a whole on surveillance. surveillance.
were satisfied with the installation.
more controlled and he therefore has the luxury
Hi-Tech Security Solutions decided to ask a
Not surprisingly, while the attendees were,
of implementing specific standards in terms of
few people who have been on the sharp end
in general, positive about the performance of
technology, training and saturation of cameras
of the surveillance industry, in other words,
their technology, the real benefits one gains
per floor, which he admits is a great luxury.
those involved in making it work and answer-
is when the technology is part of a carefull carefullyy
The question of of quality of technology technology also
ing questions from the board when things go
planned security process that takes people,
comes into play for all the attendees. It can be
wrong, to tell us about the pros and cons they
technology,, and perhaps most important of all, technology
good to have the Rolls Royce equipment for
have come across in their daily jobs.
carefully defined processes into consideration.
all your needs, admits Van Den Bergh, but you
Fortunately, we managed to get a posi-
Van Den Bergh, who is in charge of a
don’t always need the absolute best to achieve
tive response from a number of high-profile
number of shopping centres, is reserved about
what you want. Although he also notes that
surveillance experts to join our round table.
the surveillance installations he manages. This
going for the cheapest option available is not a
Our guests were:
is because there is no standard to the imple-
good solution either.
• Logan Naidoo, a consultant at CKR Consulting
mentation in various centres. This means that
Engineers, • Massimo Carelle, risk manager at Ingram Micro, • Ruben Tshwene, technical director Westgate Super Regional Shopping Centre, • Sydney Nonyongo, assistant operations man-
one centre will have a sterling system that
Cheap vs. quality
delivers precisely what management wants,
Naidoo’s experience has shown him that qual-
while another will have a less functional instal-
ity does count. He has clients that invested in
lation that needs work before it will deliver as
quality cameras and are still using them 10
desired – an ongoing process at Mowana.
years later, while others who opted for cheaper
Despite that, he says the surveillance solu-
brands find problems with the image after as
ager at Westgate Super Regional Shopping
tions in general are a definite benefit to centre
little as three years. It’s not always necessary to
Centre,
management as well as shoppers. However,
choose the more expensive option, there are
• Rian Giesing, head of security and safety at
he also notes that what makes it work is the
less costly options that will do the job required.
Rand Merchant Bank (part of the First Rand
staff tasked with managing and running the
But again, your selection must be based on
Group), and
system, as well as their interaction with other
your requirements, not price. There is always a
• Gerhard van Den Bergh, national facilities and
employees.
Continued on page 8
www.securitysa.com
CCTV Handbook 2016
7
CCTV ROUND TABLE CAMERA SELECTION GUIDE SELECTION GUIDE
Ruben Tshwene.
Rian Giesing.
Logan Naidoo.
Massimo Ca Carelle.
This is especially especially important today with
Continued from page 7 cheaper option, but it is not necessarily going
all the add-ons one can use in surveillance,
to deliver.
whether they are classified as video analytics or
He provides an example of a retail environ-
Sydney No Nonyongo.
Gerhard van Den Bergh.
programmes like CSI, many people believe the impossible is only a click of a mouse away. Then there is the question of staff training.
something else. The value-adds one can build
You cannot simply take a few guards from the
ment where claims against the centre have
on top of the surveillance takes the security
beat, put them in a control room and expect
been easily dealt with because the camera
operation from a traditional reactive system that
them to be good operators. They need proper
systems were designed to perform, not bought
sets processes in motion once an event has hap-
training, and even more importantly, they
on cost. An individual claimed he had been
pened, to a proactive one in which businesses
need to have the right aptitude for the job.
mugged in the centre, not an impossible
can prevent some negative events.
Then they need need to be trained trained on the platform platform
Van Den Bergh highlights an example in
they are using to ensure the investment in the
lance system was able to track this person from
the form of LPR (licence plate recognition). recognition). One
system pays off. Any system is a bad system if
when they entered the mall to when they left –
mall in his group installed LPR and has reduced
the operators are not capable of handling it.
as well as a short time after he had left – and it
the number of stolen cars to zero in the first
proved he was not attacked in the centre.
three months of having the system in place.
to the sur veillanc veillance, e, which can include guards,
In fact, it has also helped apprehend some
also need to be trained in the correct processes
was caught charging staff R5 per day to park
criminals before they could even try to break
to follow when an event occurs. This, of course,
inside a centre.
into a car. Linking the system to the SAPS and
means standard operating procedures (SOPs)
other databases allows the centre to identify
need to be designed and implemented for all
of quick solution relies on technology, but also
stolen or suspicious cars as they enter and alert
staff, from the control room to the perimeter
on the personnel hired to manage the surveil-
the centre’s security teams.
in order to ensure they understand how to act
scenario in South Africa. However, the surveil-
And then there’s the story of a guard who
Of course, as others have noted, this type
lance system. Their ability to use the manage-
Facial recognition recognition is another add-on that
Additionally, Additionall y, the staff in positions related
and what makes an event normal or abnormal.
ment platform effectively is as important as the
is being tested at some public spaces such as
platform, cameras and other technology. And
retail locations. There have been some positive
such as reporting when a camera is out of focus,
the training of staff to work as an unit when
results, but time will tell if this functionality will
or a light bulb in an important area is out.
events occur is also critical.
further assist in making centres safer.
Naidoo also mentions that there are many
A key issue Nonyongo highlights is that, no
And this training extends to simple things
Nonyongo adds that training is often not enough as operators are put into situations
aspects to purchasing a solution, whether
matter what solution an integrator promises,
where they simply can’t be effective. For
hardware or software. Even the most expensive
purchase decisions and recommend recommendations ations
example, they may be put in front of a number
Rolls Royce systems will need maintenanc maintenance e
must also take into account that environ-
of screens they have to watch, without being
and repairs at some stage, and this is where
ments change constantly and what is the
given the regular breaks they need. This will
local support and skills play a big role in the
norm today may not be the norm tomorrow.
result in them missing events due to exhaus-
overall pricing. It is always wiser to pay more
Understanding and designing your environ-
tion. And, of course, even the best and most
and get local expertise on call than to save
ment well is therefore critical.
motivated staff can only be of limited value when they are tasked with watching a large
upfront costs only to lose time and money waiting for overseas repairs or technicians.
Education is key No matter what the goal of your surveillance
number of screens all day. He suggests refining their tasks and using
A job description
solution is, the key to success is education. In
analytics to assist them will deliver a far better
The most important issue issue when looking at at
the first instance, it’s about educating the users
result. For example, motion detection in rarely
surveillance solutions, according according to all the
or buyers in terms of what is possible and what
used corridors will lighten their burden, as will
attendees, is to ensure that you know what you
is not possible. Looking at the value-added
specifying a small number of sensitive areas
want. The days of simply installing a bunch of
functionality mentioned above, your client
that they can focus on instead of tens of little
cameras in what you think is a good position
would not know that a cheap camera system
video feeds on multiple screens.
are over – if they ever were here.
would not deliver the LPR or facial recognition
Another educational area few people want
Carelle reverts to the old adage of “giving
results required. Similarly, Similarly, if all you require is a
to talk about is the impact of senior manage-
each camera a job description”. description”. When you know
view of the staff entrance, you don’t need the
ment on buying decisions. It’s not unheard of
what you want from each camera, you are in
best camera on the market.
that a financial manager would query the cost
a better position to judge which technology
For those people who will be managing the
of an installation because he or she knows you
is required and whether less costly brands will
surveillance installation, installation, it is also important
can get a cheaper camera or service provider.
perform as required. Of course, as Giesing notes,
to educate their bosses as to what they can
customers don’t always know what they want.
realistically expect to achieve. With television
In these scenarios, Nonyongo suggests taking Continued on page 10
8
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCTV Handbook 2016
9
CCTV ROUND TABLE CAMERA SELECTION GUIDE SELECTION GUIDE Continued from page 8
and their companies need to be certified, and there are penalties
them out of their offices and on a tour of the site in order to help
if they break the rules.
them understand why you want the solutions you have asked for. Van Den Bergh agrees, noting that your operations depart-
Here again user education is important because the end user, the paying customer, ultimately decides which company to use
ment needs to know what they are doing if they are going to be
and if they do not understand what benefits come from using
able to convince management that the solution doesn’t just boil
certified service providers, the cheapest option will win and the
down to cost cutting. You may even find they have statistics to
result could be a disaster.
throw at you saying how many cameras or guards are standard in an environment like yours. Again, knowledge of your situation assists in convincing
This does does not, not, however however,, excuse excuse your your need need to get good good people people on board. Giesing explains that people can make a poor system succeed and a good system fail. In his environment, he identified
them otherwise. Giesing notes that you need to work from
a couple of people with the right aptitude and attitude and has
a well-devised plan that incorporates your entire site. If you
been training them and moving them up the ladder for a number
don’t cover everything from the beginning, you will continually
of years. The result is people who know the environment and
be running backwards and forwards adding bits and pieces.
exactly what they need to do to get the results they require.
Similarly, the security operations team needs to know about the company’s expansion plans to allow it to incorporate those
Service provider support
changes in future security strategies.
A final topic the round table attendees mentioned concerns their service providers. While the debate over insourcing or out-
Standards and regulation
sourcing continues, in many instances informed by the industry
An issue which was also raised by all of the attendees, and which is
our attendees operate in, many make use of service providers
raised in almost every round table the security industry is involved
in some form. However, there is a key element missing from the
in, is that of regulation and standards. The participants asked how
services these companies provide.
they could know whether a company they were planning on hiring would fulfil its role effectively and not leave then with a second rate
agree to the SLA contract, if they were enforced strictly, there
installation they would have to pay another company to fix.
would be regular and large penalties to pay. Whether this lack of
The stories of failures failures they mentioned mentioned came from from both large large
adherence is due to poor training or supervision, hiring cousins or
integrators and smaller installers, as did the stories of success.
friends, or for whatever other reason like the customer not enforc-
There is therefore therefore no way way to know whether whether the company company you
ing the SLA, it is an issue all companies face.
hire will deliver unless you first do your homework and check
Then there is the concern about about service provider provider hiring prac-
every potential service provider’s credentials and their past his-
tices. Despite the efforts of some associations, one often finds
tory by talking to older customers, especially when dealing with
someone who is fired from a security service provider for a seri-
large sums of money. However, at the end of the day, you need
ous offence simply moves on to the next security operator and
to take a subjective decision since there i s no public forum to
gets a similar job there, his experience at his previous employer
rate installers and integrators, and one can’t rely on the certifica-
counting in his favour. And while this is common in some guard-
tion of the industry regulator for much more information than
ing circles, it is not unheard of in control room operations.
that they have paid their fees. This sad state of of affairs means everyone, everyone, from from experienced
For those who take responsibility for their own personnel, hiring the right people and continual training is a crucial element of their
installers to your local electrician can offer to install CCTV
success on the job in the short and long term. Effective employees
cameras with no formal qualifications or training. Even security-
enhance the security system and develop a trust relationship over
specific installers can run into problems without the right
time, enhancing their own work experience and environment.
experience and skills. A VMS system might say i t is able to handle
When one distils the comments made by the various round
94 cameras, for example, but Naidoo asks if that means all 94
table attendees, it becomes clear that there are many issues
are running at maximum resolution? And then what about your
they need to deal with in their daily jobs which don’t necessarily
network? Can it handle all that footage all at once? And can your
have to do with their management’s goal of keeping people and
servers and storage deal with the maximum?
assets secure. It’s a job with a broad focus, and only one of the
One option in dealing with this type of scenario that Nonyongo and Van Van Den Bergh suggest is a rental plan. In this
things to pay attention to is technology. Some of the problems faced could be lightened if the South
scenario, the customer does not put a large sum down and
African security environment was one in which regulations were
purchase the solution outright, but contracts to rent or lease the
enforced enforce d as a norm. Interestingly enough, t here are actually
system for a monthly fee over a number of years.
enough regulations, just no enforcement from the regulatory
The benefit benefit of of this type type of deal deal,, apart from a capex expen expendiditure perspective, is that the integrator puts the money in up front
bodies and in most instances from the industry bodies as well. Despite all this, the job still needs to be done and there are many
and only makes it back over the number of years the contract is
opportunities for third-party companies to deliver services and
valid for. It also allows the customer to set up service level agree-
advice, as long as they take the time to understand what the client
ments (SLAs) in terms of what cameras should be doing and what
wants and how best to deliver. Getting your ducks in a row before
reaction times to support queries will be etc. A carefully designed
going on a sales drive costs time and money, but pays off in the end.
contract will also allow for penalty clauses through which the customer can claw back money for services not delivered. An industry that has done a good job of dealing with the lax
10
The SLA SLA is this this key. key. And even though the service service provid providers ers
Hi-Tech Security Solutions would like to thank our attendees at this year’s round table for their time and input. As with all articles like this one, much information could not be included due to
regulatory environment environment in South Africa is the fire industry. The
space restrictions, but with jobs as broad as those the attendees
associations in this industry have made sure that fire installers
have, a few pages can’t do them justice.
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCTV Handbook 2016
11
CAMERA SELECTION SELECTION GUIDE GUIDE
12
CCTV Handbook 2016
www.securitysa.com
2016 CAMERA SELECTION GUIDE SELECTIONiLEGAL GUIDE
iLegal 2016 gets rave reviews iLegal 2016 was met me t with rave reviews as it dissected today’ today’ss new legal, technical, and operational challenges and responsibilities. April 20th 2016 saw the latest iLegal confer-
The difference difference in surveillance surveillance is that we not
control room, whether on an estate, a mall or
ence taking place in Johannesburg Johannesburg.. With pre-
only rely on data – in this case video – for our
a business campus, will take responsibility for
senters and visitors from around the country,
information source, but also people, specifi-
everything from surveillance monitoring to
iLegal 2016 was well supported, and according
cally the operators behind the scenes. The
plumbing and even fielding calls from irate
to attendees’ comments, well worth the time
combination of technology and people offers
customers (to a limited extent).
to attend.
organisations the best option to do more
While the event covered a broad spectrum
ilegal 2016 was a full day of information
than look for video evidence after the fact.
overload, but the presenters outdid them-
of topics, a short review of each will follow,
Well trained people and effectively designed,
selves in informing and educating. A new
there were some common themes that kept
installed and maintained technology can
format, that of a panel of experts was a great
reappearing throughout throughout the day. It seems the
create a proactive solution that still provides
success in trying to discover the legalities
surveillance world has quickly moved from
evidence, but also intelligence to prevent or
around drone use in South Africa. For the first
being the old physical security domain of guys
mitigate dangerous events.
time we also had someone talking about cyber
with guns and barriers to control ingress and
Apart from intelligence and people (people
security and how it impacts, or is impacted
egress, to be a more intelligent guardian of
with effective training and the right aptitude),
by security operations on the IP platform. The
safety and security.
control rooms or nerve centres as they are
Internet of Things (IoT) may not be a common
likely to be called in future, are also a critical
term in security as yet, but the industry i s
intelligence,, specifically obtaining intelligence intelligence
factor in tomorrow’s surveillance world. Within
already a part of the whole concept.
from your sur veillanc veillance e operations instead
the scope of the control room, we will see
of just videos. Just as the IT world is making
cloud and mobile technology being employed
views of the presentations of the day. We can’t
a noise about big data, the ability to sort
to assist operators and managers, and we
really do justice to the work and effort the
through mountains of data and extract value,
can expect to see control rooms taking on
presenters put in, but the reports will provide
the surveillance world is on a similar path.
more than security tasks. It’s likely that your
an idea of the information shared on the day.
The keynote presentation was was focused on
The following following pages contain contain brief overover-
Effective operators mean effective intelligence By Andrew Seldon.
Intelligence is often the vital missing component of surveillance. The keynote speaker at iLegal iLegal 2016 was Jeff
The surveillance surveillance footage captured allowed allowed
Corkill, a lecturer in the School of Computer
the authorities to identify the perpetrators
and Security Science at the Edith Cowan
and to follow up the investigation to find
University in Australia, and a member of the
co-conspirators.
ECU Security Research Institute. He spoke on
From that perspective, the surveillance
the strategies for leveraging intelligence to
worked well. However, one of the images
move to a proactive rather than reactive CCTV
available clearly shows the two bombers
approach.
walking, each with a glove on only one hand.
The problem problem most surveillance surveillance installa-
Unless a Michael Jackson convention was in
tions face is that they are not used to their full
town, this should have been a clear warning to
potential. Most systems are used to deal with
operators. A warning could have been raised
cases after the fact, in other words, once a
and people in the surrounding areas evacu-
crime has been committed and operators are
ated. It may not have stopped the bombing
instructed to look for evidence. While this is a
(since they were intent on suicide), but it could
critical function of surveillance surveillance,, most organisa-
have saved many people from trauma.
tions stop here and miss the full potential of their systems. This potential is the ability to gather gather
Corkill’s message was that the real value of surveillance is realised when it collects data for evidence, but also when it analyses data in
intelligence from your surveillance footage
real time to provide intelligence. This, how-
that would allow for proactive prevention
ever, means that the operator is not a passive
of crimes, or at least mitigation strategies
observer, but someone who knows the envi-
that would limit the damage. As an example,
ronment under observation and makes sense
Corkill used the publically available footage
of the multitude of events occurring each day.
of the recent suicide bombers in Belgium.
Continued on page 14
Jeff Corkill.
www.securitysa.com
CCTV Handbook 2016
13
iLEGAL 2016
CAMERA SELECTION SELECTION GUIDE GUIDE
The control room of the future By Andrew Seldon.
The old control room is on its way out, high-tech and highly skilled is the future. Hannes Hendriks is the estate manager at
they need to access the relevant accounts accounts and
Serengeti Golf and Wildlife Estate. He spent
work efficiently on the estate property.
18 years in the Defence Force and left as a
This strea streamlini mlining ng of busin business ess proce processes, sses,
Lieutenant Colonel, thereafter becoming
whether in estates or other control centres,
involved in a number of large security projects
is critical to the future control centre as it
in South Africa. At iLegal 2016, Hannes spoke on
evolves from looking after security issues alone
the Future Surveillance Control Room and the
to the full management functionality of its
impact technology would have on it, and the
environment.
personnel required to make it work. Although
As in many other presentations at iLegal, the
aimed at the residential control room, the prin-
key to the control room of the future is intel-
ciples can be extrapolated to any industry where
ligence. Taking Taking the output of connected devices,
control rooms are an important aspect of the
whether security or otherwise and incorporating
surveillance project.
them into a package designed to sort and ana-
Hannes started his presentation looking at all
lyse the data into useable and pertinent informa-
the different risk management methodologies
tion – or intelligence – is key to the success of
and functionalities that can or should be man-
these operations.
aged in control rooms today. These range from
As the world becomes more connected,
traditional access control and CCTV, through to
there is simply too much information for humans
health and safety, landscaping and irrigation,
to sort through and understand. Intelligent ana-
and incorporating service level agreement (SLA)
lytical operations will hide the mass of data from
management and a host of other functionality.
operators and managers, only providing them
Naturally,, not every control room manages these Naturally
with relevant reports and information that will
features, but the control room, or nerve centre of
empower quick and effective responses.
the future will be equipped to handle all this and
Hannes demonstrated the use of intel-
more – both technically and with well-trained
ligent dashboards in his presentation. These These
human resources.
are designed to provide a graphical overview
In terms of estate control centres, Hannes
of almost any areas under the control room’s
Hannes Hendriks.
expects the future to include a complete GPS-
purview, allowing those responsible to gain
enabled, cloud-based estate management solu-
quick insight. Problems can be highlighted and
centre is people. Operators and managers can
tion that handles all functions of the estate. This
assigned to the relevant parties quickly, whether
no longer be guards who have been promoted.
solution will have two components. The first is a
it is a perimeter breach or a burst water pipe, and
They need to be peop people le with with the the aptitude aptitude and
web application to be used by office personnel
through mobile access they can be managed
willingness to work in a control room environ-
and will be a central repository for all association
and followed through to conclusion.
ment, while learning and adapting to new
and account-related information. All employees
Key to this new control centre is the use of
technologies.
and operators need is a browser to access the
technology. However, Hannes noted that all too
system, there is nothing to install and all account
often, advanced technology is underutilised
in future, which range from computer literacy
information will be securely hosted on servers. ser vers.
because it is difficult to learn and use, and many
skills and accredited control control room operator
people are still unwilling to trust it. To be used
courses, they will also need the personalities that
ager which will be supplied to guards and other
effectively,, these systems must be designed in effectively
remain calm under pressure, exhibit excellen excellentt
employees or contractors to simplify si mplify compliance
harmony with the needs, expectations and capa-
communication skills and be problem solv-
inspections and work order entry. The mobile
bilities of the people who will be using them.
ing oriented. Hannes adds that a degree or a
The seco second nd compo component nent is the mobil mobile e manman-
application will provide managers with the tools
The final com componen ponentt of the future future cont control rol
Of the many skills the t he operators will require
diploma will also most likely be a prerequisite.
Effective operators mean effective intelligence
Continued from page 13
The operator operator should be the critical link
to be able to identify possible persons of inter-
but should be backed up by a dedicated
between the observed environment and the
est by their behaviour within the activities they
analyst who can verify potential si tuations
response to events. Naturally, this means a
are trying to convince people people they are doing.
based on visual cues before taking action.
Grade D guard can’t simply be put in front of a computer and told to watch the screens. This active operator operator must know what the
This requires requires a high level of observation
Jeff warned that while technology was
skills and the need for assistive technology to
and is beneficial, it only forms part of the
help them sift through the masses of normality
answer to effective sur veillance solutions.
norm is in their environment to be able to
to find the anomalies. These technologies technologies can
Your key is well-trained people, and tried and
detect abnormalities or variations. They need
take many forms, including video analytics,
tested processes.
14
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCTV Handbook 2016
15
iLEGAL 2016
CAMERA SELECTION SELECTION GUIDE GUIDE
Megapixels in focus By Andrew Seldon.
Megapixel cameras deliver, as long as you are aware of the potential pitfalls. Megapixel cameras provide the potential for greatly increased quality of viewing. Their
the cost factor is not clear from the start. In terms of costs, when you incorporate all
introduction to a system does, however, create
the costs, including installation, networking,
technical and data challenges as well as new
storage and so forth, these cameras have a
perspectives on what can be viewed and how
higher price than most vendors tell you about.
to view specific areas.
In addition, the analytical market also often
Leo Nardi, technical manager at Justicia
promises more than it can deliver. There are
Investigations joined the presenters at iLegal
good analytical engines out there, but it is a
2016 to review his experiences at Toyota as the
matter of testing to find the one that works in
company engaged in a long-term project to
your environment – and the busier and dirtier
upgrade its camera installations to megapixel
the environment, the harder the task.
IP systems. Leo started his presentation giving
Then there’s there’s the the question of storage. storage. More More
a brief overview of the evolution of CCTV cam-
megapixels requires more kilobytes and your
eras from the early 1940s to today.
storage system will need an upgrade if you
He then described the project Toyota is
have a large number of cameras, another cost
engaged in to upgrade its ageing analogue
issue. Yet another caveat is licensing fees. You
cameras to IP, in part because of the age of the
can’t buy a management platform outright,
systems and the associated performance issues,
for example, you need to pay a licence fee per
Leo Nardi.
and partially because the company wanted
camera every year. His advice is to do your
room personnel on the journey, as they will
to improve the quality of its video images and
homework upfront and get all the cost details
be required to learn and run the new system.
increase the length of recording retention.
before making a final decision.
Similarly,, your onsite CCTV technicians will Similarly
As an aside, he mentioned the 90/10 rule
Customers must also keep an eye on integra-
need to have their skills upgraded unless you
he has found when installing cameras: when
tion claims. While the vendors may claim they
want to outsource to a third party for installa-
using fixed cameras, organisations have a
are able to integrate easily with third-party
tion, maintenance and future upgrades.
90% success rate in achieving the results they
systems, this is not always accurate unless the
require; when using PTZ cameras, they will find
customer is able to do some work on the inte-
in the project. There will be issues to resolve
a 90% failure rate as the PTZ is almost invari-
gration – which requires specialised skills.
and the process will be much easier if everyone
ably focused on a different area to where an
That’ss not to say megapixels That’ megapixels don’t don’t deliver. deliver.
It’s important to engage all the role players
is on board and committed to the project from
event occurs and by the time the camera is
They certainly do, do, however however,, a successful successful
the start. The project at Toyota was undertaken
pointing in the right direction the event is over over..
upgrade requires careful planning. Leo sug-
in this manner and has delivered the results
gests starting with in- depth site planning
required.
In the IP world, Leo says there are many benefits to megapixels, from better resolution
defining what you require, which will clearly
and improved video analytics that can be per-
show which cameras require high megapixel
For more information, contact Justicia
formed on the images. However, he has found
ratings and which need less resolution. You
Investigations, 0860 00 5111,
that the technology is oversold. For one thing,
will also need to take your existing control
www.justicia.co.za.
Partnerships succeed in fighting crime By Andrew Seldon.
Cape Town Town relies on partnerships, public p ublic volunteers and surveillance sur veillance to fight crime. The city city of Cape Cape Town has has its work work cut cut out for for
The city’s city’s Alder Alderman man JP Smith, who serves serves
it when it comes to safety and security. Apart
as the Mayoral Committee Member for Safety
the installation of private cameras and even
from the abnormally high everyday crime and
and Security, took some time at iLegal 2016 to
erected poles people could use to place their
violence which is normal in South Africa, the
tell the attendees how Cape Town Town has made a
cameras on. In return, the city gets to stream
city also needs to deal with high levels of gang
dent in its crime statistics, assisted by the rollout
the feeds to the t he city’s Traffic Management
activity, which makes policing a tough task.
of CCTV cameras by independent citizens and
Centre – apart from f rom their private use. The Traffic Traffic
companies. JP noted that the city, while con-
Management Centre has banks of screens from
has produced in fighting crime (as noted in
sidering deploying CCTV cameras but limited
across the city and many people tasked with
www.securitysa.com/54014n) may may not have
in budget, noticed many private concerns had
managing the feeds and dealing with crimes.
been realised if it wasn’t for some forward
installed cameras for neighbourhood watches
thinking by the city’s leadership.
or other private operations.
In fact, the amazing results Cape Town
16
CCTV Handbook 2016
www.securitysa.com
Cape Town Town changed its bylaws to allow for
The result result has has been been a citywide citywide surveil surveillance lance Continued on page 18
CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCTV Handbook 2016
17
iLEGAL 2016
CAMERA SELECTION SELECTION GUIDE GUIDE In addition, 2016 will see dashboard cam-
Continued from page 16 operation, which is still growing as a result of
eras and tablets being rolled out in the city’s
private and city installations, allowing operators
Metro Police cars. These will be connected to
to identify stolen or suspicious vehicles via licence
the surveillance system as well as other informa-
plate recognition and track them across the city to
tion sources to facilitate improved operations
give the police an accurate idea of where to find
by mobile teams as well as better handling and
them. It naturally also assists with all other crimes,
direction of anti-crime activities.
from muggings and vandalism to murder.
One of the technologies the city is using to
Of course, the process involved in fighting
good effect is its gunfire detection solution,
crime goes far beyond only using CCTV. The city
ShotSpotter, developed locally. This solution
makes use of a variety of human resources, from
allows authorities to accurately identify the
neighbourhood watch volunteers who patrol
location of gunshots and dispatch teams to the
their areas and report any unusual activity, to paid
required area immediately. This has resulted
volunteers who support the metro’s police force
in a 100% response rate to gunshots in high-
in various operations. It also educates citizens in
crime areas and an increase in community trust
how to avoid common crimes like bag snatching.
in the police.
And, in line with a common theme through-
JP also noted that drones are a vital tool
out iLegal 2016, the city is also focused on
in the fight against crime and the city would
intelligence gathering operations. The Strategic
be engaging more of these devices for future
Information Management Service is a team of
operations. Drones have been through 8
skilled and experienced professionals who col-
months of testing, and have proven efficient
lect and analyse crime information to facilitate
for rapid deployment and awareness in tactical
between all parties involved, private and public.
improved crime fighting. JP says this team is
situations. And this is only the beginning.
Togethe T ogether, r, the city has achieve achieved d more more than any
growing as it continues to get excellent results.
He said the success Cape Town Town has achieved
Alderman JP Smith. is due to partnerships developed along the way
other in the country reliant on a silo approach.
Game of drones By Andrew Seldon.
Lisa Emma-Iwuoha takes on the unenviable task of simplifying South Africa’s drone laws. Drones are causing quite a stir in the security
to take on the unenviable task of simplifying
Drone panel
industry due to their utility in monitoring and
the legalities around drones.
After Lisa’s Lisa’s short presentation, Dr Craig Donald
responding to alerts almost immediately. They
Starting off, she explained that drone pilots
hosted a panel discussion on drones, where
also enable companies to patrol far larger areas
need a valid RPA pilot’s licence, which is valid
the audience was able to ask the experts any
faster and more safely than traditional patrols.
for 24 months from the date of issue. To obtain
questions related to the technology they
In South African law, drones are referred
this, the pilot needs to be 18 or older, pass the
might have.
to as Remotely Piloted Aircraft systems (RPAs).
CAA online theoretical knowledge exam, pass
The panel members were: were:
There are are quite a few few laws governing governing the use of
the skills test, complete a medical self-assess-
• Attorney Lisa Emma-Iwuoha, Emma-Iwuoha,
drones for private or commercial use (the laws
ment form and be proficient in English.
• Hennie Kieser, EXCO, Commercial Unmanned
differ between the private user and the com-
You can also not fly in bad weather or where
mercial user). Lisa Emma-Iwuoha, an attorney
your view of the drone is obstructed – although
from Michalsons Attorneys joined iLegal 2016
different exemptions cater for this. If you use it
Aircraft Association of South Africa (CUAASA), and • Francois Stander, research and resource
for private use, however, you don’t need any of
development, Tshwane Metro Police, City of
the special classifications or certifications.
Tshwane. Tshwa ne.
Without special permission from the direc-
The panel was was able to expand expand on the curcur-
tor of Civil Aviation, one is not allowed to fly
rent legalities that affect drone use and explain
a drone above a height of 50 metres, or close
that any activity using drones for commercia commerciall
to a person or people, or a building. If the
purposes, even it is privately owned, still
people are under your control, such as when
qualifies as a commercial operation and needs
filming a movie, for example, you can fly above
the relevant commercial licence and permis-
them, and if you have permission you can
sions. They also noted that going through the
also approach a building etc. You are also not
channels to become an accredited pilot will
allowed near or above strategic points, such as
require a significant investment of both time
nuclear plants, prisons, police stations etc.
and money.
South African law says they are not allowed
Lisa Emma-Iwuoha.
18
CCTV Handbook 2016
www.securitysa.com
to transport cargo or make deliveries; tow
For more information, contact
another aircraft, perform aerial displays or fly
Lisa Emma-Iwuoha,
in formation. Again, this does not apply if you
[email protected],
have been granted an exemption.
www.michalsons.co.za.
CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCTV Handbook 2016
19
iLEGAL 2016
CAMERA SELECTION SELECTION GUIDE GUIDE
Securing your security infrastructure By Andrew Seldon.
Deconstructing the pros and cons of on-site versus off-site surveillance. When considering implementing or upgrading a
devices the client wants to monitor. If you have
surveillance installation, it has become common
a large number of cameras, remote monitor-
for some service providers to offer a hosted con-
ing would have to rely on selective viewing
trol room where the security system is monitored
(or black-screen operations) as there would be
from an off-site location. In some industries, safety
enormous costs involved in transporting huge
considerations even demand that control rooms
volumes of video continually.
are located offsite, although in most cases it’s a
When it comes to people, the decision is
decision each organisation must make for itself.
also a difficult one. When a company employs
The on-site/off-site on-site/off-site decision is one one that
its own operators, it naturally has control over
many security and facilities managers need
their training and performance. However, However, this
to deal with, and one executive management
also opens the door to collusion or intimida-
often also have a hand in making. At iLegal
tion, issues not at all unusual in the South
2016, Dr Craig Donald addressed the on-site/
African context. From this perspective, off-site
off-site debate by breaking down the primary
operators are somewhat safer.
decision factors companies need to take into
The remote remote operators are, are, however, however, disas-
account when considering which solution
sociated and distanced from the client and
works best for them.
this makes intimidation and collusion more
The term remote remote could mean having a control room in the same building or campus,
difficult. Donald ended his presentation noting that
Dr Craig Donald. providers, and auditing them can be handled
around the corner, corner, in another city or even in
the optimal solution would probably be a mix
independentlyy without the feeling of betraying independentl
another country (although data laws may be
of on- and off-site monitoring. On-site control
one’s colleagues.
a hindrance). It can be st affed with the client’s
rooms and operators have a far greater situational
own personnel, or by people employed and
awareness and better response to events as they
panies will favour financial factors in their
trained by the service provider.
happen. They are also in a better situation when
decisions; other will prefer to have all their
they need to provide testimony in court. And then
security personnel under their management
lighting what a control room would consist of
there’s the question of the PoPI Act, which makes
and trained in a manner that best serves the
and what functions it would be responsible for.
on-site storage and control over data critical.
company.. The important factor is to weigh the company
Donald started his presentation by high-
Remote surveillance can or claims to fulfil all
Off-site monitoring, on the other hand,
There is no correct correct answer. answer. Some com-
options carefully before making a decision.
these requirements, but does the client gain or
adds a layer of integrity to operations because
lose when choosing the remote option.
there is no link between operators and on-site
For more information contact Leaderware,
staff. You’re also likely to get a better price
+27 (0)11 787 7811, 7811,
[email protected],
due to the rivalry between competing service
www.leaderware.com
On the infrastructure side, one issue to consider is the number of cameras and other
POPI and CCTV By Andrew Seldon.
The POPI (Protection of Personal Information) Act is long overdue, but it will affect the manner in which organisations conduct their surveillance operations. The POPI (Protection (Protection of Personal Personal Information) Information)
individual who will be responsible for the
companies. For example, cross-border data
Act has not yet commence commenced, d, although it was
implementation and maintenance of the pro-
transfers may not be the best idea once POPI
enacted in 2013. The delay, while frustrating
cesses governing POPI, although the penalties
has commenced. How does a company know
for some, gives others a breathing space to
for non-compliance can apply to a company’s
which regulations its overseas service provider
get their companies up to scratch on the law.
directors, for example.
follows and what recourse do you have if
Francis Cronje, founder & MD at franciscronje.
The colle collection ction of of data is not banned banned com-
something goes wrong?
com and CEO at InfoSeal, was on hand at iLegal
pletely, rather it is managed more effectively.
2016 to talk about what POPI is and the impact
However, the collecting must be done with the
panies can still make use of their surveillance
it could have on surveillance operations.
individual’s consent. Additionally, one cannot
operations, but they need to alert people as
collect personally identifiable information
to the use of CCTV on t heir premises. And, of
about children.
course, there are certain areas where it would
Cronje took the time to explain to the attendees what qualifies as personal and identifiable information, and noted that POPI applies
After the brief introduction to the POPI
When it comes to CCTV specifically, com-
not be appropriate, such as bathrooms. Cronje
to the collection and processing of this data.
regulations, Cronje went on to highlight
advises companies to “use the results of impact
Organisations will have to select an
specific areas where the act could affect
Continued on page 22
20
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCTV Handbook 2016
21
iLEGAL 2016
CAMERA SELECTION SELECTION GUIDE GUIDE
SLA considerations By Andrew Seldon.
A maintenance plan, governed by an effective, well-planned service-level agreement is critical to the success of a surveillance project. Francois Malan, MD of Camsecure has many
whoever is responsible) must also ensure that
years’ experience in installing and maintaining
standards of service and the performance of
surveillance solutions in South Africa, Africa and
equipment are set and documented in the con-
the Middle East. He joined iLegal 2016 to deliver
tract. The company should also set benchmarks
a presentation focused specifically on what a
relating to performance and maintenance, and
maintenance programme consists of and what
measure these year on year. This will ensure
companies should ensure they include in their
that everybody understands the minimum
SLA (service-level agreement) with their service
required, and gives the service provider a base
provider.
to work from. It will also provide the client with
One of the important points Malan made
a base on which to measure the performance
throughout the presentation was the need for
of the service provider, avoiding any misunder-
a defined maintenance programme, not simply
standings or finger pointing when one person
relying on a service provider on a call-out basis.
expects one thing and gets another.
Not only will this help to ensure your system
Along with this, the client must also have
performs optimally at all times, but it will be less
the ability to monitor their system to ensure the
costly than making a call every time something
standards are maintained. This does not have to
Francois Malan, MD of Camsecure.
goes wrong – or simply ignoring problems until
consist of expensive technical equipment, but,
processes, weekly or monthly as required, along
they are large enough and there are sufficient to
for example, can be something as simple as a
with documentation regarding every system
warrant a call out fee.
benchmark document containing a snapshot of
installed, all work done and changes made.
He also advised companies to look beyond
each camera’s camera’s correct view. The provider will be
Malan stressed that the most important
the legalese that make up most of these
tasked with ensuring the camera is not moved
facet of your maintenance and service provider
contracts, and often result in nobody within the
or loses its focus at set intervals. Simple spread-
relationship is communications. Everyone con-
client’s company or the service provider know-
sheets and checklists will also make the process
cerned needs to know who to contact in various
ing what they are supposed to do. Make sure
easier for all. A set standard for product and
situations, what correspondence is required
your operational requirements are clearly stated
repairs must be defined to ensure the correct
(such as purchase orders, invoices, reports etc.)
in the SLA; waffle will result in poor service and
products are always used and repairs handled in
and the timeframes of appropriate responses.
endless misunderstandings.
accordance with these standards.
To T o do this, this, he suggest suggestss first defining defining the
The SLA mus mustt also also con contain tain pro proced cedure uress for for call call
An SLA consists of much more than the few items listed above, as Malan explained in his
service you require. Do you need someone to
outs and reporting. Things to include here are
presentation, but it’s a job worth doing well.
clean the cameras once per month? What about
response times, how many call outs per month
At the end of the day, it doesn’t matter how
checking the cameras’ firmware for updates?
will be required, out of call-out rates, spares that
much you spend on a security or surveillance
What about ensuring the cameras are pointing
should be held on site or with the service pro-
project if you can’t keep the systems running
exactly where they are supposed to point? What
vider, and the process around job cards and logs.
at an acceptable level, and at a predetermined,
about the servers and computers in the control
And this leads to the question of reporting.
acceptable cost.
room – who maintains and updates them?
All too often, reports on maintenance and
These and a host of of other other issues must be clear clearly ly
SLAs are done via word of mouth when the ser-
For more information contact Camsecure,
set out in the SLA.
vice provider meets the relevant manager. The
+27 (0)11 781 1341,
[email protected],
SLA must make allowances for formal reporting
www.camsecure.co.za.
The faciliti facilities es or security security manag manager er (or
(Protection ection of Personal Information) and CCTV POPI (Prot
Continued from page 20
assessment to determine whether CCTV is
company will have to ensure it has set up the
certain time. This process and ti metable needs
justified in all the circumstances and if so, how
recording in such a way that images cannot
to be adhered to and t he footage properly
it should be operated in practice”.
be inadvertently corrupted or copied. People
destroyed.
Furthermore, it is also important to estab-
who you have recorded (or collected personal
In conclusion, Cronje noted that POPI com-
lish who has responsibility for control of
information from) also have a right to ask what
pliance is not impossible if one has the correct
the images, for example, deciding what is to
data you have related to them.
information and uses it to design your data
be recorded, how the images should be used
Finally, although there is so much more
collection and handling processes correctly.
and to whom they may be disclosed.
to consider, once CCTV images have been
Finding your CCTV videos on YouTube YouTube is
collected, the company needs to ensure
For more information, contact
not acceptable.
they are stored securely and that there is a
Francis Cronjé,
[email protected],
process for destroying the footage after a
www.franciscronje.com.
Moreover,, in terms of storing the images, a Moreover
22
CCTV Handbook 2016
www.securitysa.com
2016 CAMERA SELECTION GUIDE SELECTIONiLEGAL GUIDE
Securing your security systems By Andrew Seldon.
“Good Advice:” Protect your surveillance sur veillance systems to protect yourself. We install surveillance cameras and related physical security systems to
But you don’t have to be a hacker to find vulnerable cameras. Corregedor
protect ourselves, our assets and our people. Unfortunately, as surveil-
showed two websites designed to find them for you. Hi-T Hi-Tech ech Security
lance solutions have evolved to the IP platform, irrespective of the
Solutions will Solutions will not promote these sites, but they are easy enough to find.
benefits IP delivers, these systems and devices have become part of the network, and more dangerously, dangerously, part of the Internet. Given the skills and innovation we’re seeing in the world of cyber-
The first produces produces a list of insecure insecure cameras cameras from around around the world. world. All the user does is choose a country and click on the camera he would like to watch. At the time of writing, there were 4949 cameras available
crime, it’s no wonder then, that our cameras, NVRs, DVRs and manage-
for viewing in the USA, 568 in the Russian Federa Federation, tion, 24 in New Zealand
ment platforms have become a target for these criminals. It’s not that
and only 6 in South Africa. If you’re not into being a peeping Tom target-
they specifically want to hack into our cameras, although that seems to
ing a particular country, you can also search for cameras in specific
be a sideline, but they want to find an easy way into our network to get
locations, such as in kitchens or coffee houses and so forth. The cameras
at the data we have stored.
are located in businesses or homes, and sometimes in public spaces,
At iLEGAL 2016, Manuel Corregedor, operations manager at
creating a serious privacy problem – to say the least.
Wolfpack Wolfpa ck Information Risk took attendees through a brief introduction
The sec second ond site pro promot motes es itse itself lf as as the the searc search h engin engine e for for the the Inte Internet rnet
to the weaknesses of their surveillance systems. Wolfpack is a company
of Things (IoT) and allows you to search for any devices online, including
that focuses on threat intelligence and research, training in the area of
surveillance cameras. It even allows you to choose pre-selected searches for
combating cybercrime as well as offering an advisory service.
cameras or industrial systems and much more. This site finds open cameras
Corregedor started by highlighting the threat landscape the always-on
and those that are protected by passwords; you can even instruct it to find
world faces today, as well as the evolution of hacking from a fun activity
cameras that are using the default passwords. The result is the same, not only
that did little more than irritate victims, to a major money-making racket
are we faced with a privacy problem, but also open doorways to networks.
for organised crime, to the latest state or activist means for collecting information and disrupting companies – or even whole economies.
People, process and technology Corregedor went on to explain that the risks we face are a combination
Hack your CCTV
of technology, people and processes – as always seems to be the case.
He then focused on CCTV cameras and their vulnerability to hacking.
He then went on to briefly touch on the subject of how to assess your
From home users connecting cameras to the Internet to watch their ki ds,
risk and formulate a plan to deal with the problems you find.
or even babycams designed to keep a remote eye on babies, through to
The goal is to implement effective effective prevention prevention solutions, solutions, and this
gaining access to private and public sector data via unprotected surveil-
does not always require buying the newest and most expensive technol-
lance cameras, there are many reports on how people have exploited
ogy. Sometimes it means using what you have effectively. effectively. An important
cameras for criminal purposes.
part of this is understanding that a camera is a risk, but it is part of a
The vulnerabilities vulnerabilities we face face with cameras cameras range from not not chang-
broader infrastructure that has different risks and vulnerabilities, and
ing the default password on cameras through to not updating camera
companies need to assess the whole in order to protect themselves.
firmware with the latest updates and countless others. These all leave companies with easy-to-exploit vulnerabilities. One need only do a
For more information, contact Wolfpack Information Risk,
Google search to find more stories than we would care to imagine.
[email protected],www.wolfpackrisk.com.
[email protected], www.wolfpackrisk.com.
www.securitysa.com
CCTV Handbook 2016
23
iLEGAL 2016 SPONSORS
CAMERA SELECTION SELECTION GUIDE GUIDE
Alll ab Al abou outt ef effi fici cien ency cy Local video management system demonstrates why it is a global globa l leader. Cathexis used its sponsorship of iLegal 2016
used by the customer. As an example, Brecher
to highlight the enhancements it made to its
notes that many VMS vendors say they are
locally developed CatVision video management
able to handle 300 Mbps of video per record-
software. The company’s stand had numerous
ing server. The latest version of CatVision has
videos on display demonstrating the capabilities
been optimised to support up to 1500 Mbps.
of the VMS, whether it was collecting number
This means companies companies can handle handle up to 1 000
camera to the next because they don’t know
plates and the speed of cars on a highway or
cameras on a single recording server, which
which cameras are placed where.
tracking people entering restricted areas.
dramatically reduces hardware spend. Cathexis
The latest latest enhanc enhancements ements to CatVision CatVision are
Neighbouring Camera Mapper solves this
has also improved imp roved the effi ciency of client cli ent or
by automatically automatically bringing up the next camera
not ground breaking innovations, according
viewing servers by using ‘intelligent ‘intelligent video
as the operator is following someone. In this
to MD Gus Brecher, but part of a focused effort
stream switching’ to ensure that the processing
way it becomes easier to follow a suspicious
from Cathexis to make the system easier to use
requirements are effectively reduced
person or package as it moves around, around, without
and to ensure optimal opti mal efficiency, which whi ch will save customers money on the hardware they require. The role of of management software has
In order to help to make control rooms more efficient, Cathexis Cathex is has introduced in troduced
wasting time or relying on guards to assist. Brecher also notes that the value of part-
SmartSearch. This technology makes searching
nerships and alliances is becoming more
become more important over the years as
for and finding specific video footage easier
important as customers demand integrated
the resolution of sur veillance cameras cameras has
and faster by enabling very fast searching
solutions that are easy to use. Cathexis has
increased. Better quality images mean better
via snapshots or thumbnails (SnapSearch)
recently confirmed alliances with numerous
analytics can be performed on the video, but it
and also the ability to search recorded foot-
third parties in the surveillance and other
also means companies require more network
age by looking for motion in selected areas
security areas, such as access control.
bandwidth and more storage space to transmit
(MotionSearch).
and hold the higher-resolution video, and they
Another boost for operators is
“As budgets get tighter, it’s up to Cathexis to innovate and find ways to allow our customers
need more CPU cycles to deal with enhanced
‘Neighbouring Camera Camera Mapper’, a new feature
to do more with their video without demanding
analytics processing requiremen requirements. ts.
that makes it easier for operators to track suspi-
they upgrade their hardware,” says Brecher.
To cater for the the increased demands demands video
cious people and vehicles. A common problem
places on storage and client servers, Cathexis
operators encounter encount er is the diffi culty in tracking track ing
For more information contact Cathexis Africa,
has focused on improving its software to
people as they move around. All too often the
+27(0)31 240 0800,
[email protected],
take better advantage of the server hardware
operator wastes time trying to switch from one
www.cathexisvideo.com.
Focus on mobile surveillance Elvey Security Technologies took advantage of its iLegal 2016 sponsorship to highlight the range of
card to support existing analogue cameras.
methodology built up over the years. Its value-
Francois Smuts was one of the Elvey team
add stretches down to the branch level where
Heitel mobile surveillance storage systems it has
members on the stand, where he was able to
it is able to cater to the needs of installers and
on offer. Transportation and logistics has become
inform visitors of the benefits Heitel solutions
integrators,, assisting them in various areas of integrators
a prime target for criminals in South Africa, result-
offer and show a number of videos demon-
the sales and implementation process. process. Smuts
ing in the need to develop innovative security
strating the technology in action. Elvey also
says Elvey is successful when its channel part-
solutions to protect people, vehicles and assets
highlighted the Dahua camera range, a few of
ners and their clients succeed.
while in transit as well as in the warehouse.
which were also on the display.
The Heitel Heitel mobile NVRs, includ including ing the
Elvey supplies a full range of surveillance
The distribut distributor or also also places places a strong focus on training to ensure its channel has the skills
entry-level CamDisc E, are designed to make
products apart from the Heitel brand. It can
required to implement and maintain products
surveillance while on the move simple and
provide clients with a variety of professiona professionall
effectively. Apart from Elvey’s in-house training
reliable. The CamDisc supports the transmission
and specialised cameras, monitors, switches
programmes focused on a variety of products, it
and recording of four IP video cameras, and has
encoders and decoders, as well as the cabling
is also an offi cial partner par tner for Tavcom training in in
a 1 TB hard drive integrated into the system for
required as the foundation for a surveillance
South Africa. Tavcom Tavcom Training is an international inter national
video and GPS data storage. It also supports bi-
project. Understanding the requirement for
provider of accredited online and classroom
directional audio streams, allowing communica-
integrated solutions, Elvey also provides a
security training courses which cover CCTV,
tions between a control centre and the driver.
selection of market leading products and
access control, intruder alarms and more.
Customers can also choose to include 3G or 4G communications to transfer data to a control centre from the vehicle under surveillance, or they can add a 4-channel analogue video
24
CCTV Handbook 2016
www.securitysa.com
solutions in the intrusion, access control, fire protection and communications markets.
For more information, contact Elvey Security
He adds that Elvey not only distributes sur-
Technologies T echnologies,, +27 (0) 11 401 6700, 6700,
veillance equipment, but has a proven support
[email protected], www.elvey.co.za.
iLEGAL 2016 SPONSORS CAMERA SELECTION SELECTION GUIDE GUIDE
A risk management and intelligence platform Effective data mining is key to successful risk management. Neahges Africa is a subsidiary of an interna-
ability by gathering intelligence from multiple
tional company and is focused on risk manage-
sources through machine-to-machine com-
ment on the African continent. The company’s
munication, workflow integration and human
Kelly McLintock says Ges offers comprehen-
interfacing. Synapse is designed to interface
sive solutions adhering to international best
and operate at all tiers within operations.
• Cameras: Bosch /Axis. /Axis.
practices. Its integrated security services
Ges Africa also makes use of Capsule
include mobile and fixed-site protection,
Technologies Tec hnologies to ensure ensure that the data data the
• Radios.
community engagement plans, intelligence
security and risk management industry relies
• Alarm systems.
and analysis support, security assessments and
on is kept in a failsafe and robust storage solusolu-
• Motor vehicles.
technologies.
tion that can support the industry’s demands.
• Sensors.
McLintock says Capsule brings next generation
• Meters.
Ges Africa was an exhibitor at iLegal 2016
• Access control readers and controllers.
where the company was able to interact with
storage and server vir tualisation concepts to
McLintock adds that the GES/Synapse
visitors and explain the company’s approach to
an industry which is challenged by exploding
solution goes further than traditional security.
risk management. Ges was also able to dem-
requirements in storage processing power and
Generally, any electronic devices that can
onstrate a partnership with a locally developed developed
network speed.
transmit information can be used as a data
situational awareness and IoT (Internet of Things) management management solution, Synapse. Synapse. The solution assimilates assimilates client-owned client-owned
To round out its offering offering to clients, Ges also
source for Synapse to mine and analyse, feed-
offers clients the technology and solutions
ing back actionable information on an organ-
required to capture information from edge
isation’s risk posture.
technologies into a unified management solu-
devices in order to send them to Synapse for
tion. The integrated solution offers real-time
analysis. These include:
For more information, contact Kelly Mclintock,
situational awareness and event resolution
• BYOD (Cell phone pads or laptops).
+27 (0)82 805 8447,
[email protected].
Something old, something new MiRO supports IP convergence with a security focus. Value-added Value-add ed distributor MiRO focused on
provider, it is able to provide full solutions
over 150 countries for a variety of communi-
three of its products on its sponsor’s stand at
to the security market, from the network to
cations requirements. The company believes
iLegal 2016. The products on display were from
the cameras and the management software
wireless is the future and MiRO has taken this
VIVOTEK, Uniview and LigoWave.
required to run everythi everything ng efficiently.
brand into numerous customers with success.
Marco de Ru, CTO at MiRO was on hand to
De Ru adds that companies looking for
A new entrant to the MiRO product range
discuss the products from MiRO, as well as the
surveillance solutions often have a good
is the Uniview brand. Uniview has a history of
role MiRO plays in the security industry. De Ru
concept of what they want in terms of cameras
innovation and offers a range of cameras that
explains that MiRO is an IP convergence com-
and their functions, but tend to forget that
meet every need. The cameras are found in a
pany and as the security industry moved to the
surveillance needs a good infrastructure if the
variety of security projects globally, globally, including
IP platform it became part of the IP conver-
solution is to deliver as required required.. From this per-
public security, securi ty, traffic monitoring, petrochemipe trochemi-
gence trend and MiRO now finds a significant
spective, MiRO is in a good position to assist
cal surveillance, high-end buildings and more.
part of its business is security based.
as it can advise on cabled network solutions as
Since MiRO is a complete solutions
well as wireless solutions. There are people who have have doubts doubts about
The third brand brand on the MiRO stand was VIVOTEK, a camera brand that needs no introduction. De Ru says VIVOTEK has quickly grown
the efficacy of wireless networks ne tworks for the sursur -
to establish itself as one of the world leaders in
veillance world, but De Ru says it all depends
network video surveillance with a wide range
on how you design the network and the
of IP cameras, NVRs and encoders.
products you use. Wireless networks today are
Visitors to iLegal 2016 were able to view the
as reliable and secure as their wired counter-
products and chat to MiRO staff about their
parts, and companies need to examine their
features and benefits, as well as what MiRO
environmentt to determine which solution i s environmen
as an IP convergence company can offer the
the best fit for them. In many cases, MiRO has
security industry.
found that a combination of wired and wireless technology provides provides the best results. The LigoWave LigoWave product product set is a wireless wireless networking solution that has been installed in
For more information contact MiRO Distribution, 086 123 MIRO, MIRO,
[email protected], www.miro.co.za. www.securitysa.com
CCTV Handbook 2016
25
OPINION
CCTV in 2016 By Rob Anderson, MD of Rob Anderson Consulting.
New technology is fantastic, but should you be selling it to your clients? The CC TV world conti nues to evo lve a t an
their appearance, the idea being to solve
we continue to use. We still call it CC TV
amazingly fast pace. Regardless of whether
some of the problems experienced with
(“Closed Circuit” TV ). It is no longer a closed
you have been in the industry for years
optical cameras in very low light conditions.
system. We connect the system to networks
or you are a recent entrant, it has to be a challenge. The c hange from t aped record ings to
The t herma l cam era s udde nly l ooke d
and Internet and get “open” access. This
like taking over the challenge of night CCTV
introduces a new risk, and should be called
solutions, but optical camera manufacturers
OCTV.
digital storage feels like something that
took up the challenge and extra low light
happened a lifetime ago. This change then
cameras hit the market. These cameras are
many others as OCTV practitioners, we
paved the way for the IP world to move into
producing results that seem impossible to
have a big responsibility and much to
CCTV.
believe in terms of picture quality under
consider in providing quality and relevant
extremely low lighting conditions.
solutions for our clients. Are we up for the
We have seen the IP CCTV system maturing and producing results that have great
The t alk is now that new ca meras are o n
When we consider all these facts, and
challenge?
benefits, but the analogue solutions have
the horizon which will combine thermal and
not died. In fact, they appear to be trying to
optical camera technologies, to provide the
achieving this quality solution? Clearly
challenge the IP revolution.
optimum solution. The disadvantage is that
this article will not solve this dilemma.
these amazing technological advances are
What will go a long way to achieving the
NVR would be the only way forward, we
taking place at a time when we have a dire
best result, is to focus on a few important
see that embedded recorders continue to
shortage of skills to implement the solution.
considerations:
play their part. In fact, we are seeing hybrid
And to make it all a bit more difficult, the
a. The outcome must be operationally prac-
(incorporating both analogue and digital)
solution has to be used by by people/opera-
tical and add value to the client’s secur-
embedded recorders that are very good.
tors/security guards who do not usually
ity operation. If the system is difficult to
have this sort of technology as their core
operate and does not provide the results
Just when we thought that the PC based
Therma l ima ging c amera s the n mad e
education. What tools do they need to understand
How do we develop an ap proach to
required, it is a failed system. b. The system must function efficiently
the solutions we are putting in from of
under all situations. The situation could
them? And from the technology design
be an environmental issue, p ower failure,
point of view, does the head-end soft-
network failure or operator failure.
ware have the flexibility to provide the
c. The system must have adequate product
requirements and user interface that the
support and if this is no longer avail-
operational task requires. In fact, what is
able, equipment can be replaced with an
the task?
alternative.
This all lea ds us t o a sk: Can we b e s ure
d. Let somebody else try the ground break-
that we are offering our client the best pos-
ing technology first. Each camera must
sible solution, to provide the best outcome,
be placed for a very valid reason.
and that we have the infrastructure to support new technology for, say, say, the next ten years? We should also reconsider the name
e. Don’t put the new “unbelievable” technology into your client’s project. Solutions must be tried and tested. f. If you can’t write down the job description of each camera and de scribe how the system must be operated to achieve the outcome, don’t build it. Change is ongoing, so defining your design and selection process and then measuring the outcome on a regular basis, is important. We all need to make this part of our way of operating. Enjoy being part of the evolution, and helping the industry to mature. Your Your client will be satisfied and you will have a viable b usiness. For more information contact Rob Anderson,
[email protected],
Rob Anderson, MD of Rob Anderson Consulting.
26
CCTV Handbook 2016
www.securitysa.com
www.robanderson.co.za
www.securitysa.com www .securitysa.com
CCTV Handbook 2016
27
OPINION
Is surveillance learnable? By Dr Craig Donald.
Can you change somebody’s natural ability to do surveillance? sur veillance? People bring natural skills to the work and
repeat an evaluation of observation and
play environments that enable them to do
visual analysis, people score much the same.
things better than other people. For some,
This indic ates that a person is fairly consis-
like sportsmen or sportswomen, there is a
tent across time in these skills. However, like
physical ability, coordination, muscle tone,
an athlete trains in order to refine the ability,
reflexes and eye-hand or eye-foot coordina-
there must be ways of improving natural
tion that makes people better at certain
performance.
sports.
I had a delegate on one of my courses
A swimmer is likely to have a different
who picked up some behaviours on video
combination of these to a soccer player.
that virtually no one else had. I discussed it
However,, it is the level of these natural abiliHowever
with her afterwards, and she said she spends
ties that causes people to follow a particular
a lot of time playing “find the hidden object ”
career path and is the reason that some are
games. The need for quick review, homing
paid millions and perform in the top sports
in on certain characteristics, and needing
tiers, while others provide a supporting role
to sort out key characteristics are elements
or drop out. There are also natural require-
that are relatively important in visual analysis
ments for different jobs in security, and
skills. Somebody who repeats these activities
surveillance is just one of these.
frequently must improve to some extent.
Effective surveillance needs good obser-
The ques tion thoug h, is can a nybody do i t
vation, an eye for detail, visual analysis, visual
or only somebody with the potential or a cer-
perception and acuity among others. There
tain level to start with? No matter how often
Dr Craig Donald is a human factors spe-
are some people who naturally pick up more
you run the 100 m, none of us will be Usain
cialist in security and CCTV. He is a director
things than others. I’ve found that the 80/20
Bolt, but we may get a little faster if we do
of Leaderware which provides instru-
rule is not uncommon in some surveillance
so. It may be possible that this woman was
ments for the selection of CCTV opera-
operations, where 20% of operators pick up
already good, which is why she enjoyed the
tors, X-ray screeners and other security
80% of detected incidents.
hidden object games. So there is obviously a
personnel in major operations around the
base line from which improvements will be
world. He also runs CCTV Surveillance
skills, does it mean that they are not suitable
made, and equally limits on how much we
Skills and Body Language, and Advanced
for the position? Like anything else, we have
can improve.
Surveillance Body Language courses for
If somebody doesn’t have these natural
to recognise that there is always a range of
I visited Zurich airport a few years ago
CCTV operators, supervisors and manag-
abilities and it may not be in our budget to
to look at the aviation X-ray screener opera-
ers internationally, and consults on CCTV
get the absolute best. Not everybody can be
tions. They have a stringent selection polic y,
management. He can be contacted on
Manchester United or Barcelona players. So
but for those who succeed, there is extensive
+27 (0)11 787 7811 or craig.donald@
in these kinds of cases, you may set a mini-
training afterwards. This training progresses
leaderware.com
mum expected standard.
in levels, but involves the items in the X-rays
For example, in our assessments of appli-
having their position changed, being offset
I’ve found with training that a similar kind
cants for surveillance we recommend a level
by other items, camouflaged in various ways,
of thing can happen with CCTV – people see
of performance based on research that we
and generally becoming more and more
an indicator that they have been shown to
think would make a good operator operator.. People
difficult to identify as levels went up. There
highlight an incident condition during training
can accept applicants scoring lower lower,, but that
were far fewer personnel at upper levels of
and respond to this, and the more they have
comes with its own risk. Subsequently, one
certification indicating the difficulty for most
seen it, the quicker and more consistent the
of the most common questions we get is
people to improve to these levels, but their
response. So a person can develop a particular
whether we can improve this natural ability
performance was awesome.
characteristic through some kind of muscle, or
of people so that next time they can pass.
One of the reasons the top screeners were
in this case, mental memory.
It is a very relevant question for the person
successful was developing almost a mental
Does this change the natural skill level
applying for the job, as well as the organ-
memory for the ways in which threat items
though? We find that people who are better
isation who is needing to fulfil the staffing
could be detected. For example, repeatedly
at recognition to start with can typically
requirements.
viewing an item rotated in various different
develop more effectively and perform at
ways eventually develops an almost auto-
higher levels. Further, while one aspect of the
matic mental recognition of the threat condi-
person’ss abilities may change with this mental person’
So the question arises, can you improve natural abilities?
tion no matter what angle you are looking at.
rehearsal, this is unlikely to change qualities
Improving natural abilities
Eventually,, they hardly have to think about it, Eventually
of the person in all the other areas – it simply
We have generally found that when we
as recognition becomes almost automatic.
improves one aspect of the person.
28
CCTV Handbook 2016
www.securitysa.com
OPINION
Maximising performance
conditions, the more likely they are to pick
and you are likely to get much greater return
We find that natural visual analysis skills there-
up if something is different. Sometimes this
from your system if you take this approach.
fore remain relatively consistent for a person
awareness develops over years and becomes
However, we can’t simply take it for granted
across time. Some specific aspects may be
some kind of local knowledge.
that people who have the natural sk ills will
strengthened through practice, but the overall
Lastly, whether people get training for this
automatically pick up things. We need to be
capacity of the person is likely to be relatively
type of task and the level of training they get
constantly looking at ways in which we can
similar. So the focus changes to trying to maxi-
will have a strong influence on their perfor-
improve performance of people at all levels.
mise the performance of people with lower
mance. I’ve heard people complaining about
skill in other ways.
how can they be expected to pick up things
incidents, analysis of ways in which people
Interest is one of the defining factors in
doing surveillance if they have never being
can commit offences, and operators continu-
improving performance. I’ve found that where
trained for it. They have a point with these
ally viewing and thinking about what they
interest is lacking, performance inevitably
comments. Certainly I have found training
see around them may be important ways
suffers. The personality of some people is
changes people at a number of levels, includ-
to enhance people’s performance. One of
also more suited to driving performance than
ing interest, situational awareness and motiva-
the features of an Advanced Motor Vehicle
others. Outgoing, extroverted and energetic
tion, and is capable of a significant and rapid
Driving course is that you provide an ongo-
people seldom can handle the constraints of
improvement in performance.
ing commentary about what is happening in front of you.
a surveillance control room for an extended period.
Mental exercises, viewing of previous
Observation and analysis skills
Getting operators to do this, even if in
Our research indicates a strong relationship
their own mind, is a way of focusing them on
be bouncing off the walls in a few days. On
between surveillance abilities like observa-
what is happening in the areas they are view-
the other hand, from a personality point of
tion and visual analysis skills and detection
ing. Develop the skill by asking them on a
view, people who are suspicious, question
on the job. There are some people who
regular basis what is going on, where certain
behaviour, and don’t take things for granted
simply do not have the skills to make good
people have come from, things out of the
are also likely to pursue targets more strongly.
operators and who will always struggle to
ordinary. In fact, any question asked regularly
Those with a good situational awareness will
recognise details that are being displayed in
about the scenes they are look ing at is going
often pick up things because of sensitivity
front of them.
to improve performance as it gets people
No matter how talented, they are likely to
to what is going on around them. The more people know an area and have a “feel” for the
Ideally you want the best people possible to deliver on the capability of your system,
thinking about what they are looking at and that can only be a good thing.
www.securitysa.com
CCTV Handbook 2016
29
TREN DS
Seven video surveillance trends you can’t afford to overlook A Seagate White Paper.
The surveillance industry is set for growth growth into new as well as old areas. areas. Do you know what’s next for video surveil-
2011, investigators seeking information about
optimised HDDs for surveillance applications
lance? It’s an incredibly dynamic industry that
rioters in Vancouver received more than 5000
and improving their overall lifespan.
continues to grow at an exponential rate.
hours of video from the public, ultimately
Are you keeping up with the trends that are
helping them find the suspects.
fuelling this momentum? More importantly,
One of the immediate practical applica-
Video surveillance backup and video data recovery
are you capitalising on the trends that can give
tions of this trend is the ability to improve
The #1 pain point for vi deo surv eill ance sys-
you a profitable competitive advantage? This
reaction time of law enforcement agencies,
tems integrators is data loss. And with good
article will show you what to watch out for and
especially with the use of social media moni-
reason. After all, what exactly is the proper
provide some insight you can implement that
toring. Of course, the continued growth in this
protocol to follow to recover your surveil-
will help you do just that.
space will create data analysis and manipula-
lance footage?
tion challenges as authorities deal with the
Network cameras as emerging stars
unsophistication of the source files.
Fixed-dome and180/360-degree IP network
If your customers have tried to pinch pennies by installing a standard drive for their surveillance system’s storage, the
No substitute for the right surveillance storage
answer is nothing. If they bristled at the ini-
segment, and the city surveillance and utilities/energy sectors are vertical markets to
Relying on traditional desktop drives, while
aren’t going to want to absorb a starting
watch. According to IHS, 180/360-degree IP
they may have the required space, isn’t a best
recovery cost of about $499. That means the
panoramic network cameras are forecast to
practice because they’re not built to withstand
data is gone.
increase global unit shipments by more than
the constant data writing involved when
60 percent year-over-year.
capturing multiple streams of high-definition
lance hard drives that are specifically engi-
video. The rigors of today’s video surveillance
neered for demanding surveillance systems.
are the preferred choice for monitoring wide
systems require true 24x7x365 operation. And
Seagate now offers a three-year Rescue
indoor areas, meaning customers can save
the reality of the situation is that standard
Data Recovery Services plan with select
money by installing fewer cameras while still
desktop drives just can’t handle the workload.
Surveillance HDD models. If customer data
cameras are the fastest growing product
With their increased scope, these cameras
covering the same area. That’s why they’re
Customers use desktop-class drives today
tial cost of a proper drive, chances are they
Companies like Seagate offer surveil-
is lost, deleted or corrupted, Seagate Rescue
predicted to gain increasing market share in
for low-cost, high-capacity storage, but they
will help your customers get their data
verticals such as retail, airports and casinos.
compromise their system reliability by using
back from their failed drive with a reported
Even entire cities are attempting to capitalise
these drives in a surveillance environment.
industry-leading data recovery rate of 90%.
on this trend in an effort to help them solve
It makes sense then that choosing the right
and prevent crimes.
drive can dramatically improve a system’s overall ROI. There are a variety of companies
Video management systems and video bandwidth management
Crowdsourced Crowdsourc ed video surveillance sur veillance
that manufacture drives built specifically
With the rise of high-definition video and
With the increasing prevalence of mobile
to help optimise video content recording/
IP cameras, it’s more important than ever
users, crowdsourced video surveillance data
playback and drives built to quickly process
to take into account the bandwidth needed
will be on the rise. This trend took centre stage
data and provide faster performance. For
to run your system at maximum efficiency.
during the Boston Marathon bombing as per-
example, Seagate provides surveillance drives
If bandwidth isn’t optimised, video quality
sonal photos and videos played a major role in
that provide enhanced data integrity and can
will degrade and the efficacy of the entire
identifying the Boston bombing suspects. In
help you reduce cost of servicing by delivering
system will be irreparably compromised.
30
CCTV Handbook 2016
www.securitysa.com
TREN DS
HD over coax
scalability,, but it can be complex especially scalability
multi-streaming and video compression are
According to Genetec, multicasting,
According to IHS, we should expect more new
for small installations. With IP and analogue
three innovative methods that users can
product and service announcements from
cameras displaying different strengths, more
use to optimise bandwidth management
network-focused security companies as they
companies will start to implement hybrid ver-
in video surveillance applications. With
seek to add new revenue streams to their
sions of each technology in their systems.
video management software (VMS), users
portfolios. So where will some of these new
can leverage existing hardware and software functionalities to experience benefits
sources of revenue come from? Even as the popularity of IP cameras con-
As video surveillance continues to evolve across both public and private sectors, there’s an increasing opportunity to capitalise on these
such as reduction in bandwidth require-
tinues to grow, acquiring more than 50% of
emerging trends in order to gain a distinct com-
ments, optimisation of network resources,
the market by 2017-18, we see HD over coax
petitive advantage for you and your customers.
and decrease of storage needs. As long as
being a promising area to watch. It’s gone
they’re supported by an intelligent VMS,
through evolution from analogue to HD-SDI
to listen to their customer needs, understand
multicasting, multi-streaming and video
(high-definition serial digital Interface) in its
their path to growth and engage with them
compression can ultimately contribute sig-
early stages and now with HD-CVI (high-defi-
not just at the initial install. By thinking of the
nificant cost savings and long-term invest-
nition composite video interface) and HD-TVI
engagement as more than a one-time sale
ment protection.
(high-definition transport video interface)
and focusing on the expansion of systems
iterations, and AHD (analogue high definition).
themselves – over larger spaces or with more
More than ever before, businesses need
Video analytics: Do more than ever before
for two simple reasons. One, there is no
Embedded low-end video analytics appli-
latency over coax so what you see is what you
cations have already been offered as free
get in real time. This is obviously the preferred
full version, please see http://www.seagate.
features. But are free apps a viable option, or
working state for businesses like casinos
com/files/www-content/ti-dm/_shared/
will there continue to be a market for video
and some applications that need real-time
images/top-video-surveillance-industry-
analytics? One thing is clear: vendors can
monitoring of their properties, and who are
trends-for-2015.PDF (short URL: http://goo.gl/
no longer charge for basic algor ithms. Yet, Yet,
not worried about missing anything due to
GkCxo6).
more advanced analytics remain profitable.
latency issues.
There are mu ltip le co nside ratio ns whe n it
It has maintained its position in the market
And two, it’s innately easier to set up – a
cameras – they set themselves up for future opportunities to generate sustained success. This white paper has been edited. For the
For more information contact Marti n Kruger,
comes to analytics, with each area projected
true plug-and-play solution. IP ultimately offers
Seagate South Africa, +27 (0)76 360 2850,
to continue growth well into the future.
higher quality, better integration and higher
[email protected]
www.securitysa.com
CCTV Handbook 2016
31
CITY SURVEILLANCE
City surveillance: 20 years later By Neale Strauch, MD, Techsec Techsec Security Services (T/A The Lab).
City surveillance: has it improv improved ed or declined over time? Twenty years down the line and having having
subcontractor), we give our clients the full
Why is this then not the case?
completed many city surveillance systems
service ranging from the design of these
Six main methodologies need to be under-
and expansions thereof, we find ourselves
systems, the civil works, fibre installation,
stood, specified and implemented.
questioning the technical, operational, legal
planting of poles, control room layout, the
1. City surveillance is not about the cameras,
and maintenance methodologies followed in
installation of the cameras and head-end
the people or the technology used. City sur-
southern Africa.
culminating in the handover of a functional
veillance has only one output, the footage.
During the late ‘90s, we published a summary of a thesis on the utilisation of CCTV in
system. In saying this, we have had many frus-
2. City surveillance is not only a crime-fighting tool, it is a city management tool.
public spaces (CCTV in the streets the true
trating discussions with end-users, consul-
facts, N. Strauch, 1997), which was based on
tants, clients and suppliers who deem their
at statistically high crime points throughout
research we had done. The aim at the time was
new systems as the solution to all a specific
the city is a recipe that just does not give the
to identify what was done in other countries
city’s problems. This does go a long way,
successes hoped for. Each city has its own
(Europe) and specifically to find out what
but is generally seen primarily as a crime
character, thus a design that enables track
would suit the African continent and to learn
prevention tool. It has been difficult to alter
and trace by the operator brings success.
from their mistakes.
this perception to the understanding that it
4. Operators are a unique breed of person.
Well, 20 years later and the conclusion seems to be the same, more ‘new’ companies
is a city management tool. Then again , mana ging t he ci ty by these
3. Hot spotting where cameras are deployed
They are not uncles, cousins, children or a D grade security guard. Operators should
have joined this lucrative sector of the market,
means, it seems, could allow a service
have the ability to proactively identify the
re-inventing this wheel many times with new
provider to step into the shoes of those
incident, follow it through its lifecycle and
technologies leading the operational output,
responsible for other services such as
build the case.
untrained staff and low maintenance uptimes.
electrical, water, sanitation and traffic; the
The operational methodologies have gone
reporting thereof could thus be harmful.
gatherings or loitering, rings bells when ille-
a full circle where we find ourselves doing
On the other hand, in cities where the tool
gal parking or driving is analytically deter-
things the way they were done in the late
is embraced as a management tool, these
mined and criminals are identified anywhere
1990s.
managers have the facts at their fingertips.
in the city via facial recognition, might work
Water leaks are fixed immediately, rubbish
in the minds of clinically calculated software
story behind each of the systems operated in
heaps are cleared, traffic lights and traffic
design professors. South Africa, however, is
our country and it is not my intention to criti-
congestion is taken care of and streetlights
undisciplined and electronic rules that are
cise any of these. The experience gained over
are functional.
set-up to detect exceptions just cannot be
Yes, it could be said that there is a success
the years where city surveillance has remained
Electronic patrols of each area covered
5. Smart cities where technology warns of
implemented and are impractical to police.
my core interest needs to be told, if only to
by the surveillance technology can be done
shed some light on what works and where the
frequently, picking up all management
pitfalls are.
incidents and reporting these to the differ-
The footage
ent departments.
It has become critical that attention be given
As a third-party company (a specialist
6. Maintenance policy is critical.
to all factors that influence the quality of the footage during the design phase. With the flood of technology advancements and dumping of cheap products into the South African market, we seem to believe the specification sheets attached to tender documents. The IP products in particular have created a storm, some of the end users deem the words digital and IP to be this massive advancement and even believe that all IP products, by virtue of the name, are the same. Bad footage, even when compared to old analogue recordings, are popping up in the market and when utilised in the public surveillance scenario will cause cases to be lost in a court of law. Simply put, if the operator is correctly selected and the system is designed Continued on page 34
32
CCTV Handbook 2016
www.securitysa.com
www.securitysa.com
CCTV Handbook 2016
33
CITY SURVEILLANCE
Continued from page 32
against crime happened when an operator
the centre and physically sits here. Even lead-
specifically for city management, then record-
who took her job seriously noticed a city
ing the Metro and SAPS vehicles to a crime
ing space is only needed for 48 hours and in
owned truck had been parking at the same
scene via radio is problematic when done by
some cases 72 hours. If the operator did not
place every Wednesday. Initially, just mentally
a service-providers supervisor, because these
see the incident and the recordings are not
recording the fact, she made it her personal
services have protocols and don’t really like
reviewed, then only the odd, by chance inci-
project to find out more.
listening to a civilian.
dent recording could mean something. Any
During her break she then approached
Once again, the solutions are easy but
incident that was not seen by the operator
the review specialist and they reviewed and
need dialog and buy-in from the authorities in
should be picked up on the next rotation of
stored this footage. As time went by they both
that city. In places where it has been imple-
the camera or from a static, and there will thus
realised that there was something fishy going
mented, it works reasonably well as long as
still be time to respond.
on and involved their managers, who esca-
the dedication and the chip on the shoulder
lated this to the responsible person in the city.
of some is not the important factor. There
City management
A project was registered and all eyes were on
are many more such management functions
Over the years, incidents have been logged,
the truck, every move was watched and even-
that could be discussed and it is merely the
recorded and processed, giving a perception
tually it was confirmed that diesel was been
creative thinking and willingness to utilise the
that crime is being tackled by the utilisation of
sold off to small users. The decision to hold
surveillance centres to their fullest that will
city surveillance. Is this the case? Yes, but what
back on arrests paid off and in the end, with
make the difference.
about all the other service related incidents a
buy in from the manager involved, the Metro
city can be proud of?
Police and SAPS, a whole ring of criminals was
Hot spotting
apprehended and convicted.
Evaluating Evaluatin g a city during the design phase takes
Some cities that utilise the tool to manage all their service-related incidents should be
Planned operations with Metro Police
input from all involved to ensure that the most
screaming this success from the top of their
to enforce bylaws such as closing times and
effective placement of cameras is determined.
highest buildings. During a normal day service
selling of alcohol at night clubs all under the
Years ago, we would look at a city to find what
delivery managers are faced with many chal-
watchful eyes of the control centre can be
we then termed crime drawers. These are spots
lenges, some of which seem trivial, but to
done. During such operations, having SAPS
where criminals are naturally drawn to: ATMs,
the citizen on the street it is noticeable when
and Metro both in one vehicle attending to
taxi ranks, banks, shopping centres, stations,
things are different.
crime and bylaw enforcement at the same
taverns and main walkways are some examples.
time, can only be dreamt of.
We would then evaluate statistics and overlay
Traffic lights seem to go off just before morning traffic and then there is chaos. How true is this, and all we do is sit there in queues
Some centres have allocated seats for city management functions, Metro Police
them on these spots to determine the factor of accuracy. This is called hot spotting.
hoping that someone will send out a crew to
and SAPS, but this is few and far between.
either repair the fault of have a points man
There is unfortunately, in some cases, a sense
we found this to be ineffective. This mainly
deployed. In the world of an organised city
of degrading the position of such officers
because the reaction teams had to race from
where embracement and understanding of
especially where a service provider manages
spot to spot and perpetrator perpetratorss would inevitably
the added value of a surveillance system is
the centre. The choice to utilise own staff or
be long gone. Printed snapshots of the perpe-
prevalent, these failures are reported as and
to outsource is a discussion that will be had at
trators pinned to a wall showed no real success
when they happen, with immediate reaction
another time.
and they were never seen again. The advent
and repair even before the city awakens.
These officers, if motivated and chosen cor-
As time moved and experience was gained,
of facial recognition software caused much
rectly, can drive such a centre to its maximum.
excitementt and product sales people crossed excitemen
that can demonstrate the power of effective-
However, it would need a senior official to
our doorstep on a daily basis. It was said that
ness in both city management and the fight
whom they would report who is dedicated to
we could load this wonderful software and
An interesting case that comes to mind
when a face which was loaded on the database was recognised, it would warn us and we could send the SAPS to apprehend him. Little did we know that hit rate, lighting and the angle of view would have such an influence that to date this has not succeeded. Operators are there to build the case through its lifecycle, not to hit the reject button every 10 seconds because of mismatches. The implementation implementation of a successful successful city surveillance system is based on in-depth design, taking into account the crime drawers, but rather overlaying the city with three layers. Layer one is one is the city entry and exit level. Here we identify the entry, to moving through, and the exit routes of the city. Typically cameras (PTZ domes and static) are placed along these routes. Number plate recognition can be utilised as an aid at this layer.
34
CCTV Handbook 2016
www.securitysa.com
CITY SURVEILLANCE
Layer two is two is the tracking layer. These are placed along secondary routes and are aimed at tracking vehicles and people along these routes. Layer three is three is the trace layer. Generally, these cameras are placed at intersections, using them in all four directions, with a camera at the next intersection one street up. This causes a matrix effect covering the area with a video blanket. It can be argued that this is almost impossible to achieve because of the quantity of positions needed, but it should also be noted that housing areas are not covered in this fashion, the entry / exit and the track level is utilised in these areas. It would be impossible to cover each house and even when a house is in close proximity, the first question is usu ally, “Can the camera see into my bedroom?” Yes. Yes. Please close your curtains if you don’t want to be seen. Typically, a medium city such as Bloemfontein would would need about 46 entry / exit domes with 184 statics, 93 trace dome cameras and 183 trace cameras. Costing of such a system, when done correctly with a UPS at each point, surge and lightning protection, quality power supplies and legal electrical terminations, would average at R380 000 per point, including the total fibre infrastructure, control mechanisms and control room. A smaller city such as Klerksdorp would need about 38 entry / exit domes with 152 statics, 48 trace dome cameras and 42 trace cameras.
Operators It is quite evident that operators are generally not selected or tested against any measured criteria. They are mostly employed by choice of management, or requested by clients – uncles, sons, children, and many tenders call for a D-grade guard. If this is the criteria, then no wonder the success of these multimillion Rand systems are not as successful as we want them to be. Models developed by professionals such as Dr Craig Donald, Steve Clupp and even some experienced centre managers just seem to fall by the wayside. Many questions remain unanswered and this mainly because the funding is not available and the fact that service providers cannot afford the services of a professional. By adding a fixed amount, a line item in tender documents that can be used to pay for the services of such a professional would enable and force the selection of this special breed of person. Technology is moving at a rate rate that has become far superior to the abilities of the R5 000 a month person, and in cases where skilled people are employed the task at hand gets boring (because of the lack of utilising the system to its maximum extent) and they only last till the next job comes up.
Smart cities and technology We have come a long way since the days of VCRs, PTZ cameras with 300 mm lenses, housed in gigantic plastic bubbles with no optical correctness, IR lighting the size of a A4 sheet of paper that no one could afford and fibre cable with mechanical splicing. Our belief in the technology has remained and developments like these have changed the way we do things. The only constant is that we live in an undisciplined South Africa where rules are made to be broken and are impossible for the law agencies to police. Jaywalking is the norm, not the exception; crowds gathering and walking on the inner roadside around parked cars is a minute-to-minute, second-to-second event. Double parking and taxi drop-offs are anywhere and the litter boxes along the streets are there to serve as a seat or a street vendor’s table. How then can we take a Continued on page 36
www.securitysa.com
CCTV Handbook 2016
35
CITY SURVEILLANCE
Continued from page 35
iterative approach to those management and
disciplined, analytical approach in an attempt
technical activities needed to:
to aid the operator to identify these excep-
• Acquire the required support. During the
tions when they are the norm? The utilis utilisation ation of analyti analytics cs is not totally totally
design phase we should ensure that the maintenance elements such as personnel,
the system is to be 24 hours per day. • Peak Operational Times = Between 05h00 to 08h30 and 15h00 to 18h00 daily including weekends and public holidays. • Minor adjustments may be performed during
impossible in the city scenario and has been
tools, spares, vehicles and workspace is
operations, but no adjustment may be per-
used successfully to warn of pattern changes it
included.
formed during peak operational times.
traffic, double parking in busy main arteries, one
• Provide the required support during the
• No preventative maintenance shall be
way traffic violations and even where vehicles
operations at minimum cost. Having the
performed during peak operational times,
have crossed the centre on double ways. The
correct personnel and tools available for the
only urgent operational repair, limited to the
challenge arose in policing these incidents, the
task at hand.
replacement of LRUs will be permitted.
Broken Window Syndrome starting with man-
Maintenance tasks are grouped as follows:
agement who dictated policy on what should
tasks restore a Corrective maintenance maintenance tasks
• Failed LRUs will either be discarded or sent to intermediate support for repair.
be reacted to, gradually watering the use thereof
failed item. This is easily done if the design
down to disuse and eventual switch-off.
caters for fast and effective replacement
support equipment will be used at organisa-
of these items. An example thereof is our
tional level support.
Good planning, great management,
• Only general purpose or standard test and
professional operators and massive buy in is
patented STEVE (Surge Technology for
needed to overcome these challenges. It can
Electrical and Video Equipment). This product
be and is done to a certain extent at some
is mounted within the pole structure and
of the centres, but the over selling of func-
carries all power (including UPS) and surge
require a minimum amount of fasteners, or
tions within the technological space is being
protection elements for the cameras in the
in the case where special fastening methods
interpreted as the full truth, leading decision
field. Diagnostics is easy and the replacement
are to be used for vandalism purposes, all
makers to believe that they can get away with
of the STEVE is via plug-in connectors. Low-
fasteners are to be standardised.
less operators when using this wonder drug
level technicians can thus unplug the unit and
called technology.
replace it with a spare within three minutes
during the tender and included in the design,
ensuring that the downtime is minimal.
a stable system can be guaranteed. It is no use
Latency, for example, is an inherent factor within the IP world we live in. There are some
Preventative maintenance tasks maintenance tasks system-
• Tests carried out at organisational level will be logged for intermediate and depot use. • Replacement units shall be plug-in and
By utilising such a policy, dictated upfront
blaming Eskom when we don’t have enough
schools of thought that argue that it has no
atically inspect, detect and correct incipient
power backup. We can’t pass the buck when
effect on the way that operations are carried
failures, primarily wear-out failures, either
the 10 cent power supplies that we used keep
out because the operator gets a feel for it and
before they occur or before they develop into
failing.
can compensate whilst building the critical
major failures. Simple test sheets are utilised
case. Is this true? It might be dependent on
to measure all Voltages, Amps and Ohms and
has taken us 27 systems throughout Africa to
what that latency is?
log these into the database. It is surprising how
understand. We have the luxury of not being
soon the naughty boys (camera locations and
a product supplier, thus giving our clients the
Maintenance Maintenanc e policy
control room elements) are identified via graphs
best advice available without the pressure of
Maintenance is the aspect that is generally
aiding in the replacement of items which are not
having to adhere to manufacturers sales targets
misunderstood or underestimated. A main-
performing to specification. The added value
and agency agreements.
tenance policy should define the acceptable
is empowering the technical team to use fac ts
levels of uptime ensuring that the system is
about failed items during the warrantee period,
24/7, why then do we deem an aircraft more
always ready for use. Maintenance is defined
identifying possible bad batches or component
important when it only performs its purpose
as preventative and corrective maintenance,
/ design design failur failures es within within a product. product. It has been our
20% of the time.
but what does this mean and how can it be
experience that the product suppliers are grate-
measured?
ful and work together with us to resolve inherent
It is important to realise the depth at which maintenance should be measured.
product glitches. The following following are are examples of of the deterdeter-
City surveillance is a specialist field which
A city surveillance system has to function
For more information contact Neale Strauch, Techsec Security Services T/A The Lab, +27 (0)12 654 5985,
Strategically maintenance, support and tech-
mined policy statements.
[email protected],
nical sustainability is a disciplined, unified and
• Operating Time (Mission) = Daily operations of
www.thelabsa.com
36
CCTV Handbook 2016
www.securitysa.com
VISUAL ALARM VERIFICA VERIFICATION TION
Camera within an alarm By Andrew Seldon.
Integrating communications, communications, video and motion detection detec tion in one passive. Integration is a well-used word in the security
Once received on their smartphone
Users can use the smartphone app to get
industry. Everyone talks about it, some even
app, users can request a high-resolution
the device to take a picture at any time, such
do it, a few do it very well. When it comes to
image be sent to them and alert their armed
as when they want to ensure their kids are
surveillance, integrating added functions and
response company to take further action, if
home from school, etc.
features to a CCTV system normally puts the
required.
camera front and centre, with the add-ons playing a lesser role. Alarm company Jablotron has changed this
Bruce Lang from Jablotron SA adds that
The in door camer a cove rs an area of about 55° and has a range of about
the PIR also includes a flash for capturing
12 metres. Jablotron offers both a wireless
images in poor lighting conditions, ensur-
and a hardwired version depending on the
by joining the video verification game with
ing the user gets a good look at whomever
user’s preferences and an outdoor version
its PIR motion detector. A traditional motion
or whatever is moving around where they
will soon be available.
detector that detects movement within the
shouldn’t be. The latest version causes the
space under guard, this PIR also has a high-
flash to go off on its own after the initial
combination is part of Jablotron’s range
resolution camera on board – as well as other
three images have been captured. This will
of alarm and automation systems, ranging
functionality to ensure the safety of users.
naturally make the intruder look towards
from control panels through to keypads,
the flash, when another photo will be taken
motion detectors, magnetic detectors and
three photos of the event. The images are
– presumably of a startled intruder looking
so forth. It also provides an automation facil-
stored on the onboard SD card in high resolu-
at the camera.
ity out of the box, which users can custom-
When motion is detected, the device takes
tion, and one is sent in low resolution via the
The i mages take n can also be vi ewed o n
The P IR mot ion d etec tor a nd ca mera
ise to their requirements – such as switching
GSM interface as an alert to the user and/or
the MyJablotron website as well as copied
a guarding company. The company says the
to a computer from the SD card. The device
image will be sent within three seconds, ensur-
manages its own SD card and will overwrite
For more information contact Bruce Lang,
ing no time is lost in what could be a potential
the oldest images if the available storage is
Jablotron Alarms SA, +27 (0)11 615 3675,
emergency.
filled – which shouldn’t happen frequently.
[email protected]
on or off lights.
www.securitysa.com
CCTV Handbook 2016
37
SMART BUILDINGS
Video management integral to building management By Henrik Pedersen, business development manager, Milestone Systems.
Will video management systems become visual building intelligence hubs? The world of construction construction is heading heading for
Award-winning architect and innovative
continued growth in many economic hotspots
design-thinker, Paul Fletcher, recently said
around the world in 2016. London, for example,
that BMS’ need to change from what many
has been experiencing an unprecedented
are today, “making the building’s user feel
boom in the building of commercial office
dumb” by taking control away from the user,
space and this is now spreading to other major
to instead handing power back to them. By
UK cities such as Birmingham and Manchester.
the same token, he believes that architects
There is simultaneous simultaneously ly an evolution evolution occurring occurring
and developers need to move away from the
globally in the way we design and create our
current mind-set which divorces the user ‘as
buildings. Worldwide, the trend is to create
the layman’ from from the design p rocess, instead
buildings with the final user-occupan user-occupants ts top-of-
involving them in creating the building
mind from day one.
around the future o ccupants’ specific needs. So systems that control buildings should
The growing growing user-centric user-centric construction construction trend is now supported by some key standards
instead enable users to control them. And
developments, which are again percolating
building firms should be more focused on
into design and construction practices across
supplying value added services associated
the globe. For example, from April this year the
with the smooth running of a building rather
UK Government will require all firms involved in
than just putting up a building and walking
creating public buildings in the UK to conform with Level 2 Building Information Modelling
Henrik Pedersen, business development manager, Milestone Systems.
(BIM) demands. Level 2 BIM requires much tighter, ideally 3D model-based, specification of
The global organisation BSRIA is a test,
away. The The idea of ‘Building as a Service’ is even coming through into public discourse. Coincidentally, smart technology being specified in a new commercial building
buildings to ensure smoother commissioning
instruments, research and consultancy organ-
project makes all this possible. New buildings
of buildings so that they work better for occu-
isation serving the construction and building
are built with multiple sensors everywhere
pants from the outset, are easier to maintain,
services markets. It provides specialist support
from IP cameras, to fire and smoke detectors,
underpinning upgrading schedules for build-
services for design, construction, facilities
thermostatic controllers, heating ventilation
ings’ equipment and systems.
management, product testing and market
and air conditioning ( HVAC) control systems,
intelligence.
biometric readers for access control and much
Simultaneous with Level 2 BIM adoption, is the roll out of the Government Soft
GSL is an open-source framework, avail-
more besides. All these IP devices are also getting more intelligent.
Landings (GSL) protocol which demands that
able on the BSRIA website, that is intended to
new government buildings are designed with
‘smooth the transition into use and to address
user experience in mind. Soft Landings is a
problems that post-occupancy evaluations
as Milestone XProtect are now capable of
strategy adopted to ensure the transition from
show to be widespread’. It was updated in
turning images from the front of a car, as it
construction to occupation is ‘bump-free’ and
2014 to align with the Royal Institute of British
enters a building’s underground car park, into
that operational performance is optimised. The
Architects (RIBA) 2013 work stages.
a number plate which can then be checked
IP video management systems (VMS) such
against an database of authorised licence
Soft Landings Framework is a joint initiative between BSRIA (Building Services Research
User is central
plates. Once a match is established, the car
and Information Association) and UBT (Usable
However, it is not just about the technology
park barrier can be automatically lifted. By
Buildings Trust).
but how it is used to help building users.
contrast, an image or video stream of an
38
CCTV Handbook 2016
www.securitysa.com
SMART BUILDINGS
unauthorised vehicle can be sent automati-
to HDD failure) for example? Or worse, is
cally to a remote security manager’s mobile
there a small fire underway which needs
device and they can make a decision whether
immediate attention? This intelligence can
to release the barrier, or not, having estab-
be gleaned by marrying a temperature
lished the credentials of a visitor through the
threshold alert with a real-time video
video and had a short conversation.
image. Based on a verified level of threat,
We are also seeing visitors being logged on an access control system as visitors at
the right person can be sent to deal with the problem.
reception. Once tagged, they can be tracked to the VMS if that unique visitor is picked up
Video management central to BMS
in a restricted area, for example. The breach
Extending the thinking a little further into
can then be sent with a snapshot image
services within a building: it would be
from the nearest camera verifying the
great if a large company could provide a
context for this breach, helping the security
desktop PC webcam view of the central
guard to establish rapidly, again via a smart
cafeteria to staff so they can time their
device of choice, whether this represents a
lunch-break when queues have died down.
genuine security threat.
Equally, why not turn video recordings of
around a building. So an alert can be sent
that cafeteria’s occupancy through entire
Seeing the heat
lunch periods over several weeks into hard
Infrared network cameras are increasingly
data about numbers of people using the
being deployed in buildings as well. These
facilities there? This data could be turned
are not only useful from a security per-
into intelligence about peak usage of the
spective to detect activity, in a restricted
facilities, establishing whether changes
server room for example, but also to help
to the service need to be made to better
manage buildings’ HVAC systems. Thermal
meet the needs of employees and visitors.
images from these cameras can help show
So it is possible to see video manage-
areas of a building where heat is leaking
ment systems sitting right at the centre
away – perhaps where a window has been
integrated with BMS’ and taking in and
left open, or a window frame has been
making sense of data coming in from
compromised and needs maintenance or
multiple smart sensors, creating intelli-
replacement.
gence out of data from multiple integrated
These sens ors can al so help isolate the
IP devices.
parts of the building that need heating
In this vision, XProtect can be used
or air conditioning and the parts where
to not only enable more comprehensive
occupancy-levels are low and therefore no
building security, but also more intelligent
HVAC HVA C is required. For example, as people
and responsive building management, as
leave a meeting room the sensors can send
well as building services optimisation. Now
an alert to the central BMS which would
that is a vision that is worth pursuing as it
trigger HVAC and lighting systems to auto-
offers much greater control for buildings’
matically shut down. As such, the vision for
users. It is also food for thought for archi-
future Smart Buildings is about creating
tects, designers, construction firms, BMS
buildings that are intelligent enough to
providers, building services providers and
react to usage levels and environmen environmental tal
facilities managers alike.
changes dynamically. So if it is a hot day and the ser ver room
It is therefore no surprise at all that we are starting to see mergers and acquisitions
is running very hot, thereby compromising
bringing security product manufacturers
the hard disk drives (HDD) of servers (and
together with building control systems
therefore corporate data they hold), once a
players. Recently, the Tyco Security Products
temperature threshold is reached systems
merger with building management systems
could send an alert and trigger the air-con-
provider Johnson Controls, shows that the
ditioning to increase output in that area.
power of bringing smart building systems
Video management systems such
together with security management is not
as XProtect, can act as an intelligence
lost on some of the bigger players in both
centre or visualisation hub where alerts
of these converging markets.
are verified alongside any visual evidence that the buildings’ sensors can provide. Is
For more information contact Milestone
the increase in heat in that ser ver room
Systems, +27 (0)82 377 0415,
actually because a server is running
[email protected],
abnormally hot (which is often a precursor
www.milestonesys.com
www.securitysa.com
CCTV Handbook 2016
39
THER MAL CAM ERAS
Thermals expand their operations Thermals cameras have have become a standard part of the surveillance industry. Therm al ca meras have g one f rom b eing
array with 320 x 240 pixels, combined with
are claiming to be able to obtain colour
expensive devices reserved for military or
dedicated image processing algorithms
images in near total darkness? Where
government use to less costly solutions for
to deliver sharp, clear thermal images that
are thermals and low-light cameras best
a wide variety of uses, from 24-hour perim-
make it easier to recognise objects or suspi-
deployed and why? Furthermore, are we
eter protection through to measuring the
cious activities.
seeing the end of IR cameras?
temperatures of machinery while in opera-
Some of the key benefits this provides is
Montague: Thermal imaging cameras Montague: Thermal
tion. Today, Today, one finds therma ls in almost a ny
a more precise temperature sensitivity, e.g.
detect the heat source of objects and will
security installation, from residential estates
temperature differences of 50 mK or less are
provide the same image in total darkness
to large commercial operations and more.
made visible. Further video processing fea-
and during the day, creating good con-
Hi-Tech Hi-T ech Security Solutions asked FLIR
tures include multiple automatic, dynamic
trast images in the scene and they can see
and Bosch Security for some input regard-
image optimisation algorithms, as well
through most weather conditions. No addi-
ing thermals and what they are capable of
as polarity control (white hot/black hot).
tional lighting is needed. Thermal cameras
today. Within the realm of commercial, rea d
Automatic flat-field correction (FFC) results
have virtually no moving parts and are not
affordable operations. Our respondents are:
in a more uniform, quality image.
dependent on external lighting to illuminate
• David Montague from FLIR Systems, and
the scene, so the MTBF is extended com-
• Charles Coetzee from Bosch Security
Hi-Tech Hi-T ech Security Solutions: Where are we
pared with other technologies. FLIR offer a
Systems.
mostly seeing thermals deployed and
10-year warrantee on the thermal detector.
why (for example, on long perimeters)? Hi-Tech Hi-T ech Security S olutions: What advances
Montague: Therma ls ar e bei ng de ploye d Montague: Therma
Yes. This This is however, dependent Coetzee: Yes. Coetzee: on the application requirements. Optical
are we seeing with respect to thermal
in many perimeter applications. In past
cameras have their place when designing
technology (resolution, clarity of images,
years thermal imaging was mainly used
systems, but when the terrain becomes chal-
distances etc.)?
in high asset value applications such as
lenging, lighting around the area becomes
Montague: We are seeing a transition to
airports, power stations, etc. Although
a factor and if it is very dense in shrubs and
640x480 resolution products as the benefits
thermal often offered the best solution for
vegetation, thermal cameras will be the best
of achieving further distances with analyt-
all perimeter security, the cost was relatively
solution.
ics is appreciated with these products. The
prohibitive. In recent years the price reduc-
cost to benefit ratio makes sense, as the
tion has expanded the applications and FLIR
ence of some type of light source to be fully
price differential between the two options
has products that will secure residential
effective. Conversely, when too much light is
becomes less.
premises at an affordable price. All perim-
present, this can also prove troublesome for
eter applications can now get the best solu-
visible light cameras. Thermal cameras do
tion at an affordable price.
not experience these troubles as they work
Coetzee: The B osch outdo or IP therma l Coetzee: The cameras provide early detection and the display of irregularities over large areas.
e seeing increased growth Coetzee: We’re Coetzee: We’r
Low-light cameras still require the pres-
on infrared radiation, hence will continue
These camer as ca n ‘see’ through de nse
in areas such as ports and traffic monitor-
to be more effective in any challenging
smoke or bad weather conditions such as
ing, border control, perimeter surveillance
environment where an overabundance, or
heavy fog or snow, or even in absolute dark-
as well as power plants and industrial
absence of light exists.
ness. Providing high sensitivity, uncooled
installations.
long wave thermal imaging, these cameras
IR cameras will always have their place in the market. As mentioned above, thermal
deliver outstanding image quality. They use
Hi-Tech Hi-T ech Security Solutions: Are thermals
cameras are suitable for any application
a VOx (Vanadium Oxide) focal plane sensor
still necessary when low-light cameras
where extreme challenges in lighting occur.
40
CCTV Handbook 2016
www.securitysa.com
THER MAL CAM ERAS
Therm al te chnol ogy ha s bee n stro ngly
an intruder and then handing over to a PTZ
for FLIR’s thermal video. They are easy to
adopted for many perimeter surveillance
multi-sensor for tracking.
set up and capable of classifying human or
solutions, coupled with HD colour cameras
Coetzee: Yes, with Bosch’s on-board
for daytime operation. IR cameras still have
Intelligent Video Analytics (IVA), we are
provide reliable detection with low false
a major role to play in many instances, but
able to offer intelligence at the edge. The
alarm rates, all without human intervention.
due to current limitations on most built-in
Bosch suite of video analytics range from an
Other models can be viewed at www.flir.
IR technology, the effective range is often
object entering or leaving a scene, multiple
co.uk/security/display/?id=72433.
no more than 30 metres. Thermal technol-
cross line configurations, object tracking,
ogy, however, allows detection of objects
loitering, idle, and people counting to name
from PSIM-VMS-CCTV cameras, thermal
kilometres away.
a few. Up to eight individual tasks can be
cameras and analytics. Many integrators
selected and combined into one scene to
are seeing the benefit of working with one
build sophisticated detection systems.
supplier on the total solution. The recent
Hi-Tech Hi-T ech Security S olutions: Can more
advanced analytics be used with ther-
Intelligent tracking within Bosch camera
vehicular intrusions, FC-Series ID cameras
FLIR now offers an end-to-end solution
acquisition of DVTEL by FLIR has contrib-
mals? Can intelligent tracking be done,
technology is more based around the
either by the thermals themselves or by
moving PTZ portfolio, while video analyt-
automatically directing a PTZ to an alert/
ics within static thermal cameras (VOTs)
VOT Thermal Cameras, come in four different
event?
are based around analytics rules which are
lens options comprising 9 mm, 13 mm, 19 mm
configured on the cameras. With the Bosch
and 60 mm. Bosch moving cameras, like the
relation to analytics, there are edge options
IVA, intelligent tracking in the scene can
analogue MIC Series 612 Thermal Camera is a
with the FC and the new FC-ID. This option
be achieved on thermals, for applications
dual thermal and optical PTZ camera.
started with a type of motion detection, but
where PTZs are employed, the auto-tracking
the demand for more sophisticated analytics
can effectively move and reposition the
For more information, contact:
on board is becoming heavier all the time,
camera to follow the object of interest.
FLIR Systems, +44 780 151 4810,
Montague: FLIR has several options in Montague: FLIR
the FC-ID offers advanced analytics. In addition, FLIR offers server based analytics. FLIR has a range of PTZ multi-sensor cameras that can be used in tracking targets. Often we are seeing the need to detect
uted to the enhanced offering. Bosch fixed cameras, like the IP Coetzee: Bosch Coetzee:
[email protected], www.flir.com Hi-Tech Hi-T ech Security Solutions: What are your
Bosch Security Systems - South Africa
latest thermal offerings?
& sub-Saharan Africa, +27 (0)11 651 9600,
Montague: The FC-ID series of cameras Montague: The feature on-board video analytics optimised
[email protected], africa.boschsecurity.com
www.securitysa.com
CCTV Handbook 2016
41
HIGH DEFINITION ANALOGUE
Analogue fights back By Andrew Seldon.
The analogue industry has jumped jumped back into the game game with high definition offerings. Just as we were all prepared to announce the
ahead in the surveillance world is Dahua.
to buying all your product from the same
death of analogue and the ultimate victory
It has developed the HDCVI standard.
manufacturer.
of network (or IP) surveillance, the analogue
According to the company’s John Li, com-
industry jumped back into the game, offering
pared to other HD analogue standard, HDCVI
ports up to 2 MP, with 3 MP and 4 MP solutions
HD (high definition) video and more from
is better, firstly because it owns independent
in the pipeline.
analogue systems. And even more impor-
intellectual property rights.
tantly, you can use them on your existing analogue infrastructure – so they say.
Secondly, Li says HDCVI has full compat-
In terms of resolution, AHD already sup-
Something old, something new
ibility with legacy and other systems. This
One of the alleged benefits of HD analogue
means HDCVI is ‘penta-brid’, which means it
systems is that users can make use of their
depending on which version one chooses,
is compatible with HDCVI / AHD / TVI / IP /
existing infrastructure, which means you save
HD analogue can deliver higher definition
CVBS. The whole HDCVI family is also com-
on cabling. Elhadad says upgrading to AHD
video over the same infrastructure – with a
patible with both older and new versions of
is as simple as changing cameras and DVR
few changes – but still keeping it analogue
its products.
units, ‘and you set to go’.
According to the companies involved,
with no latency and at a lower cost. This
In addition, Li says HDCVI features
Hikvision is the same. Zhang explains that
makes it easier to manage and install as the
higher resolution and longer transmission
customers only need to replace the front-end
technical trickery of IP systems is avoided. In
distances, and not only provides 720p and
cameras and backend DVRs, again without
many installations, especially smaller ones,
1080p resolutions, but 4 megapixel and 4K
the trouble of re-cabling. What’s more, the
HD analogue systems are not only retaining
(8 megapixel) as well. As for the transmission
Hikvision Turbo HD 3.0 supports up to 1 200 m
existing clients, but gaining new converts
distance, HDCVI supports up to 1 200 m over
transmission distances.
who would otherwise have gone the IP route.
coaxial cable and 450 m over UTP.
However, it’s not a simple decision to stay
The compa ny also boa sts that HD CVI sup -
Dahua, again, echoes the others. Customers can seamlessly upgrade from SD
with analogue. There are various HD stan-
ports multi-signal transmission in one coaxial
analogue to an HDCVI system, the only thing
dards in the analogue world and each want
cable. In other words: video, audio, data and
they need to do is to replace the analogue
to be the eventual winner. Hi-T Hi-Tech ech Securit y
power.
cameras and DVRs with HDCVI versions. No
asked three of the leading playSolutions asked Solutions
It’s worth noting that Zhang says the
cabling needs to be changed.
ers to tell us about their HD offerings in the
Turbo HD so lution off ers seaml ess compat -
analogue world, what their standard offers
ibility with various third-party HDTVI compli-
million supporters from 150 countries, and
customers and how they see it developing
ant cameras and DVRs. Turbo HD 3.0 will also
over 200 global partners have joined the
in future.
support AHD compliant products.
Dahua HDCVI Academy, aiming to accelerate
The third s tandard to consider i s AHD
According to Li, HDCVI has more than 10
HD development. The company believes that,
Rebooting analogue
(analogue high definition). Developed by
although the current HD analogue market is
Frank Zhang, product manager for Hikvision’s
Nextchip, it is promoted in South Africa by
shared by CVI, AHD and TVI, it is an inevitable
backend devices explains that the Chinese
Hitek Security. Tomer Elhadad, CEO of Hitek,
trend that all standards will converge, as con-
surveillance giant provides its Turbo HD
says AHD offers a few advantages of its own.
vergence is a real and important customer
products built on the HDTVI standard.
The first i s that thes e cameras suppor t both
requirement.
“Compared with other HD analogue stan-
old analogue technology as well as AHD.
dards, HDTVI excels in ultra-high signal
Moreover, the AHD DVR from Hitek supports
figures from China show that AHD is lead-
bandwidth, which results in more saturated
analogue, AHD as well as IP.
ing the pack by a significant margin when it
colour and brightness, and makes the images
Elhadad adds that customers can develop
However, Elhadad says last year’s export
comes to analogue HD sales.
more clear. Hikvision will soon introduce an
AHD systems using AHD devices from the
upgraded Turbo HD solution ( Turbo HD 3.0),
Provision range, which Hitek sells, or any
Analytics on analogue
with product models providing up to 5 MP
other brand. This is the same as people were
In today’s IP surveillance world, one of the
resolution (2592x1944).”
used to with traditional analogue systems.
benefits of higher resolution images is the
Unlike other standards, you are not limited
ability to add value to the installation with
Another Chinese company steaming
42
CCTV Handbook 2016
www.securitysa.com
HIGH DEFINITION ANALOGUE
video analytics. Fortunately, the same is pos-
analogue systems, users will benefit from:
sible with HD analogue.
• HD analogue devices are more cost-effective cost-effective
4K analogue video
and costs less to install,
Analogue CCTV users can now enjoy
software, the Smart PSS for PCs and DMSS for
• Easy to install, easy to use,
5 MP HDTVI and 4K video resolution
mobile devices that support analytics. HDCVI
• Low demands on the installer’s technical skills,
while safeguarding their investment
technology supports various intelligent func-
• Low maintenance maintenance cost, and
with existing cabling infrastructure.
tions including motion detection, tripwires,
• No need for switches switches or hubs for bridging, bridging,
Hikvision is launching its third-gener-
Dahua provides video management
left object detection, facial recognition, people counting, heat maps etc.
which also reduces the overall costs. When comparing the cost to an IP solution,
ation analogue HD solution, Turbo HD 3.0, which also supports latency-free
Elhadad adds that any video analytic
Elhadad says, “I can say that the cost of AHD is
1080p HD video up to 800m and 720p
software already available in the market will
similar to standard analogue systems and an IP
transmission up to 1 200 m over coaxial
be able to make use of AHD video footage.
system will still be in the range of two or three
cable.
Hitek also offers CMS software that allows you
times more expensive.”
to manage all your Provision ISR devices under
Li says that even if a customer has an SD
Turbo HD 3.0 uses HDTVI technology, eliminating compatibility issues
analogue system, simply replacing all the
whenever you have to mix old technol-
cabling costs a lot. For most mid-sized or
ogy with new products, and making
ment software with Turbo HD analogue solu-
large surveillance systems, such as buildings
installation simple and cost-effective.
tions. This includes the cur rent iVMS-4200 VMS
or public facilities, it is unrealistic to change
and iVMS-5200 Professional VMS. Video analyt-
the cabling. Furthermore, the cameras and
pression technology improves encod-
ics is available on these platforms, including
HCVRs in an HDCVI system are “remarkably
ing efficiency by up to 50% compared
motion detection, intrusion detection, line-
less expensive” than IP cameras and NVRs of
to standard H.264, dramatically reduc-
crossing detection, alarm management video
similar per formance.
ing bitrates while maintaining high
one platform. Hikvision provides its own video manage-
quality detection and more smart features.
From the above, it seems clear that analogue is fighting back, not only to retain its
Hikvision’s high-calibre H.264+ com-
transmission quality without losing forensic details. Hikvision’s Power-over-Coax (PoC)
The bottom line
market share, but to grow it with the intro-
We naturally expect the vendors to promote
duction of HD solutions that can compete
feature simplifies installation, as one
their own products and promise awesome
with most of the IP systems being installed
coaxial cable carries both the video
results for those who implement them, but
today. Over time, it is probably a good bet
signal and the power supply. This trans-
when dealing with HD analogue, what are the
that the competition between CVI, TVI and
lates to reduced installation time, which
real cost advantages a company would experi-
AHD will see the manufacturers releasing
also translates to a reduction in both
ence? After all, when buying new cameras and
higher definition capabilities and longer
installation and material costs. In addi-
DVRs, you are committing significant funds to
transmission lengths to support their zero-
tion, the Turbo HD 3.0 analogue solu-
the project.
latency systems. Who will win in the end
tion supports UTC for remote set-up
Zhang explains that the advantages of HD
remains to be seen, but it seems as if custom-
and configuration and enables control
analogue over IP systems are mainly in cost-sav-
ers can once again include analogue in their
of the OSD menu and PTZ control via
ings and their real-time capability (non-latency
long-term plans.
coaxial cable, enabling faster camera installation and easier management.
transmission). In terms of upgrading from SD analogue to HD analogue, users will benefit
For more information, contact Dahua,
Turbo HD 3.0 is also compatible with
from:
+86-571-87688883, overseas@dahuat overseas@dahuatech. ech.
the majority of products from other
• No need for re-cabling, which reduces installa-
com, www.dahuasecurity.com.
manufacturers.
tion costs, • HD analogue devices are more cost-effective, cost-effective, and • More flexible in restructuring, you don’t don’t have to do all the restructuring at one time. In terms of the installation of new HD
Hikvision South Africa, +27 (0)10 035 1172,
[email protected],
For more information contact
www.hikvision.com.
Hikvision, +86-571-8700-6060,
HiTek Security Distributors, +27 (0)21 946
[email protected],
3344,
[email protected],
www.hikvision.com
www.hiteksecurity.net
www.securitysa.com
CCTV Handbook 2016
43
VIDEO ANALYTICS
Automated analytics with iSentry By Andrew Seldon.
Automation makes its way to video management systems. There are many respected video analytics
management system needs to be able to
no alert is given when an operator should
systems on the market for surveillance users
detect expected problems as well as those
receive one. iSentry avoids this by learning
to choose from, some developed right here in
that have not been specifically programmed.
what is normal and then alerting operators
South Africa. The critical component in all of
iSentry beat out its competitors in this sce-
when anything falls outside of this norm
these systems is the ability to analyse video
nario because its analytics are not rules-based.
regardless of whether the event is in fact a
footage and initiate an action or response
This means it can teach itself what qualifies as
critical scenario or not.
when a suspicious activity is noted.
normal, and highlight any anomalies irrespec-
One of the systems is iSentry from ISDS,
Wilson says there is no human interfer-
tive of whether they have been seen before.
ence in the learning process and no prior
although it has its roots in Australia where it
In the Australian Roads Agency project, the
learning is required. The system really analy-
was developed by Sentient Vision Systems.
system was the only one that detected that
ses the situation itself and applies hierarchi-
What makes iSentry different from other
an aeroplane making an emergency landing
cal artificial intelligence to determine what
analytical systems is that instead of pre-
on the highway was an anomaly. The other
is normal and what’s not. It analyses the
programmed algorithms that determine if
systems accepted the plane landing because
scene from a pixel level and decides what
something in front of a camera is of interest,
it was landing in the direction traffic was sup-
belongs there, what moves, what doesn’t
iSentry is designed to be self-learning.
posed to be going and the pilot was able to
move and in which way they move. It then
avoid causing an accident. iSentry was able to
marks anything outside of the paradigm it
before being brought to South African ISDS
ascertain that this large object coming out of
creates as unusual.
in 2008 and jointly developed thereafter. The
the sky, even though it was obeying the rules,
original idea for the system was to provide
was out of place.
As noted, iSentry originated in Australia
visual input to machines in order to give them
Wilson explains that the system does not
As an example, Wilson says that setting the system up to monitor a busy road and leaving it for 48 hours will see iSentry learn
a form of awareness without requiring human
grade events, but rather learns what is normal
enough to cut out 95% of the traffic on the
input. The company then moved into other
and highlights abnormalities. Parameters are
road.
areas where the same technology could be
set during installation, thereafter the system
used effectively, namely surveillance.
builds its own intelligent decision making pro-
miss an alert, but to make the whole surveil-
cesses. Currently, iSentry handles behavioural
lance process more manageable. Instead of
Australian Roads Agency, where the organisa-
analysis, object detection, moving target
having operators watching a host of screens,
tion wanted to be informed of road incidents
detection at land and sea, and ground change
the system allows them to ignore 95% of the
in real time. This was the beginning of the
detection, among others. Wilson says it is very
footage and focus on the 5% it determines
solution now known as iSentry.
effective in wide outdoor environments, even
is unusual. And as operators dismiss some of
in adverse weather conditions.
the 5%, the system continues learning and
One of its first customers was the
Callum Wilson, MD of ISDS explains that in the road agency scenario, the organisa-
The k ey, acco rding to Wils on, is to ne ver
reducing the number of alerts it provides.
tion needed to catch any anomalies in the
Independent learning
traffic, whether an automobile accide nt or
When using surveillance systems to monitor
are delivered on live video, not recordings.
something involving a pedestrian. This is a
fluid and busy high-risk environments, using
However, when something of interest is
critical environment and missing something
a rule-based system is difficult. If something
raised, the system allows operators to drill
is never acceptable. It also means that the
happens that falls out of the set parameters,
down into historic footage if required.
44
CCTV Handbook 2016
www.securitysa.com
It’s also worth noting that the alerts
VIDEO ANALYTICS
Camera choices
takes action and is accountable. It also keeps a
As with all management platforms today, iSentry
timeline of the events of the day (or however
97% of the video surveillance footage ignored
branched out from analogue cameras into the
long the company requires), allowing supervisors
by the software, with anything unusual, such
IP world and initially connected to a variety of
to quickly move through historical footage and
as a prowling car late at night, brought to the
cameras via the software interfaces provided by
alerts.
attention of operators who can then dispatch
the manufacturers. This, however, proved less
The diff differen erentt situat situations ions oper operator atorss may may fac face e
CSS chose iSentry and now sees about
a unit to investigate. The fact that iSentry
than optimal as code had to be developed for
can also be organised and handled by means of
keeps an audit trail of everything the opera-
every camera supported, and then updated when
standard operating procedures (SOPs), which will
tors do, provides CSS with an additional ‘guard’
the firmware on the camera was updated – a
ensure operators take the correct actions every
that watches the operators to ensure they are
never-ending task.
time.
not compromised. CSS has since taken this approach into
The Aust Austral ralian ian deve develope lopers rs then then deci decided ded to take the raw RSTP (Real Time Streaming Protocol)
Making the case for CSS Tactical
other areas, such as Dunkeld, where it has
video stream and analyse that. After some work,
CSS is a security service provider that started
seen contact crime decrease from one per
the software works effectively and iSentry is now
operations about eight years ago in the Illovo
week at the start of the contract to one every
effectively hardware agnostic. For remote moni-
area. The suburb was using traditional armed
four months, proving the effectiveness of its
toring applications, ISDS has also developed its
response services and finding it ineffective. CSS
approach. Using iSentry provides operators
own compression algorithm to limit bandwidth
decided to take a different approach to guard-
with increased situational awareness, which
usage. The proprietary streaming protocol also
ing the suburb with tactical vehicles and better
allows them to make optimal use of their
adjusts to the available bandwidth to ensure the
trained personnel.
human resources on the ground and see to it
images get through to the control room. The har hardwa dware re agn agnosti osticism cism also appl applies ies to the
Even with the improved equipment and people, guards can’t be everywhere all the time.
that the armed response teams arrive before the criminals can act.
systems iSentry is run on. It can make use of com-
The com compan panyy ther therefo efore re deci decided ded to com combine bine
mercially available IT platforms if required. ISDS,
people and technology and install cameras (with
YouTube You Tube at: www.youtube.com/
however, also provides a full solution to support
the residents’ approval) to enable it to conduct
watch?v=iu23WQra8to and and www.youtube. www.youtube.
its clients and resellers.
live surveillance 24x7. CSS also realised that
com/watch?v=yjnQmFP9TGQ.
The appli applicati cation on’’s inte interfac rface e is desi designe gned d to to be
More information is available on
having people staring at a bunch of screens
easy to learn and use, while being intuitive. When
would not be an effective solution and needed
For more information contact ISDS,
an alert is raised, it remains on the screen until
a software solution that would filter out the irrel-
+27 (0)11 326 4571,
[email protected],
the operator dismisses it, ensuring someone
evant data and alert its operators to anomalies.
www.isds.co.za
www.securitysa.com
CCTV Handbook 2016
45
VIDEO ANALYTICS
Counting people in retail By Andrew Seldon.
People counting is becoming an important component of retail management. Mobeni Integrated Systems has a long history
Trends c an al so b e ana lysed once the
of providing security at South Africa’s main
system has enough historical data on board.
airports where it has a significant rollout of
This w ill allow centre s and indiv idua l sto res
surveillance cameras, services and manage-
to predict foot count on specific days – such
ment software. The company recently made
as the day before Christmas – and ensure
the decision to expand its scope of operations
they are prepared for an influx of people.
into the retail space.
The i nformat ion c an be anal ysed fo r a
Krish Deokali, managing director of
particular store, or nationally for a number
Mobeni, says the decision to enter the retail
of stores in a chain, permitting t he chain’s
market came as a result of the company
owners to accurately determine the value
deciding to expand its services. Not only is the
and ranking of all its stores nationwide. A
retail market one where security is a primary
real-time dashboard also allows manage-
concern, but it is similar to airports in that
ment to gain a current view on their stores
there is a constant flow of people into, out of
or centres and plan accordingly. Reports can
and around the location.
also be generated automatically and sent to
As an experienced service provider, Mobeni has the ability to service these environments with surveillance solutions, but is
Krish Deokali, managing director of Mobeni. The i nforma tion can a lso b e use d as a
the relevant people. The sof twar e i s we b d rive n, m aki ng it easy to use and easily accessible. In
also able to add additional functionality to the
cost saving mechanism when used with a
addition, Mobeni offers the solution as a
security installation. In the retail environment,
building management system. When there
hosted offering, meaning retailers need
this means being able to assist shop and mall
are lower numbers of people in a mall, for
not concern themselves with I T problems,
managers with accurate people counting
example, the management may decide to
but can simply use the software to run
software. The software used is a mixture of
reduce the number of escalators or eleva-
their businesses optimally. Deokali adds
international analytical software that has been
tors in use, saving on electricity charges
that centres requiring a local server will be
tailored by Mobeni to local conditions.
and allowing maintenance to be done with
accommodated, but it makes more sense
the least impact on shoppers. Similarly,
to opt for a cloud solution when you have
with accurate information on the number of
during peak hours, the management can
numerous stores across the country and
people entering and exiting their location at
ensure that its escalators are all operational.
don’t want to have the technical and main-
any time of the day. It can also highlight which
Integration into a building or a risk safety
tenance hassles of having a server installed
entrances and exits are most used, allowing
management system will alert the mall or
in each one.
them to tailor rental agreements to the location
facility operators of overcrowding in specific
of a store as well as inform the security operator
zones to ensure safety standards can be
that will allow the software to track cus-
where, for example, they need to place more
met.
tomer’s routes and measure service times. In
Foot count technology provides retailers
guards to handle more visitors.
The same a pplies to heating and air
The ne xt ve rsion inclu des Wi- Fi trac king
addition, a unique feature that will incorpor-
conditioning systems. These can be adjusted
ate weather data will give a more meaning-
the same cameras used for security can be used
according to the number of people present,
ful understanding of trends and customer
for people counting – as long as the cameras
as well as adjusted in different zones to meet
behaviour.
have been positioned correctly and deliver the
the needs of visitors and employees.
The benefit benefit of the the setup setup Mobeni Mobeni offers offers is is that that
required quality images. If required, the software
Deokali adds that the software used has a
While Mobeni can make use of existing cameras for the analytics operations,
can also determine the number of adults and
multi-tenant capability, which allows centre
Deokali says the company recommends
children, which are counted separately, as well
management to obtain an overall view of the
their range of 3D cameras and sensors as it
as other categorisations such as distinguishing
whole area under surveillance, but it can also
delivers over 96% accuracy when it comes to
between customers and trolleys. For individual
provide individual stores with data pertinent
people counting – and the analytics is done
stores, the information can inform them of what
to its business – including in-store heat maps.
on the camera, saving bandwidth and com-
specials or advertising to place within or outside
As an example, he explains the system can
puting resources. The cameras also include
their stores on particular days, or at specific
collect point-of-sale information information,, whether
onboard foot count data storage for up to
times of the day to attract walk-by customers.
manually or automatically if the POS systems
60 days, thus eliminating data gaps in case
The footfal footfalll software software can also also divide divide malls
are integrated, giving store management an
of a network or service provider failure.
into zones and track the movement of people
accurate view of the value per square metre
as they move through the malls on heat maps,
of its shop space and various other KPIs can
For more information, contact
showing dwell times in specific locations, again
be automatically calculated, such as aver-
Krish Deokali, Mobeni Integrated Systems,
providing more insight as to where is a prime
age sales per customer, service ratio, daily
+27 (0)11 396 2616,
[email protected],
position for particular stores.
turnover compared to foot traffic etc.
www.mobeniis.co.za
46
CCTV Handbook 2016
www.securitysa.com
LOGISTICS
Logistics security with 4K By Laurence Smith, executive, Graphic Image Technologies.
Don’t let your merchandise out of your sight, even when it’s left the warehouse. Until recently, warehouses were seen as a separate entity in the overall supply chain, merely a repository for merchandise storage before it was moved onto its final destination. Now retailers and other businesses have realised that by integrating the warehouse and freight transport into the greater supply chain, they can reap the benefits of enhanced inventory management, better loss prevention and shrinkage protection. When it comes to transporting merchandise between warehouse and retail destinations, merely tracking the movement of trucks is no longer enough, and companies are having to rely on armed escorts and the implementation of smarter security technology to get their freight to its destination. Despite additional security measures, there are still syndicates that outsmart these technologies and additional measures while in transit. In addition to merchandise being at risk during transport, these goods are also
For example, in a warehouse where goods
also be implemented here whereby access is
vulnerable in the warehouses while waiting
are picked from the shelves and placed in a
given to the control centre operator (not the
for collection.
cage ready for transport collection, by using a
guard at the gate) and the driver driver,, vehicle and
4K camera, an operator can visually ascertain
guard would be recorded as they enter and
Inside and outside the warehouse
whether the correct number of crates or boxes
exit the premises. While this can be time con-
The main risks in warehousing and freight
were loaded from the warehouse.
suming, it enables the goods to be tracked
transport are theft, loss and mishandled
along every metre of the journey with visual
goods. However, the transportation of goods
Eyes on the goods
verification of any intrusion or collusion
continues to be one of the most critical areas
Using these 4K cameras and the associated
between parties.
of vulnerability. While systems can be placed
video recorder management applications it
both in the vehicle and the warehouse exit
is possible to monitor the merchandise all
the same technology that is used for cash-
and entry points, their effectiveness depends
the way from the warehouse, until it reaches
in-transit vans could also have application in
on the implementation and strict control-
its end destination. Each situation is dif-
freight transport. Such a system is effective in
ling measures to ensure the integrity of the
ferent but, for example, by utilising closed
its simplicity as it enables remote monitoring
system.
body trucks the freight is not as exposed to
of the vehicle making use of GSM networks
the risk of theft. A closed body truck can be
with bandwidth requirements as low as
security can be enhanced through the use of
monitored, using a mobile DVR and cameras
8 Kbps. Using cellular and wireless wireless technol-
Ultra-High Definition (UHD or 4K) IP cameras,
which can monitor what is going on inside
ogy, live video is streamed (and recorded)
which offer better resolution and more detail.
the truck, as well as provide visual verification
from vehicles to a remote control centre.
Because of the high resolution of these 4K
that the correct goods were loaded into and
cameras, fewer of them are required to moni-
off the truck.
Inside the warehouse environment
tor a larger area, which means fewer cameras
Such a mobile video recording and trans-
Where bandwidth availability is an issue,
Despite the fact that warehouse and freight security has long been overlooked, it’s undeniably important to focus more atten-
to manage, fewer network points and less of a
mission system also ensures that the load is
tion on the integrity of the supply chain at
drain on bandwidth and storage.
secure during its journey as an alarm is sent
this point. By securing the goods in transport
to the control centre with video verification
and storage in a simple, visual way, retailers
cameras are capable of adaptive video stream-
in the event that the load bay door is opened.
will be able to see the positive impact on
ing, which allows for recording of the video at
Once the goods have reached their destina-
security, in the elimination of theft, loss and
4K resolution, but allows for viewing at resolu-
tion, footage from the mobile DVR’s cameras
damage of valuable goods.
tions that meet the viewer’s requirements.
could be used to conduct an external visual
These cameras have even evolved to the point
inspection to make sure that the load doors
For more information contact Graphic Image
where it’s now possible to use them for visual
are still sealed (this verifies integrity of load).
Technologies, +27 (0)11 48 3 0333,
monitoring and verification of merchandise.
A main gate interlocking system could
[email protected], www.git.co.za
This is largely due to the fact that these
www.securitysa.com
CCTV Handbook 2016
47
CAMERA SELECTION SELECTION GUIDE GUIDE Axis Communications Category: IP Category: IP Supplier: Axis Communications Supplier: Axis Brand: Axis Brand: Axis Communications Camera name: P1364 name: P1364 Maximum resolution: 1280x960 resolution: 1280x960 @ 25 fps Software provided with camera: Axis camera: Axis Camera Companion On-board storage: 64 storage: 64 GB
P I
Onboard intelligenc intelligence: e: Video motion detection, active tampering alarm, audio detection. Support for Axis Camera Application Platform and third-party applications. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: This network camera has outstanding light sensitivity and delivers HDTV 720p video at 50/60 frames per second in H.264 and Motion JPEG. The day/night camera features features a P-Iris lens for optimal image clarity, in addition to digital PTZ and multi-view streaming. Variations in range available not already detailed above: The above: The camera offers a varifocal F1.2, 2.8–8.5 mm, P-Iris, IR-corrected and CS-mount lens. Axis’ Zipstream technology greatly reduces bandwidth and storage requirements. Supporting WDR –Forensic Capture, video is highly optimised for forensic purposes and provides extreme levels of detail – even in very complex light conditions. P1364 includes the ability to seamlessly transition between WDR and Lightfinder modes. Contact:: Vanessa Tyne, vanessa.tyne@a Contact
[email protected], xis.com, +2 +27 7 (0)11 548 6780
Bosch Category: IP Category: IP Supplier: Bosch Supplier: Bosch Security Systems Bosch Brand: Bosch Brand: Camera: Autodome Camera: Autodome IP 5000 IR Maximum resolution: 1080p resolution: 1080p @ 25/30 ips Software provided with camera: Onboard camera: Onboard web interface On-board storage: 32 storage: 32 GB
P I
Onboard intelligence: Motion+, intelligence: Motion+, iDNR (Intelligent Noise Reduction), WDR, Intelligent defog, Privacy masking ONVIF / PSIA: ONVIF PSIA: ONVIF Description: The Description: The Autodome Autodome IP 5000 IR delivers delivers the highest image image clarity in extreme low light situations situations or even in complete darkness. The built-in intelligent IR beam ensures optimum illumination of objects regardless of the level of zoom. Easily identify objects at 190 metres during the day and 150 metres at night or in low lighting conditions. Variations Variatio ns in range available: NEZ-5130-IRCW4: available: NEZ-5130-IRCW4: 30x, 720p30 HD camera with outdoor pendant housing and sun shield. NEZ-5230-IRCW4: 30x, 1080p30 HD camera with outdoor pendant housing and sun shield. Contact: Jason Contact: Jason McGregor, jason.mcgrego McGregor,
[email protected],
[email protected], +2 +27 7 (0)11 651 9809
Bosch Category: IP Category: IP Supplier: Bosch Supplier: Bosch Security Systems Brand: Bosch Brand: Bosch Camera name: Dinion name: Dinion IP bullet 5000 HD 1080p @ 30 ips Maximum resolution: resolution: 1080p Software provided with camera: Onboard camera: Onboard web interface for configuration and testing On-board storage: 32 storage: 32 GB
P I
Onboard intelligence: Motion+ intelligence: Motion+ ONVIF / PSIA: ONVIF PSIA: ONVIF Description: The 1080p bullet from Bosch is a professiona professionall surveillance camera that provides high quality HD images for demanding security and surveillance network requirements. This robust bullet camera is a true day/night camera offering excellent performance day or night. The built-in infrared LEDs provides quality night time monitoring with 30 metres viewing distance in darkness. Variations Variatio ns in range available: Dinion available: Dinion IP bullet 4000 HD which is a 720p resolution bullet camera that also allows for 30 metres viewing distances in darkness and has the same onboard intelligence. Contact: Jason Contact: Jason McGregor, jason.mcgrego McGregor,
[email protected],
[email protected], +2 +27 7 (0)11 651 9809
48
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE Canon Category: IP Category: IP Supplier: Canon Supplier: Canon Brand: Canon Brand: Canon Camera name: VB-M741LE name: VB-M741LE Maximum resolution: 1280x960 resolution: 1280x960 @ 30fps Onboard intelligence: Camera intelligence: Camera tampering, moving/abandoned/removed object, passing, intrusion, volume and scream detection.
P I
ONVIF / PSIA: ONVIF PSIA: ONVIF Description: Ideal for use i n extremely cold and hazardous outdoor areas, these 1.3 MP bullet cameras offer built-in IR LED and ultra wide 113.4 degree angle of view for high quality imaging day or night. Perfect for the following markets: government, power plant, railway, military, casino, airport and border. Contact: Braam Steyn, +27 (0)11 675 4910,
[email protected]
Canon Category: IP Category: IP Supplier: Canon Supplier: Canon Brand: Canon Brand: Canon Camera name: VB-R11VE name: VB-R11VE Maximum resolution: 1280x960 @ 30 fps Onboard intelligence: Auto intelligence: Auto tracking, camera tampering, moving/abandoned/ removed object, passing, intrusion, volume and scream detection.
P I
ONVIF / PSIA: ONVIF PSIA: ONVIF Description: Ideal for demanding outdoor applications, these 1.3 MP continuous 360 degree PTZ cameras with 30x zoom offer fast and accurate monitoring and excellent tracking in both low light and harsh environmen environmental tal conditions. Perfect for the following markets: governmen government, t, power plant, railway railway,, military, casino, airport and border. Contact: Braam Steyn, +27 (0)11 675 4910,
[email protected]
Canon Category: IP Category: IP Supplier: Canon Supplier: Canon Brand: Canon Brand: Canon Camera name: VB-M50B name: VB-M50B Maximum resolution: 1280x960 resolution: 1280x960 @ 30 fps Onboard intelligence: Camera intelligence: Camera tampering, moving object, abandoned object, removed
P I
object, passing, intrusion, volume and scream detection. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: This lightweight 1.3 MP PTZ camera boasts a large aperture Canon telephoto lens and a highly sensitive CMOS sensor that delivers exceptional detail in low-light conditions. Compact and innovative PTZ camera with the ultra-low-light performance required in intelligence and evidence-gathering applications. Contact: Braam Steyn, +27 (0)11 675 4910,
[email protected]
www.securitysa.com
CCTV Handbook 2016
49
CAMERA SELECTION SELECTION GUIDE GUIDE C-Video Concepts Category: IP Category: IP Supplier: C-Video Supplier: C-Video Concepts Brand: inMotion Brand: inMotion Camera name: in6100S12 name: in6100S12 – TigerShark2 Maximum resolution: 1920x1080 resolution: 1920x1080 @ 60 fps Software provided with camera: Admin camera: Admin and management tools On-board storage: Dual storage: Dual MicroSD card slot - max. 32 GB
P I
Onboard intelligence: Motion intelligence: Motion detection, zone detection, other analytic features optional. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: High-end TrueWDR (140 dB) outdoor vandal (IK10) IR dome with motorised lens control. The TigerShark2 TigerShark2 engine provides provides optimal optimal pictures in any given given light situation, and 60 fps capture allows allows crisp images of fast moving objects. Full featured with 12 V/ 24 V/ PoE, 2-way audio, audio, alarm and dual MicroSD Slot. Sun cover is standard. Variations Variatio ns in range available: Optional available: Optional lens: 7 - 22 mm motor control TDN lens. Optional version: NightTiger (Super LowLight with WDR). Contact: Clint Contact: Clint Holloway, cl Holloway, cl int@cvideoconcepts
[email protected], .co.za, +27 +27 (0)31 309 1048
C-Video Concepts Category: IP Category: IP Supplier: C-Video Concepts Brand: inMotion Brand: inMotion Camera name: in7100S20 name: in7100S20 1920x1080 @ 60 fps Maximum resolution: resolution: 1920x1080 Software provided with camera: Admin camera: Admin and management tools On-board storage: 32 storage: 32 GB MicroSD card
P I
Onboard intelligence: Motion intelligence: Motion detection, zone detection, more analytic features optional. ONVIF / PSIA: ONVIF Description: The Description: The high-end outdoor outdoor IR bullet camera camera in7100 series offers offers 60 metres of IR range range and is powered powered by the new NightTiger Super Super LowLight WDR engine. which provides colour at night and full dynamic range in the sun. The motorised lens control allows easy setup while the POE adapter provides for easy connection. Variations Variatio ns in range available: in7100 available: in7100 with TigerShark2 engine (TrueWDR 140 dB), -in7100 with TigerShark2 engine and 6 – 22 mm lens with 100 metre IR range. Contact: Clint Contact: Clint Holloway, cl Holloway, cl int@cvideoconcepts
[email protected], .co.za, +27 +27 (0)31 309 1048
Card Control Systems Category: IP Category: IP Supplier: Card Supplier: Card Control Systems Brand: Hikvision Brand: Hikvision Camera name: DS-2DF8223I-AEL name: DS-2DF8223I-AEL 1920x1080 60 Hz @ 30 fps Maximum resolution: resolution: 1920x1080 Software provided with camera: SADP camera: SADP Discovery and IVMS-4200 On-board storage: Supports storage: Supports up to 128 GB Micro SD/SDHC/SDXC SD/SDHC/SDXC card.
P I
Onboard intelligence: Intrusion intelligence: Intrusion trigger, line crossing, face detection, region entrance, motion detection, region exiting trigger, smart tracking when patrolling between multiple scenarios. ONVIF / PSIA: Both PSIA: Both ONVIF and PSIA Description: Hikvision’s Darkfighter Darkfighter series smart PTZ dome cameras are able to capture high quality coloured images in dim light environme environments nts with cutting-edge low illumination level down to 0.002 Lux (colour). An embedded 1/1.9’’ 1/1.9’’ progressive progressive scan CMOS chip makes true WDR (120 dB) and 2 MP real-time resolution possible. With the 23x optical zoom day/night lens, the camera captures more details over expansive areas. Variations Variatio ns in range available: 24 available: 24 V AC and Hi-PoE, various mounting modes Contact: Sakkie Coetzee,
[email protected], Coetzee,
[email protected], +27 +2 7 (0)11 907 3192
50
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE Dallmeier Electronic Category: IP Category: IP Supplier: Dallmeier Electronic Supplier: Dallmeier Brand: Dallmeier Brand: Dallmeier Electronic Camera name: DF5200HD-DN name: DF5200HD-DN Nightline Series Maximum resolution: 2 resolution: 2 MP Full HD (1080p) Software provided with camera: Free camera: Free SMAVIA Viewing Client: VideoIP client software for the independent and convenient operation and live display. Support of the evaluation of recordings
P I
on SMAVIA Recording Server appliances over LAN/WAN. On-board storage: EdgeStorage in case of network failure (32 GB SD card, not i ncluded) Onboard intelligence: Digital intelligence: Digital or mechanical (ICR) day/night switching, automatic ALC/AGC/AW ALC/AGC/AWB, B, 3D noise reduction, SmartFinder. SmartFinder. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: The cameras of the DF5200HD N ightline series have been developed with special attention to c hanging light conditions for 24-hour video surveillance. The combination combination of the most advanced sensor and encoder technology results in recordings with excellent contrast, brilliant clarity and highest detail resolution and colour fidelity, even in low li ght conditions. Variations Variatio ns in range available: Variants available: Variants with box, in-ceiling, surface mount housing. Variants Variants with F1.6 / 4,5–10 mm lens. Variants with F1.6 / 12–40 mm lens. Contact: dallmeiersa@dallme
[email protected], ier.com, +27 (0)11 510 0505
Hikvision Category: IP Category: IP Supplier: Hikvision Supplier: Hikvision Brand: Hikvision Brand: Hikvision Camera name: DS-2CD4A24FWD-IZ name: DS-2CD4A24FWD-IZ 1920x1080 Maximum resolution: resolution: 1920x1080 On-board storage: 64 storage: 64 GB Onboard intelligence: Motion intelligence: Motion detection, line crossing detection,
P I
intrusion detection, audio exception detection, object removal detection, scene change detection. ONVIF / PSIA: PSIA: Both ONVIF and PSIA Description: The DS-2CD4A24FWD-IZ(H)(S) (B) smart cameras are able to capture high quality colour images in back light environment. They They offer Full HD resolution with up to 60 fps frame rate, 120 dB WDR, PoE, defog, 3D DNR and complete smart feature-set to meet a wide variety of applications. Specially designed for securing perimeters. Contact: Hongda Contact: Hongda Xu, xuhongda3@hikvision.
[email protected], com, +2 +27 7 (0)10 035 1172
Hikvision Category: IP Category: IP Supplier: Hikvision Supplier: Hikvision Brand: Hikvision Brand: Hikvision Camera name: DS-2CD4A26FWD-IZHS name: DS-2CD4A26FWD-IZHS Maximum resolution: resolution: 1920x1080 @ 30 fps On-board storage: 64 storage: 64 GB Onboard intelligence: Licence intelligence: Licence plate recognition, motion detection, line crossing
P I
detection, intrusion detection, audio exception detection, object removal detection, scene change detection. ONVIF / PSIA: Both PSIA: Both ONVIF and PSIA Description: Darkfighter series ultra-low light smart cameras are able to capture high quality colour images in dim light environments. They offer Full Full HD resolution with up to 60 fps high frame rate, 120 dB WDR, PoE, defog, 3D DNR and complete smart feature-set to meet a wide variety of applications. Specially designed for automatic number plate recognition for South African customers. Hongda Xu, xuhongda3@hikvision.
[email protected], com, +2 +27 7 (0)10 035 1172 Contact: Hongda Contact:
www.securitysa.com
CCTV Handbook 2016
51
CAMERA SELECTION SELECTION GUIDE GUIDE HiTek HiT ek Security Distributors Category: IP Category: IP Supplier: HiTek Security Distributors Supplier: HiTek Brand: Provision Brand: Provision ISR Camera name: I4-251IP5VF name: I4-251IP5VF Maximum resolution: 2592x1944 resolution: 2592x1944 @ 30 fps On-board storage: 64 storage: 64 GB Onboard intelligence: Digital intelligence: Digital WDR, 3D DNR, motion detection, privacy masking
P I
ONVIF / PSIA: ONVIF PSIA: ONVIF Description: Newest to our IP family is the Dark-Sight series. Offering 5 MP real-time resolution, 48 IR LEDs (40 m IR), 3.3–10.5 mm vari-focal lens and a 1/1.8” Sony CMOS sensor. Enhancements Enhancements include H.265 4 K compression allowing for less network latenc y, 50% higher compression effi ciency, 50% less HDD storage storag e and 50% bandwidth usage. Variations Variatio ns in range available: Other available: Other products in this range i nclude a vandal-proof dome. Contact: Priscilla Contact: Priscilla Gildea,
[email protected], Gildea,
[email protected], +27 +27 (0)21 946 3344
MiRO/Rectron Category: IP Category: IP Supplier: MiRO/Rectron Supplier: MiRO/Rectron VIVOTEK Brand: VIVOTEK Brand: Camera name: H.265 name: H.265 series IP cameras Maximum resolution: 1920x1080 resolution: 1920x1080 @ 60 fps Software provided with camera: All camera: All VIVOTEK cameras are seamlessly integrated with its professional video / central management
P I
software (VAST). ONVIF / PSIA: ONVIF PSIA: ONVIF Description: VIVOTEK’s new H.265 surveillance solutions include a series of 2 and 5 MP network cameras, camer as, NVRs and professional professi onal VMS. To maximise bandwidth ban dwidth and storage storag e efficienc ciency, y, Smart Stream II achieves greater cost-effectiveness. Combining this with H.265 technology technology,, users will benefit from reduced bandwidth and data storage demands by up to 80% over H.264. Jackie Wu, jackie.wu@vivo Wu,
[email protected], tek.com, +886 +886 (8245) 5282 Contact: Jackie Contact:
MiRO/Rectron Category: IP Category: IP Supplier: MiRO/Rectron Supplier: MiRO/Rectron VIVOTEK Brand: VIVOTEK Brand: Camera name: IB9381-HT name: IB9381-HT Maximum resolution: 1920x1080 resolution: 1920x1080 @ 60 fps Software provided with camera: VIVOTEK’s camera: VIVOTEK’s network cameras are seamlessly integrated with its professional VMS-VAST.
P I
ONVIF / PSIA: ONVIF PSIA: ONVIF Description: This brand new, professiona professionall H.265 high-effi high- efficiency outdoor outdoo r bullet network camera came ra offers 30 fps @ 5 MP or 60 fps @ 1080p with outstanding image quality. Combining both H.265 and Smart Stream II, the IB9381-HT can reduce bandwidth and storage consumption by up to 80% while retaining exceptional 5 MP image quality. Variations Variatio ns in range available: WDR available: WDR Pro for unparalleled visibility in high contrast environments, remote focus for easy focus adjustments, weatherproof weatherproof IP66-rated and vandal-proof IK10-rated metal housing, SNV (Supreme Night Visibility) for low li ght conditions, video rotation for corridor view. Contact: Jackie Contact: Jackie Wu, jackie.wu@vivo Wu,
[email protected], tek.com, +886 +886 (8245) 5282
52
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE MiRO Category: IP Category: IP Supplier: MiRO Supplier: MiRO Brand: VIVOTEK Camera name: H.265 name: H.265 Anti-Grip 3 MP Fisheye Network Camera - CC8370-HV Maximum resolution: 30 resolution: 30 fps @ 2048x1536 Software provided with camera: VIVOTEK camera: VIVOTEK VAST 32-CH software On-board storage: 32 storage: 32 GB
P I
Onboard intelligence: Five-window intelligence: Five-window video motion detection ONVIF / PSIA: ONVIF PSIA: ONVIF Description: A vandal-proof fisheye network camera with a unique anti-grip design and inconspicuous appearance appearance which makes it ideal for high security institutions/facilities. Featuring 180° horizontal panoramic views with adjustable 25° t ilt angle, the camera allows for an amazing range of viewing angles and options. +27 (0)12 657 0960 Contact:: MiRO Sales,
[email protected], +27 Contact
MiRO Category: IP Category: IP Supplier: MiRO Supplier: MiRO Brand: Uniview Brand: Uniview Camera name: UN-IPC3234SR3-DVZ28 name: UN-IPC3234SR3-DVZ28 Maximum resolution: 2592x1520 resolution: 2592x1520 @ 20 fps Software provided with camera: EZStation camera: EZStation video management suite with l ive viewing/recording, device management and alarm display. EZTools to find Uniview
P I
devices, remotely manage upgrades, installations, storage and recording time. On-board storage: 128 storage: 128 GB Onboard intelligence: Video intelligence: Video motion detection ONVIF / PSIA: ONVIF PSIA: ONVIF Description: A 4 MP vandal-resistant IR dome camera with a vari-focal motorised lens (2.8- 10 mm) that comes with Smart IR range up to 30 m, corridor mode, H.265 compression technology and 120 dB Wide Wide Dynamic Range (WDR) for protection against glare. It also supports two-way audio, DC 12 V output and has an SD Card slot for onboard storage. Contact:: MiRO Sales,
[email protected], +27 Contact +27 (0)12 657 0960
MiRO Category: IP Category: IP Supplier: MiRO Supplier: MiRO Brand: VIVOTEK Brand: VIVOTEK Camera name: FD9171-HT name: FD9171-HT Maximum resolution: 30 resolution: 30 fps @ 2048x1536 Software provided with camera: Installation camera: Installation Wizard 2 and VAST 32-CH software
P I
On-board storage: 32 storage: 32 GB Onboard intelligence: Five-window intelligence: Five-window video motion detection, line crossing detection, field detection, loitering detection. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: An H.265 high-effi cienc ciencyy indoor dome network camera, offering 30 fps @ 3 MP with outsta nding image quality. In addition, VIVOTEK’s sophisticated Smart Stream II enables the camera to optimise resolution for a desired object or area. The FD9171-HT also features a built-in PIR sensor to help detect any unexpected events and to provide real-time responses. Contact:: MiRO Sales,
[email protected], +27 Contact +27 (0)12 657 0960
www.securitysa.com
CCTV Handbook 2016
53
CAMERA SELECTION SELECTION GUIDE GUIDE MiRO Category: IP Category: IP Supplier: MiRO Supplier: MiRO Brand: VIVOTEK Brand: VIVOTEK Camera name: IB9371-HT/EHT name: IB9371-HT/EHT Maximum resolution: 30 resolution: 30 fps @ 2048x1536 Software provided with camera: Installation camera: Installation Wizard 2 and VAST 32-CH software On-board storage: 32 storage: 32 GB
P I
Onboard intelligenc intelligence: e: Five-window Five-window video motion detection, line crossing detection, field detection, loitering detection. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: An H.265 high-efficiency outdoor bullet network camera, offering 30 fps @ 3 MP with outstanding image quality. The IB9371-HT is also equipped with WDR Pro and and SNV, empowering users users to enjoy superb superb image detail in any any lighting condition. Combining H.265 and Smart Stream II, bandwidth and storage consumption are reduced by up to 80%. Variations Variatio ns in range available: The available: The IB9371-EHT offers a wider operating temperature range that further enhances the performance and reliability of the IB9371-EHT in both extremely cold and warm weather, even while using PoE. Contact:: MiRO Sales,
[email protected], +27 Contact +27 (0)12 657 0960
MiRO Category: IP Category: IP Supplier: MiRO Supplier: MiRO Uniview Brand: Uniview Brand: Camera name: UN-IPC2324EBR-DP UN-IPC2324EBR-DPZ28 Z28 Maximum resolution: 2592x1520 resolution: 2592x1520 @ 20 fps Software provided with camera: EZStation camera: EZStation video management suite with l ive viewing/recording, device management and alarm display. EZTools to find
P I
Uniview devices, remotely manage upgrades, installations, storage and recording time. On-board storage: 64 storage: 64 GB Onboard intelligence: Video intelligence: Video motion detection ONVIF / PSIA: PSIA: ONVIF Description: A 4 MP IR bullet camera with a varifocal motorised lens (2.8 - 10 mm) that comes with 3D Digital Noise Reduction (DNR), Smart IR range of up to 30 m, corridor mode, H.265 compression technology technology and 120 dB Wide Dynamic Range (WDR) for protection against glare. It supports two-way audio and has an SD Card slot for onboard storage. +27 (0)12 657 0960 Contact:: MiRO Sales,
[email protected], +27 Contact
MiRO Category: IP Category: IP Supplier: MiRO Supplier: MiRO Brand: VIVOTEK Camera name: SD9364-EHL name: SD9364-EHL Maximum resolution: 60 resolution: 60 fps @ 1920x1080 in all-compression mode Software provided with camera: Installation camera: Installation Wizard 2 and VAST 32-CH software On-board storage: 32 storage: 32 GB
P I
Onboard intelligence: Five-window intelligence: Five-window video motion detection and auto-tracking on moving object. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: The SD9364-EHL is equipped with high-performance H.265 compression technology and offers 1080p Full HD resolution, IR illumination up to 150 m and, by adopting a 30x optical zoom lens and purpose-designed VAIR (Vari-Angle IR) for anti-glare, is able to capture fine details at top-notch quality, no matter what time of day or night. +27 (0)12 657 0960 Contact:: MiRO Sales,
[email protected], +27 Contact
54
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE Panasonic Category: IP Category: IP Supplier: Panasonic Supplier: Panasonic Brand: Panasonic Brand: Panasonic Camera name: WV-SPW631L name: WV-SPW631L Maximum resolution: 2048x1536 resolution: 2048x1536 @ 30 fps Software provided with camera: Free camera: Free PSSCT tool to configure multiple cameras IP addresses and settings.
P I
On-board storage: Up storage: Up to 256 GB with 2 x 128 SXDC SD memory card Onboard intelligence: VMD such as intruder / loitering / scene change / object / cross line detection. Face detection. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: All-in-one, easy installation design, 133 dB Wide Dynamic Range, 0.04 lx min. illumination in colour mode, 2.8 mm to 10 mm motorised zoom lens, built-in IR LED, electric dehumidification device, device, IP66 for outdoor use. Variations Variatio ns in range available: 9 available: 9 mm to 22 mm motorised zoom lens models, HD models, and other variations available. Contact: Martin Contact: Martin Kruger,
[email protected] [email protected], nasonic.com, +27 +2 7 (0)11 312 7015
Panasonic Category: IP Category: IP Supplier: Panasonic Supplier: Panasonic Brand: Panasonic Brand: Panasonic Camera name: WV-SFV481 name: WV-SFV481 2992x2992 @ 15 fps Maximum resolution: resolution: 2992x2992 Software provided with camera: Free camera: Free PSSCT tool to configure multiple cameras’ IP addresses and settings.
P I
On-board storage: Up storage: Up to 128 GB with 1x 128 SXDC SD memory card Onboard intelligence: People intelligence: People count (line cross), heatmap, VMD such as intruder / loitering / scene change / object / cross line detection. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: 9 MP fisheye camera, 0.04 lx (B/W ) high sensitivity, auto back focus feature, IP66 and IK10 rated, rated, electric dehumidification device. Variations Variatio ns in range available: 9 available: 9 MP and 3 MP fisheye cameras for indoor and outdoor use Contact: Martin Contact: Martin Kruger,
[email protected] [email protected], nasonic.com, +27 +2 7 (0)11 312 7015
Reditron Category: IP Category: IP Supplier: Reditron Supplier: Reditron Brand: Dahua Brand: Dahua Camera name: DH-IPC-HFW8281EDH-IPC-HFW8281E-Z Z Maximum resolution: 50/60 resolution: 50/60 fps @ 1080p Software provided with camera: Dahua camera: Dahua Smart PSS remote software included.
P I
On-board storage: 128 storage: 128 GB Onboard intelligence: Tripwire, intelligence: Tripwire, scene change detect, missing/abandoned object detect, audio detect, defocus detect, face detect. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: 2 MP Starlight WDR is an ultra-smart network camera for general outdoor surveillance. Variations Variatio ns in range available: 1/1.9” available: 1/1.9” 2 MP progressive scan CMOS, Ultra WDR up to 120 dB, audio i nput, POE, intelligent function. Contact: Lisa Contact: Lisa Bowles,
[email protected], Bowles,
[email protected], +27 +27 (0)87 802 2288
www.securitysa.com
CCTV Handbook 2016
55
CAMERA SELECTION SELECTION GUIDE GUIDE Regal Distributors Category: IP Category: IP Supplier: Regal Supplier: Regal Distributors Brand: Hikvision Brand: Hikvision Camera name: DS-2CD6812D(-W) name: DS-2CD6812D(-W) Maximum resolution: 1280x960 resolution: 1280x960 @ 30 fps Software provided with camera: iVMS-4200 camera: iVMS-4200 Client Software is a centralised video management software using a distributed structure for surveillance device control and management.
P I
Designed for management to multiple devices, including DVR, NVR and DVS to optimise playback, live view, TV wall and E-map functionality. On-board storage: 128 storage: 128 GB Onboard intelligenc intelligence: e: 3D 3D digital noise reduction, backlight compensation (BLC), highlight compensation (HLC), line crossing, dual lens, onboard audio, defog. ONVIF / PSIA: Both PSIA: Both ONVIF and PSIA Description: The 1.3 MP CMOS stereo desktop camera offers Full HD resolution with 120 dB WDR, HLC, defog and 3D DNR to meet a wide variety of applications. It supports dual lenses and dual channel video output, each channel exporting 960p@30 fps images simultaneously. Dual stream is supported on each channel with high definition main stream and standard definition sub stream. Variations Variatio ns in range available: available: - (W): Wi-Fi supported Contact: Quintin Contact: Quintin van den Berg, hikvision@regalsecurity
[email protected], .co.za, +27 (0)11 553 3300
Regal Distributors Category: IP Category: IP Supplier: Regal Distributors Supplier: Regal Brand: Hikvision Brand: Hikvision Camera name: DS-2CD6986F-(H)(A) name: DS-2CD6986F-(H)(A) Maximum resolution: 4096x1800 resolution: 4096x1800 @ 30 fps Software provided with camera: iVMS-4200 camera: iVMS-4200 Client Software is a centralised video management management software using a distributed structure for surveillance device control and management. Designed for management to multiple devices, including DVR, NVR and DVS to optimise playback, live view, TV wall and E-map functionality.
P I
On-board storage: 128 storage: 128 GB Onboard intelligence: Region intelligence: Region of interest, 3D digital noise reduction (DNR), backlight compensation (BLC), highlight compensation (HLC), defog, line crossing. ONVIF / PSIA: Both PSIA: Both ONVIF and PSIA Description: Hikvision 1/18” progressive scan CMOS, 7.3 MP, 180 degree multi-sensor panoramic Darkfighter dome camera. The Darkfighter series ultra-low light smart cameras are able to capture high quality coloured images in dim light environme environments. nts. The DS-2CD6986F offers Full HD resolution with PoE, defog, 3D DNR to meet a wide variety of applications. Variations Variatio ns in range available: available: - (H): -40°C – 60°C, - (A): 24 V AC ± 10% / PoE (802.3at) Contact: Quintin Contact: Quintin van den Berg, hikvision@regalsecurity
[email protected], .co.za, +27 (0)11 553 3300
Regal Distributors Category: IP Category: IP Supplier: Regal Supplier: Regal Distributors Hikvision Brand: Hikvision Brand: Camera name: DS-2DY3220IW/3320IW DS-2DY3220IW/3320IW-D/D4 -D/D4 Maximum resolution: 1920x1080 resolution: 1920x1080 @ 30 fps Software provided with camera: iVMS-4200 camera: iVMS-4200 Client Software is a centralised video management software using a distributed structure for surveillance device control and management. Designed for
P I
management to multiple devices, including DVR, NVR and DVS to optimise playback, live view, TV wall and E-map functionality. On-board storage: 128 storage: 128 GB Onboard intelligence: Region intelligence: Region of interest, 3D digital noise reduction (DNR), backlight compensation (BLC), highlight compensation (HLC), defog, line crossing, audio exception detection. ONVIF / PSIA: Both PSIA: Both ONVIF and PSIA Description: These network IR PTZ cameras are able to capture high quality images in low light environments with their black anti-reflective glass that increases the luminousness up to 120 m IR distance. An embedded 1/2.8’’ progressive progressive scan CMOS chip makes WDR and 2 or 3 MP real-time resolution possible. They They have a 20X optical zoom day/night lens. Variations Variatio ns in range available: -(D4): Pan: 360° endless, tilt: -40°~30°, -(D): Tilt: -40°~-20°, pan: 0°~120° and 240°~360° Contact: Quintin Contact: Quintin van den Berg, hikvision@regalsecurity
[email protected], .co.za, +27 (0)11 553 3300
56
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE Sensor Security Systems Category: IP Category: IP Supplier: Sensor Security Systems Supplier: Sensor Brand: Hikvision Brand: Hikvision Camera name: IDS-2CD6412FWD/C name: IDS-2CD6412FWD/C Maximum resolution: 1280x960 resolution: 1280x960 @ up to 30 fps real-time video Software provided with camera: With camera: With Hikvision’s built-in industry-leadi indust ry-leading ng traffic counter algorithms, the iDS intelligence network camera adds significant workplace efficiency with its ability
P I
to automatically count all people traffi c statistics and chart which direction the people are walking i n. On-board storage: 128 storage: 128 GB Onboard intelligence: Intrusion intelligence: Intrusion detection, line crossing detection, audio exception detection, defocus detection, motion detection, face detection, dynamic analysis and network disconnect. ONVIF / PSIA: Both PSIA: Both ONVIF and PSIA Description: Ideal for the retail market, this 1.3 MP intelligent network camera not only boasts people counting ability, but also support for statistical traffic reports based on configurable time interval (day/week/month/year). (day/week/month/year). Other camera specifications are: • 1/3-inch progressive scene CMOS sensor • Supports 120 dB WDR • Triple video streams • Supports Smart Codec and high bandwidth bandwi dth effi ciency Variations Variatio ns in range available: Cable available: Cable length of lens: 2 and 8 metres Contact: Marco Contact: Marco Della Peruta, marco@sensorsecu
[email protected] rity.co.za,, +2 +27 7 (0)11 314 9419
Sunell Security Category: IP Category: IP Supplier: Sunell Supplier: Sunell Security Brand: Sunell Brand: Sunell Security Camera name: 3.0 name: 3.0 MP Network IR High Speed Dome 3 MP @ 25 fps Maximum resolution: resolution: 3 Software provided with camera: Free camera: Free software IMS boasts features such as auto search and add camera; and recording, playback and management.
P I
On-board storage: 64 storage: 64 GB Onboard intelligence: Motion, intelligence: Motion, intrusion, line crossing, tamper, tamper, network disconnect, disk alarm, I/O alarm. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: • 1/2.8-inch progressive scan CMOS • 12x optical zoom, 16x digital zoom • 2048(H) ×1536(V)/ 25 fps • Multiple streams • IR range 100 m • Smart IR • Low bitrate, excellent low light performance • 3D DNR, dWDR, ICR, defog. Variations Variatio ns in range available: Various available: Various dome models available from 720p to 3 MP Sunell Security,
[email protected], Security,
[email protected], +86 +86 (755) 2675 4336 Contact: Sunell Contact:
UTC Fire and Security Category: IP Category: IP Supplier: UTC Supplier: UTC Fire and Security Brand: TruVision Brand: TruVision Camera name: TVW-1130 name: TVW-1130 Maximum resolution: 2144x604 resolution: 2144x604 @ 25 fps Software provided with camera: TruVision camera: TruVision Navigator is powerful yet licence-free DVR/NVR management software providing backward and forward compatibility that allows users to manage
P I
the TruVision TruVision line of recorders as well as legacy recorders. On-board storage: 64 storage: 64 GB Motion detection, tamper proofing, privacy mask, cross line detection, intrusion detection. Onboard intelligence: intelligence: Motion ONVIF / PSIA: Both PSIA: Both ONVIF and PSIA Description: This Description: This IP Megapixel Megapixel Wi-Fi Wi-Fi panoramic wedge wedge camera offers offers high-definition images images utilising panoramic technology technology to provide provide up to 160° horizontal field-of-view. field-of-view. Adhering to PSIA and ONVIF open communication standards and supporting a CGI command set, it allows for simple integration into any IP system. IK08 and IP66 impact and environme environmental ntal ratings allow for use in outdoor installations. Variations Variatio ns in range available: NTSC available: NTSC version Contact: Randhir Contact: Randhir Seodutt,
[email protected], +27 +27 (0)11 579 7300
www.securitysa.com
CCTV Handbook 2016
57
CAMERA SELECTION SELECTION GUIDE GUIDE Crown Hyper World Category: Analogue Category: Analogue Supplier: Crown Crown Hyper World E Supplier: Brand: Trend Brand: Trend Tech U name: TT-1139 G Camera name: TT-1139 resolution: 1.3 MP O Maximum resolution: 1.3 L ONVIF / PSIA: Not applicable A Description: This 1.3 MP AHD camera features a 3.6 mm lens and 24 LEDs. N Contact: Contact: Muhammed Muhammed Gani, sales@crownhyp
[email protected] erworld.co.za,, +27 (0)11 830 1452 A
Dahua Technology Category: Analogue Category: Analogue Supplier: Dahua Supplier: Dahua Technology
Brand: Dahua Dahua Technology E Brand: DH-HAC-HFW3231E-Z(H) FW3231E-Z(H) U Camera name: DH-HAC-H Maximum resolution: resolution: 1080p 1080p @ 25/30 fps G PSIA: Not applicable O ONVIF / PSIA: Not L Description: • 1/2.8” 2.1 MP CMOS A • 25/30 fps @1080p, 25/30/50/60 fps @ 720p N • high speed, long distance real-time transmission A • HD and SD dual-output (SDI optional), SD tester out • OSD menu, control over coaxial cable • 120 dB True WDR, day/night (ICR), AWB, AGC, BLC, 3DNR • Audio, alarm, heater(optional) • 2.7~12 mm motorised lens, auto iris • Max. IR LEDs length 100 m, Smart IR • IP67, IK10, AC 24 V/DC 12 V Contact: Fritz Contact: Fritz Wang,
[email protected], +86 +8 6 (571) 8768 8883
Elvey Security Securit y Technologies Technologies Category: Analogue Category: Analogue Supplier: Elvey Supplier: Elvey Security Technologies Technologies Brand: VisionLine VisionLine E Brand: name: Fixed Lens IR Bullet AHD Camera U Camera name: Fixed resolution: 1920x1080 G Maximum resolution: 1920x1080 intelligence: Motion detection, Privacy masking O Onboard intelligence: Motion L ONVIF / PSIA: Not PSIA: Not applicable A Description: 1/2.8” Sony Exmor CMOS sensor, AHD 1.0 MP/ 1.3 MP/ 2.0 MP optional, N HD megapixel 3.6 mm lens, 24 x 5 mm IR LEDs, A IR range of 20 m, OSD optional, Waterproof Waterproof to IP66 Variations Variatio ns in range available: Mini available: Mini indoor IR dome, Mini anti-vandal IR dome Contact:
[email protected], +27 +27 (0)11 401 6700
58
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE Axis Communications Category: Thermal Category: Thermal Supplier: Axis Supplier: Axis Communicatio Communications ns Brand:: Axis Communicatio Brand Communications ns
name: Q1941-E L Camera name: Q1941-E resolution: 384x288 thermal detection A Maximum resolution: 384x288 On-board storage: storage: 64 64 GB M intelligence: Video motion detection, audio detection, shock detection. R Onboard intelligence: Video E Support for Axis Camera Application Platform. H ONVIF / PSIA: ONVIF PSIA: ONVIF T Description: An affordable outdoor, outdoor, bullet style thermal camera with a built-in window heater for harsh weather conditions. The network camera can optimise detection performance to meet most application requirements,, e.g. perimeter surveillance. requirements Variations Variatio ns in range available: A available: A range of lens alternatives (7 mm, 13 mm, 19 mm, 35 mm and 60 mm) make it possible to optimise detection performance to meet most requirements. It supports electronic image stabilisation that keeps the video smooth during vibrations, and Axis’ Zipstream that lowers bandwidth and storage requirements. Contact: Vanessa Contact: Vanessa Tyne, vanessa.tyne@a
[email protected], xis.com, +2 +27 7 (0)11 548 6780
Dahua Technology Category: Thermal Category: Thermal Supplier: Dahua Supplier: Dahua Technology Brand: Dahua Brand: Dahua Technology Camera name: DH-TPC-PT8620-T name: DH-TPC-PT8620-T
L Maximum resolution: 1944 resolution: 1944 x 1092 A Software provided with camera: IVS: camera: IVS: Tripwire, intrusion, object detection (person and vehicle), Mabandon detection, missing detection, hot resource detect and alarm. R On-board storage: 128 storage: 128 GB E Onboard intelligence: IVS: intelligence: IVS: Tripwire, intrusion, object detection (person and vehicle), abandon detection, H missing detection, hot resource detect and alarm. T ONVIF / PSIA: Both PSIA: Both ONVIF and PSIA
Description: • 1/2.8” 2 Megapixel progressive scan Exmor CMOS • Max. 60 fps@720p and 30 fps@1080p resolution • Powerful 40x optical Description: • zoom • 640x512 VOx uncooled thermal sensor technology • A thermalised lens (thermal camera), focus-free • Supports temperature measurement • Max. 160°/s pan speed, 360° endless pan rotation • Up to 300 presets, 5 auto scan, 8 tour, 5 pattern • Built-in 7/2 alarm in/out. Variations Variatio ns in range available: • available: • Multiple network monitoring: Web viewer, viewer, CMS(DSS/PSS) and DMSS • H.264 and MJPEG dual-stream encoding • IP66. Contact: Fritz Contact: Fritz Wang,
[email protected], +86 +8 6 (571) 8768 8883
Industrial Automation and Control Category: Thermal Category: Thermal Supplier: Industrial Supplier: Industrial Automation and Control Brand: Mobotix Brand: Mobotix Camera name: MX-FlexMount name: MX-FlexMount S15 Thermal
L Maximum resolution: 6 resolution: 6 MP A Software provided with camera: MxManagementCenter: Touchscreen drag&drop interface, 60-times camera: MxManagementCenter: Professional VMS for Windows and Mac. Touchscreen Mplayback speed, event statistics, alarm management, multiview, smart-config, multi-monitor capability, event search. R On-board storage: 128 storage: 128 GB E intelligence: Decentralised in-camera intelligence, thermal radiometry, motion detection and analysis – ignores interference and H Onboard intelligence: Decentralised shock-detector.. T irrelevant movements, external si gnals, temperature alarms, shock-detector ONVIF / PSIA: Not PSIA: Not applicable Description: Advanced Description: Advanced thermal, easy concealable dual lens video system (covers two separate areas) designed to reliably detect motion in images at night, and detect moving objects during the day in shadows, semi-darkness, smoke or behind bushes. Measures thermal radiation of objects and humans over long distances, even in complete darkness. Miniature size and flexible, allowing for user-specific installation. No lighting required. Variations in range available: available: The dual thermographic solution can be used in three different ways: ways: 1. As a single t hermal system with 1 Thermal lens, 2. In dual thermal operation with 2 thermal lenses, 3. Combined operation with 1 thermal lens and 1 day or night optical lens for clear identification of people and objects (6 MP MP,, 360˚ hemispheric). Cliff Nel, sales@iacontro
[email protected], l.co.za, +2 +27 7 (0)12 657 3600 Contact: Cliff Contact:
www.securitysa.com
CCTV Handbook 2016
59
CAMERA SELECTION SELECTION GUIDE GUIDE Dallmeier Electronic Category: Speciality Category: Speciality Supplier: Dallmeier Supplier: Dallmeier Electronic
Y Brand: Brand: Dallmeier Dallmeier Electronic T I Camera name: S7 name: S7 50/14 Nightline L Maximum resolution: Effective resolution of 50 MP A I Software provided with camera: Free SMAVIA Viewing Client: VideoIP client software for C the independent and convenient operation and live display of Panomera multi-focal E sensor systems. Support of the evaluation of Panomera recordings recordings on SMAVI SMAVIA A Recording Server P LAN/WAN. N. S appliances via LAN/WA Onboard intelligenc intelligence: e: Digital Digital or mechanical (ICR) day/night switching, automatic ALC/AGC/AWB ALC/AGC/AWB,, 3D noise reduction, object tracking, SmartFinder SmartFinder.. ONVIF / PSIA: ONVIF PSIA: ONVIF Description: The multifocal sensor system Panomera is a patented camera technology developed for the surveillance of large-scale areas from a single l ocation, in real time and at high frame rates. The innovative lens and sensor concept offers a unique overall view. Regardless of which area an operator concentrates on, the entire surveillance scene is simultaneously recorded at maximum detail resolution. Variations in range available: Horizontal field of view: 14°, Recognition distance above 125 px/m: 160 m, Covered space above 125 px/m: 3230 square metres, Effective resolution: 50 MP. Contact: dallmeiersa@da
[email protected] llmeier.com,, +27 (0)11 510 0505
Jablotron Category: Speciality Category: Speciality Supplier: Jablotron Supplier: Jablotron
Jablotron Brand: Jablotron Y Brand: name: JA-120PC (bus wired); JA-160PC (wireless) T I Camera name: JA-120PC resolution: 640x480 L Maximum resolution: 640x480 Software provided with camera: Communicates camera: Communicates directly with JA100 control panels A I storage: 4 GB SD card C On-board storage: 4 intelligence: N/A E Onboard intelligence: N/A P ONVIF / PSIA: Not PSIA: Not applicable S Description: The JA-120/160PC is the wireless component of the Jablotron 100 system. It serves for the detection of human movement in building interiors and visual alarm confirmation. Contact: Bruce Contact: Bruce Lang, bruce@jablotro
[email protected], nsa.co.za, +2 +27 7 (0)11 615 3675
ComNet Category: Speciality/accessory Category: Speciality/accessory Supplier: ComNet Supplier: ComNet
Y Brand: ComNet R Brand: ComNet Name: CNGE2+2SMS Name: CNGE2+2SMS O Maximum resolution: 10/100/1000 resolution: 10/100/1000 Mbps Ethernet S intelligence: Gigabit backbone, Redundant ring – RSTP, No programming, S Onboard intelligence: Gigabit E -40°C to +75°C operation. C ONVIF / PSIA: Not PSIA: Not applicable C Description: A plug & play, intelligent redundant ring Gigabit switch with PoE up to 60 W, A
and one of the smallest 4-port Gigabit switches on the market. The new CNGE2+2 CNGE2+2 range allows the user to build IP networks without complex configuration, simply via DIP switch for redundant ring or point-to-point topologies. topologies. Variations in range available: available: 2 x 10/100/1000 Mbps RJ45 PoE+ ports, 2 x 100/1000 Mbps SFP ports, PoE watchdog and monitoring, Dual power inputs (48 - 57 V d.c.), IEEE 802.3at 30 W or 60 W PoE, 2 x I/O ports (user configurable), DIP switch control. Contact: Yunus Contact: Yunus Mamoniat,
[email protected], Mamoniat,
[email protected], +44 +44 (1133) 076400
60
CCTV Handbook 2016
www.securitysa.com
CAMERA SELECTION SELECTION GUIDE GUIDE
www.securitysa.com
CCT V Handbook 2016
61
DVR/NVR ROUND-UP Type of device
Hybrid recorder (both analogue and IP cameras directly supported)
Network video recorder (IP cameras supported only)
Network video recorder (IP cameras supported only)
Supplier
ADI Global Distribution
Bosch Security Systems
Card Control Systems
Brand
Hikvision
Bosch
Hikvision
Product name
DS-7732NI-I4/16P
DIVAR IP 7000 R2
DS-9632NI-I8
Description
• 32 channels • H.264+ and dual-stream video video compression • Supports IP IP cameras • HDMI output at up to to 3840x2160 (4 (4 K) • ANPR blacklist/whitelist blacklist/whitelist management supported on selected models
• RAID-5 protected (standard conguration), all-in-one, up to 128 channels • Secure operation with real-time access access • Instantly nd what what you are looking looking for • Advanced user and alarm alarm management
• • • •
Embedded or PC
Embedded operating system technology
PC-based technology
Embedded operating system technology
Operating system
32 channel IP video input HDMI/VGA Up to 12 MP resolution resolution recording HDD hot swap with with RAID0, RAID1, RAID5 and RAID10 • Max 48 TB storage
DIVAR IP 7000 R2 comes fully loaded and fully functional with Windows Storage Server 2012 R2, 64-bit
Maximum number of cameras supported at maximum resolution
32 channels
128 channels
4 channels @ 4K, 16 @ 1080p, 24 @ 720p or 32 @ VGA
Maximum video resolution per camera
4000x3072 at 20 fps
UHD
4K (3840x2160) /60 Hz
Remote management & viewing apps/technologies
Web browser interface; Windows D esktop; Mac Desktop; Android; iOS
Maximum number of concurrent users
32
10
128 remote connections
Type of protection & levels
Password protection, digital watermark technology
Standard Microsoft Server authentication and password policies
3 user level management, HTTPS
Hardware format
Rack mountable; standalone/de standalone/desktop sktop
Rack mountable
Rack mountable
Storage type
SATA
Data: SATA and OS: SSD
8x SATA, 1x eSATA
Maximum storage capacity
24 TB
64 TB but can expand
48 TB
External storage & HDD extendable
Up to 8 NAS disks; eSATA
4x additional DIP 6000 R2 units which can allow for a maximum of 64 TB per unit
eSATA, NAS
Backup types
USB; iSCSI; Ethernet
iSCSI, export to USB
USB, DVD-RW, LAN
ONVIF compliance
Yes
Yes
Yes
Video inputs
• IP: 10/100/1000 Mbps self adaptive adaptive • 16HD-TVI/composite analogue, BNC interface (1.0 Vp-p, 75 Ω)
2x IP (10/100/1000 Mbps)
2 x 10/100/1000 Mbps
Camera confguration & management features
IPV4 TCP/IP, PPPoE, DHCP, EZVIZ Cloud P2P, DNS, DDNS, NTP, SADP, SMTP, SNMP, NFS, iSCSI, UPnP, HTTPS
IPv4, SNMP
UPnP, SNMP, NTP server, Telnet, PPPOE, RTSP, HTTP
Camera video stream protocols
H.264, H.264+, MPEG4, G.711 G.711u u
H.264, MPEG4, MJPEG
H.265, H.264, H.264+, MPEG4
Data export formats
MP4
Physical video outputs
1x HDMI, 1x VGA
1x VGA port, 4x Mini DisplayPort
2x HDMI, 2x VGA
Physical user interface
Joystick, mouse
Joystick, keyboard and mouse
Keyboard, mouse, front panel
Alarm or analytics services
Motion detection, intrusion detection, line crossing detection, POS transaction detection, ANPR detection
Integration with other systems
Web browser interface; Windows Desktop; Android; iOS; Bosch Video Video Management System, Bosch Video Security Client
AVI, MP4, MOV, MOV, ASF
All analytics are camera based
Web browser interface; Windows Desktop; Android; iOS; Blackberry; Blackberry; Windows Mobile
MP4
Face search, people counting, plate search, behaviour search, heat map, face recognition, face detection, line crossing, vehicle detection, unattended baggage detection
Software integration capabilities via the Bosch SDKs available on the Bosch IPP platform
16x inputs, 4x outputs, Point of Sale, Control 4 Smart Home
Certifcations
CE, FCC
CE, UL
CE, FCC, CAN ICES – 3 (A)/ NMB – 3(A)
Warranty
3 years
3 years
3 years
• Stream balancing: Automatic bandwidth management of multiple transcoded streams • Professional graphics graphics adapter with four DisplayPort outputs
• 320 Mbps iincoming ncoming bandwidth bandwidth • 256 Mbps outgoing outgoing ban bandwidth dwidth
Additional information
Contact
Marcoms SA
[email protected] +27 (0)11 574 2532
62 CCTV Handbook 2016 www.securitysa.com
Jason McGregor
[email protected] [email protected] +27 (0)11 651 9809
Sakkie Coetzee
[email protected] +27 (0)11 907 3192
DVR/NVR ROUND-UP Type of device
Digital video recorder (analogue cameras supported only)
Network video recorder (IP cameras supported only)
Network video recorder (IP cameras supported only)
Supplier
Crown Hyper World
Dahua Technology
Dahua Technology
Brand
Trend Tech
Dahua Technology
Dahua Technology
Product name
TT-D1106
NVR5216-16P-4KS2
DHI-NVR616DR-128-4 K
Description
• • • •
Up to 16 channel IPC input • H.265/H.264/MJPEG/MPEG4 codec decoding • Max 320 Mbps incoming incoming bandwidth • Up to 12 MP resolution resolution preview and and playback • Max 4ch@4K/16ch@1080p 4ch@4K/16ch@1080p H.265/H.264 decoding • HDMI/VGA simultaneous simultaneous video output output • Supports 2 SATA HDDs up to 12 TB, 2 USB (1 USB3.0) • Supports IPC UPnP, UPnP, 16PoE ports
• Max 128 channel channel IP cameras connection connection • Max 384 Mbps incoming incoming bandwidth • Up to 12 MP resolution resolution preview and playback • Supports RAID 0/1/5/6/10/50/60 0/1/5/6/10/50/60 • Supports N+M hot hot standby • Supports iSCSI and Mini SAS to expand storage space
Embedded or PC
Embedded operating system technology
Embedded operating system technology
Embedded operating system technology
Maximum number of cameras supported at maximum resolution
8
16
16 channels @ 1920x1080 @ 30 fps
Maximum video resolution per camera
1280x960
4K
4 channels @ 3840×2160
Web browser interface; Windows Desktop; Mac Desktop; Android; iOS
Web browser interface; Windows Desktop; Mac Desktop; Android; iOS; Windows Mobile
128
128
8 channel channel AHD DVR Supports VGA, HDMI and AV out P2P software Full HD DVR
Operating system
Remote management & viewing apps/technologies Maximum number of concurrent users
Web browser interface; Windows Desktop; Android; iOS 4
Type of protection & levels
LDAP authentication
AES
Hardware format
Standalone/desktop
Rack mountable; standalone/de standalone/desktop sktop
Rack mountable
Storage type
SATA
SATA
SATA
Maximum storage capacity
2 x 2 TB
6 TB
96 TB
eSATA
48 HDD max. 108 TB
External storage & HDD extendable Backup types
USB
USB, FTP
iSCSI; Mini SAS; USB
ONVIF compliance
No
Yes
Yes
IP, POE
• 4 RJ-45 ports (10/100/1000 (10/100/1000 Mbps) Mbps) • 4 Ethernet ports joint working or 4 independent -1000 Mbps Ethernet ports • 2 Gbps optical bre bre interface
DAV, AFS
H.265/H.264/MJPEG
1x HDMI, 1x VGA
2 HDMI (up to 3840x2160), 1 VGA
Video inputs
Camera confguration & management features Camera video stream protocols Data export formats Physical video outputs
AVI HDMI, VGA, AV
Physical user interface Alarm or analytics services
Integration with other systems Certifcations
SABS
CE/FCC/UL
Warranty
1 year
3 years 3 year software upgrade plan
Additional information Contact
Muhammed Gani
[email protected] +27 (0)11 830 1452
Fritz Wang
[email protected] +86 571 8768 8883
Fritz Wang
[email protected] +86 571 8768 8883
www.securitysa.com CCTV Handbook 2016 63
DVR/NVR ROUND-UP Type of device
Hybrid recorder (both analogue and IP cameras directly supported)
Network video recorder (IP cameras supported only)
Network video recorder (IP cameras supported only)
Supplier
Elvey Security Technologies
GeoVision SA
Graphic Image Technologies
Brand
VisionLine
GeoVision
FLIR/DVTEL
GeoVision Video Management Software (VMS)
Horizon/Latitude NVR
GV-VMS is a comprehensive video management system that records up to 64 channels of GeoVision and/or third-party IP devices. GV-VMS comes with a variety of intelligent video analytics to offer precise monitoring and to reduce the need for manual supervision.
The Horizon NVR is for small to mid-sized installations and comes pre-congured for easy setup and operation. The Latitude model has exibility in managing IP video, audio and data.
PC-based technology
Server-based technology
64-bit Windows 7/8/8.1/10 /Server 2008 R2/Server 2012 R2
Windows 7, 8 and 10
Product name
AHD DVR
Description
• • • • •
16 channel, high-resolution high-resolution hybrid DVRs Standard H.264 high-prole high-prole compression compression Real-time recording recording on each channel channel IPC x 8/24 8/24 Mbps Output: HDMI, VGA, CVBS
Embedded or PC
Embedded operating system technology
Operating system Maximum number of cameras supported at maximum resolution
16 cameras @ 1080p @ 25 fps
64
2000
Maximum video resolution per camera
8 channels @ 3 MP (1080p) @ 25 fps
12 MP (4000x3000)
4K
Remote management & viewing apps/technologies
Web browser interface; Windows Desktop; Mac Desktop; Android; iOS
Web browser interface; Windows; Mac; Android; iOS; Blackberry; CMS
Web browser interface; Android; iOS
Maximum number of concurrent users
10
50
5 upwards, depending on licensing and hardware specs
Type of protection & levels
3 levels
Support for up to 1000 accounts for logins and passwords
Password protection, SHA1 based digital signature, 1024-bit RSA encryption
Hardware format
Rack m ountable; standalone/desktop
Rack mountable; standalone/de standalone/desktop sktop
Rack mountable
Storage type
SATA
SATA, SAT A, USB, NAS, iSCSI, GV storage
DAT, CD-RW, external HDD
Maximum storage capacity
8 TB
120 TB
As per client requirements requirements
eSATA, external USB , NAS, GV-Storage, eSATA, GV-Backup Centre
Yes, extendable
External storage & HDD extendable Backup types
USB
HDD, NAS, CD, DVD and more
DAT, CD-RW, external HDD
ONVIF compliance
Yes
Yes
Yes
Video inputs
16 channel 1080p AHD, BNC interface
P only – 10/100/1000 Mbps
Up to 2000 cameras
Camera confguration & management features Camera video stream protocols Data export formats
Pv4, DHCP server, NTP server, UPnP, SNMP H.264 AVI
MJPEG, H.264, H.265
H.264, MPEG-4, MJPEG
AVI, EXE, JPEG
FLIR/DVTEL proprietary format or AVI
Physical video outputs
1x HDMI, 1x VGA, 1x CVBS
Software supports up to 8 high denition monitors
VGA, HDMI, DVI
Physical user interface
Mouse
Touchscreen, keyboard, mouse, joystick
Keyboard, mouse, CCTV keyboard
Alarm or analytics services
Motion detection
Object counting; people counting; intrusion alarm; face detection; motion detection; crowd detection; scene change detection; unattended and missing object detection
Server based and edge device analytics available
Integration with other systems
Complete SDK available
Software integration. Also includes mobile tracking and monitoring integration.
ONVIF Prole S, Snapshot search
Certifcations
CE, FCC
ADA, CE, CSA, EIA, ISO 9001, NEMA, NFPA, NTSC, PAL, UBC, UL
Warranty
2 to 3 years – extendable
3 years
Additional information
No yearly licence fees; 24/7 support
Hardware: three-year ProSupport and next business day, on-site service; Software: One year including updates
Jacques Taylor
[email protected] +27 (0)12 664 0411
Laurence Smith
[email protected] +27 (0)11 483 0333
Contact
[email protected] +27 (0)11 401 6700
64 CCTV Handbook 2016 www.securitysa.com
DVR/NVR ROUND-UP Type of device
Network video recorder (IP cameras supported only)
Network video recorder (IP cameras supported only)
Network video recorder (IP cameras supported only)
Supplier
HiTek HiT ek Security Distributors
MiRO
MiRO
Brand
Provision ISR
VIVOTEK
Uniview
Product name
NVR3-32800(2U)
ND9541
UN-NVR308-32E
Description
• Up to 32 channels channels at 4 MP realtime realtime over network • H.265 and dual-stream video video compression • HDMI (1920x1080) (1920x1080) and VGA (800x600/1024x768/1280x1 (800x600/102 4x768/1280x1024) 024) video output • Alarm in x16/alarm out out x4 • Remote video video playback playback
• Plug & play, one-button one-button auto setup • VIVOTEK camera conguration conguration and VAST CMS integrated • Live and playback playback sheye dewarp dewarp • Up to 12 MP camera live view and playback • Dual LAN network ports with failover function
• Uniview 32 channel NVR • 320 Mbps incoming bandwidth, 320 Mbps outgoing bandwidth • 8 bay HDD storage • H.265/H.264 recording recording and 4 K resolution resolution • HDMI-VGA output
Embedded or PC
Embedded operating system technology
Embedded operating system technology
Embedded operating system technology
Maximum number of cameras supported at maximum resolution
32 @ 30 fps
32
32
Maximum video resolution per camera
4 MP @ 30 fps
12 MP
8 MP
Remote management & viewing apps/technologies
Web browser interface; Windows Desktop; Mac Desktop; Android; iOS; Windows Mobile
Windows Desktop; Mac Desktop; Android iOS; iViewer (iOS/Android), EZConnect (iOS/Android), Installation Wizard 2, ST7501, VAST
Web browser interface; Windows Desktop; Mac Desktop; Android; iOS
Maximum number of concurrent users
20
64
Depending on available streams and bandwidth, 128 remote connections
Type of protection & levels
20 users online with professional authority management
User account time limit: 10 mins; User level: administrator/regular user; User feature denition: by camera
Username/password; IP control (white-list/ black-list)
Hardware format
Rack mountable
Rack mountable
Rack mountable
Storage type
SATA
SATA
SATA
Maximum storage capacity
48 TB
6 TB x 4 bays = 24 TB
6 TB x 8 bay = 48 TB
External storage & HDD extendable Up to 8 SATA (6 TB each); eSATA
None
eSATA
Backup types
USB, eSATA, network
USB storage
USB storage
ONVIF compliance
Yes
Yes
Yes
Video inputs
Video inputs (LAN side) 32 channels over network (1000 Mbps)
2 RJ-45 10M/100M/1000M self-adaptive Ethernet interfaces
2 RJ-45 10M/100M/1000M self-adaptive self-adaptive Ethernet interfaces
Camera confguration & management features
TCP/IP, DHCP, DDNS, NTP, SMTP
IPv4, DHCP server, NTP server, SMTP, web browser, CIL 5
IPv4, DHCP server, NTP server, SMTP, UPNP, RTSP, IP lter, PPPOE, DDNS, FTP, IP server, P2P
Camera video stream protocols
H-265 and H-264 compression
MJPEG, H.264, H.265
H.264, H.265
EXE
.mp4
Operating system
Data export formats
AVI, DAT DAT
Physical video outputs
HDMI, VGA, CVBS
HDMI x1, VGA x1
2x HDMI, 1x VGA
Physical user interface
Mouse, remote control
2 x USB 2.0 front; 1 x USB 3.0 back; Alarm in x 8; Alarm out x 4; Audio: 3.5 phone jack audio output x 1 and 3.5 phone jack audio input x 1; RS-485: 1 port
Keyboard, mouse
Continuous, schedule, manual, event, activity adaptive streaming
Motion detection, tampering detection
Alarm or analytics services
Alarm I/O
Integration with other systems
Integration with alarm and access control
None
Alarm output
Certifcations
CE, FCC, UL, IEC
CE, LVD, FCC, VCCI, UL
CB test certicate
Warranty
3 years
3 years
3 years
Additional information
2 x RS-485 PTZ control; AC 110 110 V/220 V power supply; 1 channel audio output
Contact
Priscilla Gildea
[email protected] +27 (0)21 946 3344
Check rmware upgrades for more functionality MiRO Sales
[email protected] +27 (0)12 657 0960
MiRO Sales
[email protected] +27 (0)12 657 0960
www.securitysa.com CCTV Handbook 2016 65
DVR/NVR ROUND-UP Type of device
Network video recorder (IP cameras supported only)
Network video recorder (IP cameras supported only)
Network video recorder (IP cameras supported only)
Supplier
Reditron
Regal Distributors
Sunell Security
Brand
Dahua
Hikvision
Sunell Security
Product name
DSS7016D
DS-9600NI-I16 Series
4, 8, 16, 32 channel NVR
Description
• General Surveillance Surveillance Management Management Centre • Supports 2000 channels channels (500 input devices) • Supports unlimited accounts managemanagement and 8000 online users • Supports 700M local local storage capability capability • Supports 2000 devices devices to auto-register • Supports 100 ONVIF devices
• 6, 32 or 64 channel channel H.265/H.264/MPEG4 H.265/H.264/MPEG4 video formats • Supports third-party third-party network camera camera integration • Up to 64 IP cameras cameras can be connected connected • Supports recording, recording, live view, storage storage and playback at up to 12 MP resolution
• Up to 16 channel channel 6 MP IP cameras access • Easy to use GUI/web/client • Up to 4 SATA hard disks up to 4 TB • RJ45 10/100/1000 10/100/1000 Mbps network interface • 16 POE ports • Simultaneous HDMI and VGA up to 1080p output
Embedded or PC
Embedded operating system technology
Embedded operating system technology
Embedded operating system technology
Maximum number of cameras supported at maximum resolution
2000 channels (500 input devices)
64 @ 25 fps per channel
16
Maximum video resolution per camera
1080p
4K (3840x2160)/60 Hz
6 MP/ 5 MP/ 4 MP/ 3 MP @ 15 fps; 1080p @ 25 fps (PAL), 30 fps (NTSC)
Remote management & viewing apps/technologies
Web browser interface; Windows Desktop; Mac Desktop; Android; iOS; Blackberry; Windows Mobile
Web browser interface; Windows Desktop; Mac Desktop; Android; iOS; Windows Mobile
Maximum number of concurrent users
1000
32
4
Type of protection & levels
Linux
AES-256 encryption, digital watermark
User level
Hardware format
Rack mountable
Rack mountable
Rack mountable; standalone/desktop
Storage type
SATA
SATA, RAID
Up to 4 SATA HDD
Maximum storage capacity
70 TB
16 SATA x 6 TB = 96 TB
16 TB
External storage & HDD extendable Supports local storage and IP-SAN storage
1x eSATA interface, interface, NAS, RAID, IPSAN
USB attachment
Backup types
eSATA, eSAT A, USB, ISCSI
USB, FTP
Standard
ONVIF compliance
Yes
Yes
Yes
Video inputs
4x 1000 Mbps Ethernet port
IP only, 2 X R-J45 10/100/1000 Mbps selfadaptive Ethernet interfaces
16 channels 6 MP/ 5 MP/ 4 MP/ 3 MP/1080p/960p/720p/D1/VGA/CIF/QCIF
Camera confguration & management features
IPv4, IPv6, DHCP server server,, NTP server server,, UPnP, SNMP
IPv4, IPv6, DHCP server, NTP server, UPnP, SNMP
IPv4, DHCP server
Camera video stream protocols
H.265, H.264, MJPEG
H.264+, H.264, MPEG-4
H.264. MPEG
Data export formats
WMV, AVI
MPEG-4
Physical video outputs
2x HDMI, 1x VGA
2x HDMI, 2x VGA
VBGA, HDMI
Physical user interface
USB, mouse, keyboard
Front panel key interface, jog shuttle, mouse
Screen, keyboard, mouse
Alarm or analytics services
Network alarm input from camera and analytics
Automatic number plate plate recognition; recognition; Line crossing detection; People counting; Intrusion detection; Heat mapping; Foreign object detection; Motion detection; Face detection; POS overlay
2 alarm channels, built-in analytics
Integration with other systems
Software integration with Hikvision access control, POS and data generation systems; 16 x dry contact inputs; 4 x digital outputs
ONVIF compatible
Certifcations
CE, FCC, UL, RoHS
Operating system
Warranty
Web browser interface; Windows Desktop Android; iOS
AVI, TS
3 years
3 years
3 years
Lisa Bowles
[email protected] +27 (0)87 807 2288
Quintin van den Berg
[email protected] +27 (0)11 553 3300
Sunell Security
[email protected] +86 (755) 267 54336
Additional information Contact
66 CCTV Handbook 2016 www.securitysa.com
DVR/NVR ROUND-UP Type of device
Network video recorder (IP cameras supported only)
Supplier
UTC Fire and Security
Brand
TruVision
Product name
TVN70
Description
• Up to 400 Mbps camera bandwidth with 128 camera channels • 96/64 TB embedded storage with or without RAID • Recorder failover, network and PSU redundancy • Truvision Navigator and mobile app (licence free) • External integration via SDK and full support for PSIA and ONVIF
Embedded or PC
Embedded operating system technology
Operating system Maximum number of cameras supported at maximum resolution
128
Maximum video resolution per camera
6 MP
Remote management & viewing apps/technologies
Web browser interface; Android; iOS
Maximum number of concurrent users
256
Type of protection & levels
User access levels for operator and admins
Hardware format
Rack mountable; standalone/desktop
Storage type
SATA/RAID
Maximum storage capacity
96 GB
External storage & HDD extendable
Internal storage of 16 x 6 TB drives, external storage via eSATA
Backup types
eSATA, eSAT A, NAS, SAN
ONVIF compliance
Yes
Video inputs
IP only 10/100/1000 Mbps
Camera confguration & management features
IPv4, DHCP
Camera video stream protocols
Live streaming: 256; Playback: TCP: 256 UDP: 16; Streams per camera: 128
Data export formats
AVI, JPEG
Physical video outputs
VGA, HDMI
Physical user interface
Joystick, keyboard, mouse
Alarm or analytics services
16 alarm inputs, 8 outputs
Integration with other systems
Integration software packages such as Lenel Onguard, TruPortal, Advisor Manager and Mastermind. An SDK is also available for possible integration into third party system
Certifcations
CE, N4131, UL, ICEES-003
Warranty
3 years
Additional information Contact
Randhir Seodutt
[email protected] +27 (0)11 579 7300
www.securitysa.com CCTV Handbook 2016 67
REMOTE MONITORING
Weighing up the benefits of offsite monitoring By Allyson Koekhoven.
How do you decide whether onsite or offsite monitoring is best for your company? Remote versus onsite surveillance monitor-
not connected to and constantly monitoring
quieter sites, economies of scale often dictate
ing? Perhaps the debate should begin with an
the activities or procedures on site, but either
the adoption of remote surveillance. By set-
overview of exactly what offsite monitoring
randomly or at specific times establish a connec-
ting up an event-based system, whereby one
entails. Underpinning the successful adoption
tion to site. This service is often used for monitor-
cost effectively mainly monitors site events, as
of either option is a complete understanding of
ing of guard stations to ensure the guards are at
opposed to a constant feed, one can reduce
the importance of aligning one’s decision with
their station and are awake, or to ensure gates
operational costs.
a service provider who has a solid reputation,
and doors are closed.
verifiable with a documented footprint of working installations.
Finally, video alarm verification or black
On the other hand, sites which are busier during the day, such as shopping centres and
screen monitoring involves reliance on simpli-
precincts, are often better suited to onsite
fied equipment and systems to alert the opera-
monitoring. Voortman emphasises that it is virtu-
monitoring of the surveillance sur veillance equipment equipment
tor to a situation on site, who will then verify the
ally impossible to remotely monitor the high
installed on a site, from an offsite location. It does
event and action the corresponding procedure
levels of traffic experienced in these locations,
not, however, however, define the type or level of service
to terminate the issue at hand. This, Van den
with day-to-day management of, for example,
to be provided. Continuous remote surveillance
Berg says, is often used on perimeter protection
missing children, fire doors opening, and busy
entails the use of monitoring staff, resources
or office buildings where there should be no
parking areas being key factors. However, it is
and equipment at a remote control room that is
movement between certain times. A motion
possible to switch to remote monitoring after
dedicated to continuously monitoring the client’s
sensor on site will trigger a video alarm in the
hours in such scenarios.
property, personnel and procedures. In the event
remote control room, allowing the operator to
that these procedures or activities are not being
determine the validity of the alarm and action
monitoring is suited to almost every possible
followed or conducted correctly, correctly, the client will be
the corresponding procedure to resolve the
scenario and environment. He says that the
notified via an agreed method.
issue.
company uses a self-learning video analytics
Busy-ness dependent
software which bolts into any CCTV system
Berg of Daytona Electronics, is generally used
Mike Voortman of Verifier maintains that the
and ‘learns’ the environment over a five-day
for production type monitoring (for example,
busy-ness of a site will generally determine
period. Once this learning phase is complete, the
nightshifts). With virtual guard tours and random
whether remote or onsite monitoring, or
remote surveillance, the remote operators are
perhaps a combination of the two, is better. On
software automatically and proactively picks out Continued on page 70
The ter term m remo remote te surv surveil eillan lance ce ref refers ers to the
This servi service, ce, acc accord ording ing to to Dusty Dusty van van den den
68
CCTV Handbook 2016
www.securitysa.com
Warren Myers of Myertal believes that offsite
www.securitysa.co www.securitysa.c om
CCTV Handbook 2016 2 016
69
REMOTE MONITORING
Continued from page 68
remote control room, speaking to the staff work-
control, fire detection, alarms and other systems
threats and prioritises them to an offsite control
ing there, visiting sites that are currently being
is possible. If a fire alarm is triggered, onsite
room in real time.
monitored and chatting to existing clients.
management will be automatically notified and
Most importantly, one should aim to
visual confirmation of the validity and location of
The adv advanta antages ges of of onsite onsite moni monitorin toring g includ include e the fact that situational awareness is enhanced
maintain a good and open working relationship
through the local knowledge and intelligence
with the selected supplier. Risks and the modus
acquired through speaking to onsite custom-
operandi of criminals change, so procedures
tours removes the true essence and value of off-
ers. The downsides include the possible lack
should also be monitored and updated regularly
site monitoring, since the operator needs to log
of availability of space and sourcing of capital
with the remote surveillance supplier to ensure
in at the exact time when an intruder is breaking
outlay for a control room environment as well as
that the solution is current.
in, which is highly unlikely.
issues with the onsite staff who may be prone
such incidents will be provided. Myers cautions that the use of virtual guard
Myers says that on the back of the SLA, busi-
to collusion risk, require extra operator training,
ness operators should receive a daily report that
Counting pennies
and who suffer from fatigue due to intensive
outlines onsite activity and the actions taken
So when the chips are down, which monitoring
monitoring. In addition, heists at control rooms
by the remote monitoring supplier. Ideally, this
method provides the most cost effective solu-
are common risk areas. This, therefore, empha-
service provider should have a fully equipped
tion for clients? Voortman asserts that if monitor-
sises the importance of having a failover system
control room that is manned by appropriately
ing is event based, then offsite monitoring wins
which reverts monitoring to an offsite location.
trained and vetted operators who are both
hands down. Obviously, if offsite monitoring
relieved every two hours and are being con-
becomes bogged down in operators continu-
stantly managed.
ously having to watch screens then this will not
Offsite monitoring eliminates the possibility of collusion, provides a failover capability, allows independent dispatching of reaction teams,
be the case. In addition, this ideal scenario is
removes localised risk, allows the sharing of ser-
What do I get?
based on the experience of the remote monitor-
vices, and helps to keep onsite staff on their toes.
Remote monitoring companies provide a variety
ing team and relies on an efficient configuration
Since the control room is already established
of services including perimeter intrusion detec-
of the solution.
there is no additional capital cost for the client.
tion, virtual guard tours, analytics, VoIP audio
A disadvantage includes the reliance on site
Van den Berg says that the cost differences
challenge whereby the control room can com-
between offsite monitoring and onsite moni-
staff and reaction teams to react to onsite issues.
municate directly with suspected perpetrators,
toring are relative to the quantity of cameras
In addition, feedback can be a challenge from
lockdown monitoring, forensic and footage inves-
and equipment to be monitored, the type of
responders; and it is not viable to monitor busy
tigation, retail risk reduction (footage extracted
monitoring required as well as the number of
sites during busy times. Offsite monitoring is
and assessed offsite). Remote access control can
operators required. If only random or timed
reliant on connectivity between site and control
also be provided whereby standard operating
patrols are required, then generally the remote
room so a breakdown in communication may be
procedures (SOPs) are followed followed by the security
surveillance route would be more cost effective
an issue. However, with the correct systems and
guards on site. Other elements include i nclude failover
as this service can be shared with other clients
failovers in place, this weakness can be omitted.
control provision to onsite control rooms and
requiring the same service. If only video alarm
guard replacement, which results in a reduction
verification is required, then again the remote
of the quantity of manned guarding required.
surveillance route would generally be more cost
Who to choose? When deciding on an offsite monitoring service
Van den Berg says that with the speed at
effective, as it is also a shared service.
provider, it is advisable to undertake extensive
which technology is advancing, and the use
He adds that the amount of surveillance
checks and to obtain a number of client refer-
of open source software, one can integrate
equipment and/or number of sites would also
ences. One should consider factors such as the
and monitor virtually any process procedure
be a determining factor in financial costing.
ability of the monitoring company to mitigate
or system. In addition to the aforementioned
Onsite monitoring for a single retail store wish-
risks. Voortman Voortman advises against trying to find the
services, other notable services are video alarm
ing to monitor one system would not be cost
silver bullet one-stop-shop, as often one actually
verification and site checks for staff leaving late
effective, whereas onsite monitoring which is
needs a specialist provider. He continues that
in the evening or arriving early in the morning.
based on volume would be more cost effective
the one-stop-shop model can sometimes result
He says that the company currently not only
for a larger chain of franchised stores or a large
in collusion, so risk should be spread over one
monitors video feeds, but in the event of an
supplier of guarding services and another one
alarm they can communicate with the criminals
Myers points out that the average 24/7
conducting remote monitoring. Additionally, a
and alert armed response and the police, as well
C-grade CCTV operator or guarding post from
comprehensive service level agreement should
as warn staff on site of any pending dangers.
a reputable security company costs approxi-
be non-negotiable and the presence of trans-
Toget T ogether her with this this,, they they are are able able to depl deploy oy
mately R20 000 per month. If one considers
parency by the service provider is essential to
instant countermeasures such as smoke screens
that an eight-camera package, which includes
maintaining a successful relationship.
and pepper gas systems. The ability to remotely
all hardware on rental, maintenance, insurance,
control the opening and closing of main gates
24/7 offsite monitoring using smart video ana-
and doors is advantageous.
lytics and connectivity costs R9500 per month,
Van den Berg adds that in terms of risk, there are benefits and disadvantages to both onsite and offsite monitoring. The drawback
He highlights that with the ongoing devel-
mining operation.
the advantages of offsite monitoring, for event
with any security system or procedure is that
opment of technology, soft alarms or early
it is designed to assist in preventing specific
warning systems can be generated and alarms
actions or functions, or known criminal activity.
can be generated if there is a person or vehicle
ing is definitely a case of horses for courses.
However, there is no foolproof security system
loitering outside the property, or if a parcel is
Ideally, clients should review a number of service
so it is important to undertake a thorough due
moved out of a receiving door or into a dispatch
providers and obtain comprehensive feedback
diligence of service providers, by visiting their
door. Furthermore, remote monitoring of access
on the best solution for their specific application.
70
CCTV Handbook 2016
www.securitysa.com
based scenarios are obvious. The choi choice ce of offsit offsite e versu versuss onsite onsite moni monitortor-
www.securitysa.com
CCTV Handbook 2016
71
MANAGEMENT PLATFORMS
How to choose video management software By Niall Beazley, director, Vision Catcher.
Niall Beazley discusses the options for managing your video streams, specifically the choices to make in selecting a VMS platform. Video management management software (VMS) is supplied by all CCTV vendors as part of an embedded software on a digital video recorder (DVR), the remote site interface, the software used for a networked video recorder (NVR) be it embedded on a Linux platform or personal computer (PC) based on a Windows Server or the mobile application. They are all VMS options that allow you to interact with cameras and, in some cases, more than just cameras: access control, analytics, intrusion and point of sale. Vision Catcher was one of the first companies to introduce VMS and DVRs into the South African market in 1998 with the use of the Novex VMS that was deployed into various verticals, including telecommu telecommunications, nications,
example, a basic embedded DVR will give you
and highlight your key points of concern, which
petro-chemicals,, banks, mines, many other petro-chemicals
the software option for an inbuilt four, eight,
should allow you to make the right choice.
corporations and industries. The then basic
sixteen or thirty-two channels of video which
VMS software proved the ability to link video
will determine the cost option. The VMS should
DVR
capture cards in a PC with up to 16 cameras on
be relatively simple to use and flexible as the
You may have a legacy product that can
a display, enabling multiple viewing options
user probably only wants to review key events,
still be used and upgraded over time. Some
and recorded video replay.
and is unlikely to require much integration, may
vendors will offer a DVR option using existing
The choice of recording recording and replay replay device
not look to add to the NVR in terms of addi-
analogue cameras and adding HD-SDI cameras
was between an embedded DVR or the PC.
tional cameras or upgrades, but it needs it to be
to improve resolution up to 1080p (2 MP). Beware
The embedded embedded DVR offering offering a VMS on on an
reliable. Therefore, a low cost DVR with limited
of the old cabling and deteriorating signal
embedded Linux operating system restrict-
performance may be your choice.
performance. The DVR will provide improved
ing access to programme programmes, s, thus theoreticall theoreticallyy
Compare the comments above for the DVR
VMS features, but also watch out for the
reducing the risk of viruses or someone
and now consider a medium to enterprise
live and recorded video quality as it is often
changing key settings. Today, choosing the
VMS solution. There is often a requirement
restricted to keep costs down.
right VMS is critical for your solution to per-
for live and remote monitoring rather than
form to the level of your expectations and i s
just recording recording and playback playback after an event. event.
Hybrid
often overlooked as you purchase an embed-
The solution plan plan will often be be to add best-ofbest-of-
In between the DVR and NVR is a hybrid that
ded NVR and camera package.
breed cameras from different vendors over a
offers you the ability to continue using your
period of time, expanding the system i n small
existing analogue cameras together with the
Features & advantages
steps. The solution must therefore be scalable
choice of adding a selection of IP cameras as
The right VMS VMS should provide provide you with at at least
as new sites or cameras are added, flexible to
you need. Over time, you could reduce the
the following features:
map and interact with each camera through
analogue cameras and increase the number
• Software options.
integration options and simple to use for any
of IP cameras as you evolve and upgrade your
• Cost options.
trained operator. The right VMS will provide
solution. The VMS should give you the option
• Simplicity.
a minimum of these features and will show
to upgrade software and licences as required.
• Flexibility.
clearly the advantages of choosing a bespoke
This is often a very very important consideration consideration as
• Integration.
VMS solution.
we will explain later.
• Scalability.
DVR, NVR or VMS
NVR
• Reliability.
You have the ability to decide what solution is
The NVR route route normally requires requires you to
• Upgrades.
best for your requirement. The right threat
replace all analogue cameras with IP cam-
analysis questions from your security vendor
eras. The exception is to use an encoder as a
should elicit the answers for your perceived risks
legacy option for priority analogue cameras.
• Intelligence.
This simple simple list list defines defines the adva advantages ntages you might be expecting in a suitable VMS. As an
72
CCTV Handbook 2016
www.securitysa.com
MANAGEMENT PLATFORMS
The NVR may be be scaled in a similar manner to
and playback options all on the one device.
the DVR, offering lower costs for less cameras based upon the Mbps data throughput which
Software subscription agreements
determines the quality and capacity of the
Licence upgrades are often poorly explained
NVR components – and hence the cost. This
leading to confusion and concern over hidden
solution should be upgraded to keep pace
costs at a later date. When you purchase an
with firmware and feature updates but may
embedded NVR and cameras, it will have a
have hardware limitations that keep you using
current VMS software version. The VMS ver-
the existing software and cameras. Remember
sion is purchased as part of the embedded
that newer cameras with improved features
NVR and will work with its prescribed list of
have new firmware requiring VMS software
cameras as per its specification.
upgrades and may exclude you from adding a preferred new camera.
Once installed and working you may decide to add new cameras. It is very important that you check the current VMS version
VMS
to see if it supports the new cameras (firm-
Vendors offering a VMS solution need to be
ware) and ensure the old VMS version is also
able to provide realistic technical support.
updated along with older camera firmware.
VMS software assumes that the purchaser
If you do not follow the software upgrade
has an understanding of both hardware and
options you may not be able to add the new
software implementation to ensure that the
cameras to your system.
VMS is stable and reliable for the end user.
Every day new cameras are released with
This is why most VMS vendors vendors insist that the
new firmware. The camera firmware is the
installer/integrator installer/integr ator is properly qualified to a
on-camera software which allows the camera
set level to be able to sell and support the
to perform its functions/features. The camera
product. Be careful of the VMS vendor who is
firmware is updated regularly for the older
not fully certified (posing the question: how
cameras but care should be taken that the
many DVR or NVR vendors are actually quali-
firmware upgrade is compatible with the exist-
fied to support their products?).
ing VMS software. This now starts a software
Choosing the VMS solution route allows
upgrade cycle between cameras and the VMS,
you to design and build a bespoke server
add a camera and it needs a certain version of
solution having calculated the required data
VMS, change the VMS and you may need to
throughput for live viewing, recording and
update camera firmware. It is this interaction
playback. Add to this, the knowledge that your
that requires the VMS producers to constantly
storage will manage the required number of
review and update their software, which in turn
days recorded and give the option to book-
leads to a cost requirement for the development.
mark and archive relevant events. The VMS
This cos costt requir requiremen ementt effecti effectivel velyy becom becomes es the the
interface should be simple and intuitive, pro-
Software Subscription Agreement (SSA).
viding the operator with an easy-to-the-eye
Most VMS vendors should offer you a
set of features including intelligent options
Software Subscription Agreement (SSA)
linked from event, analytics, point of sale
option. Normally this is around 5% to 10% of
exception, audio or other interfaces to bring
the licence cost per annum. Those VMS ven-
up the view, push video or draw attention to a
dors that state they do not charge for software
particular incident.
upgrades have often brought in SSAs at a later
Your VMS choice should offer you the abil-
stage when they change versions at a much
ity to purchase software at varying licensing
increased premium. The big advantage of your
levels or packages where you would use the
SSA is that you are keeping current with the
software on a workstation or ser ver designed
evolving developments developments of the software with
by the supplier for the expected number of
new added features as well as the camera
cameras, data throughput and operational
firmware upgrades. The new versions often
requirement.
provide improved performance, a VMS that
With the current exchange rates, it is often
evolves with you and current trends, keeps
perceived perceive d that purchasing the software and
track of camera upgrades and allows you to
designing your own hardware is a cheaper
choose best of breed products. Purchasing
option. In many cases this is not true as the
the SSA at the small price applicable will
increased performance of the hardware sup-
ensure your VMS is up to date with all the new
plied by the VMS provider extends licensing
features available.
periods and enables superior data throughput by up to 20% to 30% with greater efficiency.
For more information, contact Vision Catcher,
This translates translates to better overall overall performance, performance,
+27 (0)11 463 9797,
[email protected],
more cameras, greater storage, quicker search
www.visioncatcher.co.za
www.securitysa.com www.securitys a.com
CCTV Handbook 2016
73
MANAGEMENT PLATFORMS
The right VMS decision By Brett van den Bosch.
Filtering the VMS features that really matter. As video management system (VMS) platforms
and would only use a few hundred kilobits per
become ever more capable and inevitably more
second. When the image is zoomed into and
complex, it increasingly becomes the case that
the UHD is utilised, the throughput will be at a
one size does not fit all. There are, however,
maximum of 4 to 5 megabits per second.”
hallmarks that differentiate the most popular
InfinIT’s subsidiary, Synapse PSIM, has pro-
solutions on the market, and although require-
duced an intelligent physical security informa-
ments may differ vastly between sites, the range
tion management system (PSIM) called Synapse.
of options can be narrowed down by heeding a
“Synapse is an advanced PSIM offering all of the
common set of principles. We asked the South
expected features of a good management plat-
African vendors of three leading VMS platforms
form, but with the addition of powerful in-line,
what they consider the most important factors
real-time analytics, and a software framework
to consider.
that is malleable to specialised client require-
“A management platform should offer ease
ments,” Furter states. “Synapse thus combines
of use. The system should work for the customer
the best of the world of off-the-shelf products
and the user should not have to work hard for
with the benefits of bespoke development and
the outcome they require,” says Graphic Image
customisation, and drives this to a new level with
Tech T echnolo nologies gies’’ Lau Laurenc rence e Smith. Smith. “At the end of the the
an intelligent backbone that is based on the
day, it is the control room operator that has to
highly successful Silo analytics platform.
work with the software and find it easy to use,
“In Synapse, every signal, after being man-
even on a late night shift when urgent reaction
aged exactly as every unique client process Max de Lorm.
requires, is analysed for its impact on the client’s
and compatibility of the entire surveillance
environment,” Furter elaborates. “The resulting
securing a site. Again going back to the control
solution,” he says. “It is also, generally, quite
patterns, anomalies and exceptions are changed
room, it is an advantage if the operator is alerted
costly to replace down the line, so it is one of
into actionable knowledge that can even rewrite
to an alarm without having to constantly look
the most important decisions to make. A good
business rules to optimise the functioning of
at the monitors and knowing any alarm is a
VMS platform should also enhance situational
the platform. Which gate is always unlocked just
true detection 98% of the time. Whether it is
awareness and allow operators to very quickly
before a break-in? Which employee is often pres-
server- or edge-based, analytics do a great deal
and effectively respond to events and incidents,
ent in the data centre when equipment goes
to improve surveillance effectiveness.”
such as life-critical incidents, in real-time and not
missing? When can I expect the highest volume
just simpl simplyy recor record d and and play playbac backk video video..”
of contractors, and why? Synapse will answer
is demanded. “These days video analytics play a big role in
According to Gerhard Furter from InfinIT Business Intelligence Solutions, a management
these questions and more, without the need for
platform should offer exactly what it sells: “A
A closer look at three of the options
constant system supervision – the mobile frame-
platform, or supporting base, from which to
Graphic Image Technologies offers the DVTEL
work in Synapse ensures that your management
mould and construct a mechanism that offers
(now FLIR) VMS solution, which has three vari-
intelligence finds you, in time, and exactly where
the client the ability to manage, or align and
ants. Latitude allows for up to 2500 cameras on
you need it.”
control, their business case. By definition this
a single directory. With Latitude 7.1 due to be
management platform is thus not constrictive,
released soon, it will manage up to 10 000 cam-
options: Genetec and NUUO. “Genetec is the
and does not require that the client alter any
eras on a single directory server. The other two
number one VMS in the world,” says de Lorm.
processes to comply with the management rules
wizard-driven complete systems are the Horizon
“It offers a Windows-based solution which
of said platform.
for up to 100 cameras and the Meridian for up to
incorporates video surveillance, access control
24 cameras.
and licence plate recognition under a single
“Every ability and feature of the platform should contribute to the level and magnitude of
“This is a video management management system with
On offer from IP Video Solutions are two
umbrella, negating the need for third-party
control that the client retains over any processes
great integration,” Smith says. “FLIR/DVTEL has
integration. Genetec is ideally suited for medium
or activities, without limiting the client in any
implemented implement ed adaptive streaming on the DVTEL
and large enterprise installations and is used
way. A good management platform should
camera and VMS solution. This reduces the
worldwide anywhere from branch offices to city
mimic an old English butler: the result of the
throughput to the control room and remote
surveillance. It is an open platform VMS, and as
system’s actions must always be conveniently
connections, and will only stream the image
such supports more than 3000 devices from over
at hand, without the effort taken to achieve this
size that the user is viewing on the screen. It
200 vendors, and also allows for central manage-
ever being evident, or even a factor,” he explains.
will adapt to the selection the viewer selects
ment of multiple sites. Genetec also supports
up to the maximum capability of the camera
advanced edge-based recording – across all
as to say that the VMS is the most important
and maximum configuration settings. A good
its products – on the camera in the event that
part of a surveillance system, “as it determines
example is the DVTEL 4K or ultra-high definition
the server is not reachable. There are exist-
the stability, reliability, usability, expandability
camera that can be displayed on any monitor
ing integrations between Genetec and other
IP Video Solutions’ Max de Lorm goes so far
74
CCTV Handbook 2016
www.securitysa.com
MANAGEMENT PLATFORMS
management systems such as access control.
follows suit,” he points out. “We are not, however,
Some of the supported access control products
proponents of the open integration model. A
include Gallagher, Suprema, HID, ASSA ABLOY
PSIM is a mission critical, often line-of-business,
and Salto.
system, and as such stability and predictability
“NUUO is very well established in the South
are sacred – in an open integration policy it is
African market with strong growth in South
very difficult to enforce this rule. Clients are sub-
Africa for over 10 years,” continues de Lorm. “It
ject to the the skill skill of the the contr contracto actorr comple completing ting the
offers both Linux network video recorders (NVR)
integration, and such is the nature of the beast
as well as Windows based VMS, and has recently
that accountability becomes a nightmare.
added cameras to its product line-up.”
“We offer an alternative in the form of certified integration professionals with clear and
Balancing integration with openness
controlled knowledge of Synapse, who have
FLIR/DVTEL’s VMS supports integration with
been vetted and have proven themselves to
multiple applications, including Google Earth,
be dependable service providers. In the case of
ShotSpotter and Gallagher Access Control, to
Synapse, these include highly respected compa-
name a few, Says Smith: “From the customer
nies such as CDP Technologies, FurterTech and
perspective, it provides a solution to multiple
Macado.”
segments. In this regard, integration with other
By contrast, De Lorm is all about openness:
systems is key. Again it boils down to having an easy control room to operate. “When a customer has fire detection, access control, an alarm system or electric fence, it is important for the control room operator to
“All video surveillance systems should be openGerhard Furter.
platform, which means that they support almost
management solution and specifically with the
any camera from any vendor in the market,” he
FLIR/DVTEL VMS,” he explains.
states. “Currently there are hundreds of vendors
Although Synapse offers flexible integration
that manufacture IP cameras, and a lot of these
see when a fire alarm goes off, or when some-
in that clients are not limited by the number of
vendors also supply a video management
body enters a restricted area or climbs over a
systems that can be integrated into the PSIM,
system, but you will find most of these will only
perimeter fence. With so many different brands
Furter says the system stops short of embracing
support cameras that they manufacture, or they
out in the market, it is important that many of
open integration. “Any decent PSIM will make
them are integrated with your CCTV network
allowance for future integrations, and Synapse
will claim to support other manufacturers while Continued on page 76
www.securitysa.com
CCT V Handbook 2016
75
MANAGEMENT PLATFORMS
Continued from page 75
a list of integrated edge devices and systems
only offering very rudimentary ONVIF support
with a 4 year + warranty on the Quasar range of
and not proper integration.
cameras. These are the things that provide peace
“A proper VMS will offer proper integration
of mind and save money.”
and will actually list the camera vendor, model
Furter also boils the process down to asking, and
number and even firmware tested and sup-
answering, a few important questions: “Does the
ported. Beware of vendor lock-in: there are still
platform limit my choices regarding systems?
a number of vendors in the market who will try
A good management platform should not limit
and sell you a single brand ‘end-to-end’ solu-
the client in their choice of, for instance, security
tion. If you do this you are essentially locking
hardware, but should rather offer integration
yourself in to that vendor and this will reduce the
and management policies that allow the client
number of options available to you in the future.”
to procure and implement systems at their
As de Lorm points out, open systems mean
discretion.
different things to different vendors. “The defini-
“Does the system offer added value? A good
tion of an open platform is both the ability and
platform will have additional features that aug-
the willingness of the VMS to integrate with
ment the primary reason for its implementation.
other systems like access control etc.,” he says.
These The se featu features res shou should ld have have true oper operatio ational nal
“All real open platform vendors will be able to
value, and not just be a series of gimmicks
supply a software development kit (SDK) and
designed to fatten out the product offering,” he
support to assist anyone wanting to do third
continues.
party integration. Most importantly, vendors
Laurence Smith.
should be willing to assist partners to develop
skills and experience to achieve this new security
pointless to procure a new system that will do
stable and proven integrations.”
are now well established and readily avail-
nothing but replace the functionality of a previ-
able. Synapse implements a series of industry
ous system. A good management platform will
particular relevance to the South African market,
standards in defence against cyber threats,
offer opportunities to optimise current pro-
de Lorm points out that NUUO integrates to
which include powerful encryption policies, data
cesses, as well as tools to address any challenges
most of the local POS platforms, including pump
obfuscation and steganographic transmission
the client may be experiencing.
integration for a number of local petroleum
techniques.”
Focusing on the type of integration of
companies; while Genetec has developed the
“Security is certainly a very important aspect
“Will the platform enhance operations? It is
“Is it worth the money? The provider of a good platform should be sensitive to the volatil-
Sipelia communications management module,
of a VMS,” De Lorm concurs. “Any platform that is
ity of the markets that it plays in, and should
which integrates seamlessly with SIP-based
capable of city surveillance should be capable of
be supportive of limitations on client budgets.
systems such as intercoms and VOIP phone
encrypted communication, using TLS, to secure
Implementation costs should be equally con-
communications.
communications between any platform compo-
trolled, as this aspect of a project often presents
nents like servers, client apps etc. Furthermore, Furth ermore,
a hidden shock to the client’s cash flow. A good
Cyber security infiltrates all levels of CCTV
a secure VMS platform should be able to encrypt
platform will be inexpensive to procure and
video from the camera both in transit and at rest.
implement, but offer expensive quality and
In the larger context of CCTV being a security
It should also support certificate-based authen-
functionality.”
solution at its core, FLIR/DVTEL offers cyber
tication like Active Directory Federation Service
defence on the hardware through port protec-
(ADFS) to leverage a security token service.
when evaluating a new VMS must include
tion, to reduce the possibility of being hacked. If
Lastly, it must also record all activity to an audit
the company’s VMS history and track record,
an unauthorised connection is detected on the
log, including failed logon attempts as well as
whether the product actually works as adver-
system, it will shut down the port that connec-
all system setting changes to any aspect of the
tised and whether it is a first generation product
tion is on. “This is only the beginning and further
surveillance system which can later be checked
or something that has matured. “Can the prod-
development is in process,” Smith clarifies, going
and verified. ver ified.”
uct scale and grow as the client’s requirements
on to say he believes defences like this will
According to De Lorm, key decision criteria
grow, and if new technology is launched, will it
become the norm since such hardware is con-
Narrowing down the choices
nected to a site network and can provide access
“Customers should look at a solution and not
to the complete network if unprotected.
just the VMS when an upgra upgrade de or or new new system system
multiple sites, central management, failover
Elaborating on the magnitude of the
be able to support it?” he poses. “Does the VMS allow for multiple servers,
is required,” according to Smith. “Questions,
in the event of a recording server failure, and
problem facing the industry, Furter says, “Cyber
for example: ‘what are the site, national or
does it understand how networks work? Can it
security is a massively growing concern, espec-
global requirements? What integrations will
work in both a unicast and multicast environ-
ially since the advent of PSIM. Security and
be needed? What do I want to see?’ need to be
ment? Is it hardware agnostic, agnostic, allowing it to
protection concerns are now centralised in the
asked. With thermal, infrared, 4K and low light
run on any Windows based hardware, or will
IT sphere, and as such are subject to the threats
cameras readily available, it is not just a case of
the VMS company insist that the user buys
prevalent in that space. This increases the need
putting down a camera and recorder, but specifi-
their costly branded hardware? Lastly, custom-
to protect management platforms against cyber
cally addressing the required solution.
ers need to be very careful when selecting
compromise, and to ensure that compromised
“The FLIR/DVTEL VMS and camera range offers
a systems integrator who understands the
systems will survive and even defend against
an efficient, reduced storage requirement solu-
product and is able to design, i nstall and sup-
intrusions. It is fortunate that the IT industry has
tion, through efficient codec implementation,
port the product throughout its lifecycle,” he
been fighting this battle for decades now, as the
with high quality, analytics, audio in and outputs,
concludes.
76
CCTV Handbook 2016
www.securitysa.com
SECURITY LIGHTING
Throwing light on the dollar price By Andrew Seldon.
Industry veteran makes a move into locally designed and produced lighting products. With most of the country in mourning over
offering is a perimeter lighting product that
was an issue. The power supply GIS is
the antics of senior politicians and the resulting
delivers reliable illumination at a low cost.
developing develop ing offers users a wider range of
weakness of the rand, Roston Sadie, MD of GIS
It can be shipped as an infrared (IR) or a
output voltages to enable it to adapt to the
SA is not complaining complaining.. Over the past year or
traditional white light.
requirement of each project. This could well
so, Sadie and his partners have set a business
GIS also has a locally produced flood
be the first mountable constant current power
plan in motion to produce lighting products
light, the 50-Watt T1. Again, users can choose
in South Africa for the security and other
between IR and white light. The product is
industries. Since these new products are
designed for flexibility, and can be adapted to
has been on producing quality products that
designed and manufactured locally, the
whatever the client needs, such as different
can measure up to any competitor in the
weaker rand gives GIS a boost in terms of
output at various times of the day. It can also
world. It has achieved this goal with the
export potential.
be adapted to be used as a full solar solution.
assistance of its partners, such as EBV
The weak rand is nothing new. new. In fact, it
Two potential potential export contracts contracts GIS is
supply manufactured locally. Sadie says the focus of GIS from the start
Elektronik and OSRAM Opto Semiconductors.
has been on a downward trend for a while,
looking into, one in Angola and one in
Its partners have assisted with the development
boosted in its decline by recent events, which
Zambia, may see the T1 adapted to be used
process as well as testing to ensure quality
has resulted in the cost of imported lighting
as street lights running on solar power power.. These
standards are maintained. Moreover, during
products (and any other imports, of course)
contracts would put GIS on the map as the
the design phase, Sadie received input from
rising. In addition, when it comes to lighting
order will run into thousands of units.
many security industry players who were able
specifically, having to pay a 20% duty on the
Despite the advances of technology that
to use their real-worl real-world d experiences to identify
import costs simply adds to the expense.
enables some surveillance cameras to ‘see’ in
what lighting solutions they would like to see
This has created created an opportunity opportunity in the local
the dark, the security industry still relies on
in the market.
market, which GIS is taking advantage of.
lighting, both IR and white light, for many
Sadie says the products GIS manufactures
The manufacturing manufacturing business of GIS is still still in
applications. Especially Especially when i t comes to
its infancy, but already Sadie says the market
are all made from the best components in
IR lighting, the products GIS offers are, as
has responded positively, including interest
order to offer quality goods, but because they
noted above, significantly less costly than the
from outside the country’s borders. With
are produced locally, they cost half of what
premium international products and they are
internal potential and export options opening
the same quality would cost from the UK or
of significantly better quality than the cheaper
up for GIS, the future of this local innovator is
Australia.
imports.
looking very bright.
GIS has a number of products it can assist
Another product line GIS is working on
customers with, as well as lighting services
is locally produced power supplies. In many
For more information contact Roston Sadie,
for those planning, for example, a perimeter
projects the team has been working on, Sadie
GIS SA, +27 (0)71 560 4151,
security system. Sadie says the company’s first
has found that getting the right power supply
[email protected],www.gis-sa.net
[email protected], www.gis-sa.net
www.securitysa.com
CCTV Handbook 2016
77
STORAGE
Storage: what is the right choice? By Christoph Bast, Research & Development, Geutebrűck. Geutebrűck.
Decide on your storage requirements by defining your needs in terms of reliability, capacity, cost and performance. Everyone talks about it, everyone knows it:
Technically Te chnically speaking, speaking, this level level is almost
RAID 0 or striping
The requirements requirements for video video surveillance surveillance are
impossible to realise. And of course, more
• High data t hroughput: Data is distributed
continually on the rise. Evermore, cameras,
security costs more money. The level of
across multiple disks with the aim to achieve
higher resolutions and longer retention times
availability is therefore always a compromise
a high data transfer rate. The bottleneck in
are increasing the demand for storage systems.
between requirements and the available
storage access is the mechanical limitation of
budget.
the hard disk (the speed of read/write unit).
When you need a new storage system, it is important to first be clear about your specific requirements. Put another way: You must
But even here the situation is not black or white – the possibilities are vast.
By controlling multiple disks in parallel, it is like their speeds are “added together”. • No data security: On the contrary, because
define your needs in terms of reliability reliability,, capacity, cost and performance. Of course
The basis: RAID
when one disk fails, not only is all the data
these requirements are interdepend interdependent, ent,
RAID stands for Redundant Array of
on that disk lost, the data on the other disks
making the decision that much more difficult.
Independent Disks. It is a method of storing
are at risk as well due to the fact that the
This article provides provides an overview overview of common common
data on multiple individual disks that are
information is distributed across them. If one
storage systems and their pros and cons to
combined into a single logical unit. A RAID
disk fails, all data records are affected whose
help you make the right decision.
controller controls the write and read operations,
fragments were stored on this disk – in most
so that the entire system achieves a higher
cases this means the entire array of disks.
Reliability = Availability
level of reliability or a higher data t hroughput
Recovering the data records that were not
Reliability is a great vir tue; for video systems
than the individual physical storage medium
affected is only possible using time consuming
as well. In this case, it can even be defined:
itself. RAID is therefore more than just data
methods.
Reliability means availability. How much you
backup. When one hard disk fails, system func-
need depends on the application. The following
tionality remains intact (exception: RAID 0).
Due to the lack of reliability reliability,, RAID 0 i s not
question may be able to help you assess your
After replacing the failed disk, the original state
recommended for use in video surveillance
needs: How critical is it if individual sequences
of the storage system is restored by a rebuild.
systems.
of images are missing in the recording? What
Depending on the objective, different different
• Not a realistic option for video security:
would happen if one in ten incidents were not
RAID configurations, also called levels, are
RAID 1 or mirroring
documented? documente d? Or one in a hundred?
used. In all, there are about a dozen different
• Duplication of data: All data is mirrored, that
Of course, everyone would prefer absolute reliability and thus 100% availability.
78
CCTV Handbook 2016
www.securitysa.com
combinations of configurations. Four types used most often are:
is, it is stored twice. • Maximum reliability: This method provides
STORAGE
a very high level of reliability as well as high performance. • High costs: Doubling the number of hard drives is usually quite expensive. • The net capacity is cut in half: Only half of the total capacity of all physically present hard drives is available for storing data. • Special area of use: The method is particularly par ticularly useful when the entire dataset must be removed for external use without interrupting system operation, for example for use as evidence.
Figure 1. All recorders share a volume group with RAID 6. The maximum data throughput is shared between the devices. The access speed for each recorder is limited. © Geutebrück
RAID 5 and RAID 6 – the standards • Reliability: User data and parity data (generated during data storage) are stored across all disks. Using the parity data, all data can be completely recovered, even if one disk fails (RAID 5). I n a RAID 6 configuratio configuration, n, it is even possible for two hard drives to fail simultaneously,, as in this case the parity data simultaneously has itself been backed up by a duplicate. • Continuous data access: Once a defective disk is replaced, the system automatically
Figure 2. Management of the RAID system is simplified. The performance of the individual units increases. Writing, reading and access are faster. When a hard drive fails within a volume group, only one recorder is affected. © Geutebrück
starts with the rebuild (recovery process) of
protected against the failure of another hard
the parity data so that once this procedure
drive. The intense read and write operations
is complete the original level of reliability is
during the rebuild place increased demands
again provided. During this period, it is still
on the drives. In addition, hard drive sizes
possible to access all user data.
continue to grow unabated, meaning the
• Limited costs: The net usable capacity for
recovery process takes longer as well. The
storing the user data depends on the
risk that a drive fails during a rebuild thus
selected RAID level: In RAID 5 it is n-1, for
increases with the hard drive capacity. RAID
RAID 6 it is n-2, where n is the total number
6 ensures the reliability of the system even
of disks. In a RAID system with a total of 16
during rebuilds – and at the price of only one
hard drives, 2 disks are used to ensure RAID
additional disk!
Level 6, leaving 14 hard drives to store the user data. • Balance: Users for whom reliability, data
An alternative is RAID 5 with an integrated “hot spare” disk: A reserve disk that is incorporated in the system but remains inoperative
throughput and cost efficiency are equally
until one active disk fails. Only then is it activated
important often use RAID 5 or RAID 6.
by the RAID controller and the rebuild process
Since the performance of RAID systems
starts immediately. The advantage: The “hot
depend on the proper interaction of hard
spare” disk hardly ages for as long as it is not
disks, it is advisable to only use identical hard
in operation. The disadvantage: During the
disk drives. Identical means: Same manufacturer,
rebuild there is no security against failure of an
same capacity, same type number and, if
additional disk. However, the rebuild time is
possible, the same firmware version. Moreover,
reduced. This makes sense if a system cannot be
in RAID systems we exclusively use so-called
easily accessed by the system administrator, and
“enterprise” HDDs that are certified for this
as a result it can take some time until a defective
use. They usually are characterised by a longer
disk can be replaced. In principle, “hot spare”
service life and reliability than desktop drives.
can also be integrated into a RAID 6 system.
Figure 3. A G-Scope/8000 with integrated RAID system can be expanded using JBODs to a database size of 256 TB. © Geutebrück
Be sure to enable Controller Messaging.
Which RAID level should be used for video security?
Ensure that your administrator takes the
system counts, the selection of the storage
message seriously and keeps spare disks
concept and the connection with the data-
Although RAID is a complex topic, this question
ready on site. The administrator can thus react
generating devices also have their influence. In
can be answered simply: The trend is moving
quickly and minimise the risk of data loss.
general, a distinction is made between network attached (central) and directly attached (local)
toward RAID level 6; in particular as hard drives continue to increase in capacity. With double parity, RAID 6 provides protection
Central or local
storage. These are the differences:
It is and remains a matter of priority: Do you
against the simultaneous failure of two drives.
need maximum storage capacity of hard
iSCSI Storage – central storage over longer
This means that even even when the system is per-
disks, optimum data throughput or maximum
distances
forming a rebuild, the RAID array is still
reliability? Not just the RAID level within a
iSCSI (Internet Small Computer System
www.securitysa.com
CCTV Handbook 2016
79
STORAGE
Interface) is a standard for storage networks
volume groups within a RAID system are each
therefore optimum disk access. This approach
based on IP technology, and it is used for
configured with a RAID 6 system. Each volume
is recommended if the storage requirements
centralised management management of storage within
group is a separate partition (Virtual Disk).
for an individual recorder are high, for example
a LAN. It is used in particular when multiple
Each recorder uses a separate volume group
when the images from a large number of
devices generate data that are stored on
for its data. Each volume group is controlled
high-resolution cameras cameras need to be stored
a shared storage system. It can be used to
separately. Benefits are even greater reliability
over a long period of time.
save space, for improved administration or
and more efficient management by the RAID
to combine the (individually small) storage
controllerr with a correspondingly higher controlle
system such as the G-Scope/8000 and expand
requirements requiremen ts of multiple units into a larger
data throughput per recorder. However, this
the storage up to the capacity you need using
array. Assuming RAID 6 is used by default, the
concept costs significantly more hard drives
SAS-connected JBODs (Just a Bunch Of Disks).
following variants exist:
– namely exactly twice the number of volume
They are cost-effective expansion units, which which
groups – that are not available for user data.
are controlled by the RAID controller of the
(See Figure 2.)
recorder.
net capacity (RAID 6 = n-2) is then divided into
SAS storage – the direct link
Summary
individual partitions (Virtual Disks). Each parti-
SAS (Serial Attached SCSI) is a storage system
A storage system is used to improve performance
tion contains a corresponding portion of the
directly attached to the computer (also known
in at least one major aspect compared to
available storage capacity. The data generating
as: Direct Attached Storage (DAS) or Server
operation of one or more individual hard
computers (in our application, DVRs or NVRs,
Attached Storage). There is a dedicated dedicated,, direct
drives. Depending on the configuration, a RAID
i.e. recorders) now use logical, virtual locations
cable connection between the computer
system offers the following advantages:
instead of local storage media. A potential
and storage unit via a SCSI cable. The
• Improved reliability of data storage.
bottleneck is the centralised storage manage-
distance between the two is limited to a
• Guaranteed high availability.
ment, which receives and distributes the data
few metres.
• Improved data throughput rate.
For maximum storage capacity, all available disks (n) are combined to form a
Use recorders with an integrated RAID
large storage system, a “volume group”. The
from all recorders – at a limited data through-
The overall overall performance performance of the RAID RAID system
put. The advantage, however, is that the RAID 6
is 100% available for the connected recorder,
For more information contact
reliability costs only two hard disks for t he total
but only for this recorder. Each additional
Geutebrück, +27(0)11 867 6585,
capacity of all recorders. (See Figure 1.)
recorder needs its own storage system. The
[email protected],
advantage is very high data throughput and
www.geutebrueck.com.
For even more data security, multiple
IP SURVEILLANCE
Maximise surveillance with the right technology So how does one select an IP video surveillance camera with so many features available? Surveillance camera technology continues
is only one of the deciding factors one should
demanding systems that work seamlessly together
to develop to accommodate the growing
consider. Technologies like wide dynamic
and maximise the return on investment. Pairing
demands of a burgeoning market. According According
range, H.265 compression, image stabilisation and
access control and CCTV systems helps generate
to Marco de Ru, head of product management
software defog are just some of the features
smarter video data for the security system.
at IP convergence company MiRO, smart
that are noteworthy.
manufacturers have embraced a number of
He emphasises that it is critical to ensure
An access control system that uses proximity cards, without a CCTV system, means that
new technologies that improve reliability of
that the features of the specific camera fit the
someone who should not have access to a
surveillance and increase image quality.
conditions and application. For example, if one
building could acquire access by using a lost or
has a camera mounted indoors facing a glass
stolen card. Although occupants may eventu-
technologies are best suited to the application at
Clients are often at a loss when deciding what
sliding door, at certain times of day the sunlight
ally notice intruders inside the buildings, the
hand and what features to consider when selecting
shining in from outside will cause over-exposure
access control system itself would fail to detect
cameras to ensure maximum performance. per formance.
of the image, thereby influencing the image
that anything is amiss. One solution is to have
De Ru points out that while many of these new
quality. In this instance, one needs to deploy
the CCTV cameras set up to record the entrance
technologies are sought after in a surveillance sur veillance
a camera with wide dynamic range. Wide
whenever employees use their proximity cards.
camera, the camera location and system end goals
dynamic range takes the high exposure portion
Using video analytics, the camera system can
are the factors that should be considered when
and merges them with the low exposure por-
determine whether the person using the card is
selecting a surveillance solution.
tion to average out the over-exposure of light.
actually the person authorised to use it. If not,
This substantia substantially lly improv improves es the image quali quality ty
the system can generate an alarm.
So how does one select an IP video surveillance camera given the fact that there are so many different camera types available and so
and provides the user with usable footage. Another thing to consider is whether cameras
For more information contact MiRO
many different features? De Ru says that while
will be integrated with access control systems. Long
Distribution, 086 123 MIRO, MIRO,
[email protected],
camera resolution is a prime consideration, it
considered a grudge purchase, many clients are
www.miro.co.za
HYPERCONVERGENCE
Converged data centres By Andrew Seldon.
Hyperconvergence may benefit integrators involved in large surveillance installations and need a simplified data centre approach. Convergence is everywhere. The security
solutions – this applies to large installations
us more insight into this concept. It must be
industry is no stranger to the term and the
due to the cost of the appliances.
noted that the companies have released their
implications it has for many vendors, installers,
Instead of having to worry about setting
integrators and even end users. But the concept
up servers, storage networking and so on, sur-
they are still focused on the IT application and
extends to all industries and what is happening
veillance solutions can make use of a hyper-
the optimisation thereof. They are aware of
in the IT industry in the conver convergence gence world is
converged system to carve out a piece of the
the usefulness of hyperconvergence in
starting to impact security as well.
data centre for their video footage. The beauty
surveillance projects, projects, but it will be a while
of what hyperconvergence will do is allow
before they have solutions specifically
Security Solutions has looked at before (www.
one person to allocate the server and CPU
designed for CCTV (the link above shows a
securitysa.com/53450n). Put simply, hyper-
resources, the storage space and the network
security integrator that is already at work
convergence is all about the convergence of
resources to be used by the surveillance solution.
using this new technology in South Africa).
the data centre into a more easily provisioned
You no longer need a specialist for each in
IT solution that incorporates everything in a
order to obtain the optimal infrastructure.
Hyperconvergence is a term Hi-Tech
hyperconverged solutions in 2016, therefore
Hyperconvergence Hyperconv ergence on the rails
type of virtual machine, as well as a physical
EMC is one company on the hyperconvergence
container – or appliance appliance.. Wikipedia describes
trail. It recently released VxRail, a hyper-
it as follows: “A hyper-converged infrastructure
converged solution is describes as a “data
(aka hyperconvergence) hyperconvergence) is an IT infrastructure
centre in a box”. It is a virtual appliance that
framework for integrating storage, networking
can be installed and easily scaled to meet the
and virtualization computing in a data centre.
requirements requireme nts of a business. It includes an array of product solutions,
In a hyperconvergence environment, all elements of the storage, compute and network
but instead of having to manage each by itself,
components are optimised to work together
the management function is centralised. It
on a single commodity appliance from a single
is basically a software defined dynamic data
vendor.” (https://en.wikipedia.org/wiki/
centre that includes all the components of a
Hyper-converged_infrastructure.)
data centre you would require.
The book Hyperconv Hyperconverged erged Infrastructure
“No one has time to find all the different
for Dummies by Dummies by Scott D. Lowe goes into far
components that go into a data centre,
more detail, designed for those unqualified
procured from separate vendors, put together
in rocket science science.. It is freely downloadab downloadable le at
Tom O’Reilly.
www.hyperconverged.org/dummies-book-
manage the lifecycle by keeping them up to In the first instance, this will ensure enough
download. While the term and its application is still
and ensuring they all work together and then
resourcess are assigned to the solution so as not resource
date and secure,” says Tom O’Reilly, CTO at VCE EMEA, an EMC company.
new, even in the IT world, it has already gained
to impact on the run-of-business functions;
some traction in the security world, and will
secondly, it can also easily be changed to run
each device (or four servers) and it can be
become even more popular as more companies
live analytics or provide more or less resources,
scaled to 64 nodes as 16 appliances are con-
offer hyperconverged solutions. In security,
as they are required.
nected to operate operate as one. In a surveillan surveillance ce instalinst al-
systems integrators will appreciate the ease with
Hi-Tech Security Solutions asked Solutions asked two
O’Reilly explains there are four nodes in
lation, for example, the system has the ability
which they can set up the back-end of their
companies that have recently released their
to favour more storage nodes as opposed
surveillance operations using hyperconverged
hyperconverged solutions to market to give
to CPU nodes to cater for video. He says
82
CCTV Handbook 2016
www.securitysa.com
HYPERCONVERGENCE
EMC’s Isilon NAS (network-attached storage)
Flexing hyperconvergence
environments) and allocate them according to
system is an option for surveillance storage
Cisco has also released its Hyperflex series
whatever requirements the company has.
requirements.
of hyperconverged appliances. Cisco SA’s Edward Agostinho and Andre Hurter explain
Simple complexity
but also enables smaller companies to deploy
that hyperconvergence is the culmination of a
The idea behind behind hyperconvergen hyperconvergence ce is to
their own DC technology technology,, according to VCE. It
process of simplification of IT in the data centre
simplify the data centre and put it in a box,
offers flexible and cost-effective services that
that has been going on for years.
making it easy to use and easy to scale. And if
The VxRail Appliance Appliance serves serves enterprises,
can be scaled according to a company’s needs,
For example, when storage area networks
the vendors are correct, using these solutions
whether installed in an in-house data centre
(SANs) first arrived, they were designed to
is actually simple for the business wanting
(or private cloud, to use the latest buzzword) or
provide better storage resource utilisation
data centre resources, however the technology
within a data centre run by a service provider.
and easier management for business’s storage
within is anything but simple.
VxRail was co-designed with VMWare and
systems. Other technology areas soon followed
In the surveillance industry, the benefit
encompasses the hardware, network, storage,
until we reached the current state of what is
these systems offer is that it will make the
virtual and software layers needed for a one-
basically an automated data centre. In the past,
process of setting up a data centre (or server
stop solution. A single unit is able to provision
each area of the data centre required specific
room containing all the IT equipment to
200 virtual machines in a matter of minutes,
components,, each with an expert to get the components
manage your surveillance footage and process-
while scaling with additional VxRail boxes is easy.
best performance out of it – not any more.
ing), that much simpler. You You won’t need an array
Moreover, if a VxRail unit starts to falter,
Hurter adds that the key to Hyperflex is
of experts, even when sharing IT resources with
replacing it is a quick and painless operation.
deeper levels of abstraction and automation.
business applications and processes, the setup
The system is ready-made ready-made with its own
One simply plugs a server into a domain and
and management has been automated, includ-
management software and it will plug into
follows a few prompts to get it an IP address
ing the network, ensuring your video doesn’t
any existing VMWare management ecosystem,
and the system up and running. The company
hog all the available bandwidth.
as well as mix with current VCE products.
has included a range of automation policies
The VCE VCE marketplace marketplace offers free free and paid
that the user selects accord according ing to the com-
in all likelihood, poorly explained in this short
applications deployable at a click’s notice.
pany’s requirements, and the system automati-
article. However, the potential for hypercon-
cally configures the system – storage, network-
vergence in the general IT world is enormous,
ing, etc. – accordingly.
as well as for the security surveillance world. world.
“The important thing to understand is how this brings a new capability to the market,”
As noted above, the technology is new and,
says Chris Norton, VCE country manager for
Users can scale to new requirements by
South Africa. “Enterprises “Enterprises can use VxRail to
adding new devices as required. The company
smaller companies as well as enterprise
equip parts of the business with data centre
says it will take less than an hour to deploy a
clients, the costs ensure that it remains a
capabilities without adding extra load to
Hyperflex solution, including specifying and
large company buy – but who knows how
central infrastructure.”
activating the required network.
technology will change over the course of the
While the vendors claim it can be used for
For example, if an enterprise has a remote
There are are two versions of of the product; the
branch that needs to crunch a lot of analytical
smallest one is the HX220c, a 1-rack unit with
data, it can deploy a VxRail server on-site, thus
up to 7 TB of storage and up to two proces-
For more information:
avoiding avoid ing the pain of re-engineering its core
sors per node. The HX240c is a 2-rack unit with
• VxRail: www.vce.com/products/
infrastructure. It also sidesteps the problems and
up to 29 TB of storage and up to two proces-
costs of pervasive connectivity: whereas a branch
sors per node. The scalability of the system
would normally connect to private or public cloud
makes it simple to pool a number of resources
servers, VxRail offers on-site autonomy.
(including the network for specific tasks and
next few years.
hyper-converged/vxrail • Hyperflex: www.cisco www.cisco.com/c/en/ .com/c/en/us/products/ us/products/ hyperconverged-inf hypercon verged-infrastructure/inde rastructure/index.html x.html • Hyperconvergence: www.hyperconverged.org www.hyperconverged.org
Plug & play gigabit switch Industry first plug & play intelligent redundant ring gigabit switch with PoE up to 60 W. The new four four port intelligent managed managed
Providing two 10/100/1000 Mbps RJ45 and t wo
Ethernet switch supports configuratio configuration n either
100/1000 Mbps configurable SFP ports the unit
10.4 × 9.4 × 3.7 cm, the CNGE2+2SMS is the
Weighing less than 1 kg and only measuring
via DIP switches or through the standard
offers great flexibility by supporting any MSA
smallest switch of its t ype available on the
graphical user interface. The unique DIP switch
compliant 100 Mbps or 1000 Mbps SFP module
market and ideal for use in confined spaces.
configuration provides network functionality
and ComNet’s unique Copperline extended
CNGE2+2SMS CNGE2+2SM S series is made in the USA and
such as; redundant ring using RSTP, multicast
distance modules. PoE support is available on
comes with lifetime warranty as standard.
support to prevent network flooding (in point-
the fixed electrical ports in two formats; up to
to-point or linear topologies), redundant redundant point-
thirty (30) watts of power per port based on the
For more information contact ComNet
to-point links and SFP port speed simply and
IEEE 802.3at standard or a High Output (HO)
Europe, +44 (0)113 307 6400,
quickly without any IP knowledge or network
version that can supply up to 60 watts of power
[email protected],
configuration via a connected computer.
simultaneously from each port.
www.comnet.net.
www.securitysa.com
CCTV Handbook 2016
83
HOME SURVEILLANCE
Home is where the surveillance is By Andrew Seldon.
Hi-Tech Security Solutions takes a quick look at home surveillance. In the not too distant past, home surveillance
the cost of producing them and the subse-
be linked to an armed response company as
was a strictly amateur effort with cheap
quent higher cost to the end user, explains
most house alarms are? This would address
cameras and questionable results. Today,
Adrian Woodley, FLIR’s UK & European sales
the safety concerns of homeowners. Not only
however, home surveillance has become a
manager for consumer electronics. Some of
could they see any problems as they occurred,
sizable market with many companies putting
the features corporate users expect as
but they could be assured of some form of
quality products and management capabilities
standard include wide dynamic range,
response.
in the hands of users.
varifocal lenses, ultra-wide angle and thermal
But what goes into a surveillance solution for the home? Are companies putting their
technologies, for example. They have have been kept out out of products
Video alarms? The first thing to note, note, adds Wynberger Wynberger,, is that
standard cameras into the consumer market
aimed at the home because of their cost
a surveillance system is not an alarm system.
as is? Or, are they developing specific solutions
and the heightened price sensitivity of most
“In many instances, an attempt is made to
designed for home use, with added function-
domestic consumers. “However, due to the
have the video motion detection function
ality that corporate users would not use or
increase in demand for home surveillance in
trigger the alarm system and warn the armed
require, such as cloud storage? Hi-Tech Security
general, higher quality and increased ease of
response unit. However, due to numer-
Solutions asked Solutions asked three experts for their opinions
accessibility to live view and recorded footage
ous false alarms, this has proved a fruitless
on what makes a reliable home surveillance
that has occurred in recent years, a lot of these
exercise.”
solution today, when there are so many
technologiess are now start ing to filter down to technologie
options to choose from.
consumer or home-specific cameras.”
Roy Alves, regional business development
Brian Wynberger, national technical
There are already many many discussions among among armed response companies to include a video service in their security offering, but Alves says
manager of Axis Communica Communications, tions, says
manager at Reditron echoes this, noting
he hasn’t seen much traction with it just yet.
Axis doesn’t see a need for home-specific
that the cameras aimed at the home-specific
“Hopefully when factors such as bandwidth
cameras. “Most manufacturers nowadays offer
market focus on pricing. “These cameras are
and cloud video increases, this is something
a very broad range of cameras that can be
typically simpler versions of the commercial
that could take off.”
used within a wide range of applications. A
equivalents equivalen ts as home users did not really
camera that is used in a retail environment
require all the added functions.”
could adapt well into the residential market.
Wynberger raises a valid point. What
There is also the natural hesitance hesitance by people to have strangers accessing video cameras in their homes, even when the
However, cameras used in a home might not
does the average home user need from a
promise is made that it will only be done in
need all the advanced features that a camera
surveillance solution? Naturally, the products
specific emergencies.
used in an enterprise/com enterprise/commercial mercial setting
are interesting and fun to use to check that
might offer.”
the kids are doing their homework and not
It is possible to have surveillance solutions
playing video games, but do they really
integrated as part of an alarm system or
been kept in the commercial domain domain and out
serve a useful and reliable security function?
monitored system, but these are generally
of the home for a long time, primarily due to
Moreover, should surveillance solutions not
supplied and installed as a whole by the
There are are many technologies technologies that have have
84
CCTV Handbook 2016
www.securitysa.com
That’ss not to say the idea That’ idea is worthless.
HOME SURVEILLANCE
company that offers the monitoring service, and this can be quite costly says Woodley. He sees that consumers will want home surveillance or home monitoring as part of their everyday life, life, to see what is going on in the home at any given time of the day and not purely as a security function. He also believes the mere presence of surveillance cameras as a deterrent, chasing would-be thieves to another less secure house, making having cameras on site a benefit.
Where to start? If the homeowner decides that a surveillance solution is a good starting point for improved security as well as other ‘smart home’ functionality, the first thing they need to do is ensure they have a decent decent Internet connection. Alves says the homeowner will need a reliable Internet connection to be used in conjunction with intelligent network cameras (that allow for DNS), a smart device to view the cameras as well as viewing/ recording software, such as Axis Camera Companion, Companion, which allows for simple viewing and recording off a smart device. As far as the setup goes, Wynberger adds that a P2P (peer-to-peer) option is the best to connect your various devices. Using a smart device, all the user needs to do is scan a QR code or barcode from a device to connect it to the home network. This avoids the hassle of setting up a router and other technical tasks. When it comes to avoiding hassles, using analytical and other technology that business deems standard, such as motion-triggered recording,, push notification of an event trigger and a live view of any of recording your cameras or recorded footage from your mobile device is key to a successful home rollout for Woodley. Of course, these features need to be made as simple as possible for the home user, once again to avoid technical hassles. The same hassle-free hassle-free requirement requirement is even more more important when it
Wynberger agrees, agrees, noting that using wireless should only be done
comes to setting up your network. Most people have enough problems
when there is no other option available available.. “Wireless is influenced by
simply setting up their home Wi-Fi Wi-Fi to connect everyone to the Internet.
factors such as radio waves, EMC, weather and other conditions; Wi-Fi
Woodley Woodl ey says the attraction of plug-n-pla plug-n-playy and no wiring or drilling
surveillance systems also have a problem transmitting through solid
is certainly a big attraction to consumers. “Wi-Fi “Wi-Fi surveillance systems
walls. Moreover, one needs to run power cables to the camera in any
are generally as reliable as the Wi-Fi signal itself, but with some of our
case, which means the system is not completely wireless. Wireless Wireless
products such as the FLIR FX we have taken steps to make sure that you
battery operated cameras are available, however these typically have a
never miss the things that matter.”
battery life of three to 12 hours of continuous functionality.”
The FLIR FX uses uses cloud recording recording which means your footage footage is stored
Therefore, Therefor e, while wireless wireless systems may sound good, good, perhaps it is in
in the cloud. If a thief decides to take your traditional hardwired hardwired DVR
the best interest of the homeowner to make sure the signals in his/her
away, you’ve instantly lost all of your footage, however with the cloud-
house are up to the task. With Power-over-Ethernet Power-over-Ethernet solutions available
based system, if the hardware is taken your footage is safely stored.
today, combining the power and network cabling into one cable may
“The downfall of this is that many Wi-Fi systems rely completely completely on the cloud – so if you have a power cut or the Wi-Fi goes off for any
be a good compromise between totally wireless and hardwired. On the other hand, not surprisingly, 95% of recorded home
reason, you lose the footage during that time,” Woodley adds. “To combat
surveillance footage is never viewed, notes Woodley. It is only when
this, the FLIR FX has a Micro SD card built into the camera so should the
something has happened people tend to look back at their recordings recordings..
network be lost, the camera detects it and instantly starts recording
In these types typ es of scenarios, perhaps per haps wireless would wou ld suffice. Again, it’s
locally to the card. The footage will be pushed to the cloud at a later time
up to the homeowner to ensure their network signal gets to where they
when it detects the Wi-Fi is back on.”
need it.
Wired vs. wireless
Products on offer
While Wi-Fi is definitely the simpler and more convenient way to go
When it comes to the home market, Wynberger Wynberger says Reditron offers a
when setting up a home network, a school of thought seems
wide range of surveillance solutions, solutions, from elegant slim-line recorders to
somewhat nervous about relying on wireless for security functions.
a range of cameras which will satisfy most home surveillance needs.
Alves believes wired connections are often more stable. “The challenge in South Africa is that most homes are built from concrete, therefore
The solutions, solutions, of course, course, offer the option option of remote access monitoring. monitoring. Woodley says FLIR offers 720p and 1080p high definition DVR
propagating a wireless signal through the th e structure can prove difficult.
analogue systems, 1080p high definition digital NVR systems, wireless
Video requires exceptional bandwidth and unless the cameras are in close
720p and 1080p LCD and DVR systems and Wi-Fi cloud based cameras. Continued on page 87
proximity to the wireless router, we would advise a wired connection.”
www.securitysa.com
CCTV Handbook 2016
85
MARKET CONSOLIDATION
Market consolidation, good or bad? By Andrew Seldon.
Mergers and acquisitions may shake up the market, but customers generally win in the end. We seem to be in a period of consolidation
company buys the other for some critical or
in the security market. Enormous amounts of
innovative IP that will markedly improve an
money are being spent on buyouts and merg-
existing product or put the buying company
ers, such as Canon buying Axis and Milestone,
into a space that it has battled to make inroads
opposition in the marketplace marketplace..
Johnson Controls and Tyco merging, Avigilon
into.
Anderson says that, in both cases, there
buying what amounts to a ton of video analytics patents, Flir buying DVTel and so on. Some say this is a natural progression of
(a) Getting access to new technology and/or increasing market share, or (b) Using the acquisition to remove their
“This can have a positive effect for their
is a period of concern and a reconsideration
partners and customers in that their avail-
of who should be used on your next project.
able basket improves or a specific product
“This leaves customers, SIs, installers etc. in a
a maturing market, others may suggest that
improves. The other reason would be for
position of difficulty when trying to provide
western companies are reacting to competi-
efficiencies that can be realised by joining two
a long term support in such a fast changing
tion from China, where quality products are
similar businesses making them more profit-
marketplace.
being sold at lower costs. Whatever the reason,
able or efficient, which should drive prices
the market is changing. And no matter the
down, making them more competitive and in
they are offering solutions that are open and
reason, the person who will feel the impact,
turn grow their market share.
unrestricted. There There must be an easy path to
whether positive or negative, is the customer. Hi-Tech Security Solutions asked Solutions asked industry
“Conversely something to look out for would be creating a monopolistic environment environment
“This should result in all parties being sure
change without ‘lock in’ to particular protocols and non-standard interfaces.”
experts why we’re seeing the spate of mergers
through acquisitions or mergers, which is not
and what the eventual outcome could be.
good for partners or customers for obvious
Competition Competiti on and efficiency
reasons.”
Mutinelli doesn’t doesn’t think consolidatio consolidation n is a
Ingo Mutinelli, sales director at Elvey Security Technologies, says the outcome
Rob Anderson, MD of Rob Anderson
response to Chinese competition. “Mergers
depends on the reason for the acquisition or
Consulting echoes Mutinelli that consolida consolidation tion
and buyouts have been around for centuries
merger.. “Many of these acquisitions/mergmerger
and mergers are generally based on one of
and while price is always a factor, I believe
ers are complementary, meaning that one
two reasons:
technology, service and competence drives
86
CCTV Handbook 2016
www.securitysa.com
MARKET CONSOLIDATION/HOME SURVEILLANCE
Irrespective of the marketing hype or slick sales people, Anderson advises customers to ensure they always work with good brands, from equipment through to installation. “The most important rule is not to allow your project to use software and products that have non-standard protocols. The systems must be open and allow for multi-product connectivity.”
Customers still rule The era of of consolidation consolidation is not likely to end soon, there are already rumours of more big deals in the making. The one thing the
Ingo Mutinelli, sales director at Elvey Security Technologies.
Rob Anderson, MD of Rob Anderson Consulting.
many of the acquisitions and mergers we see
solutions instead of products is also a factor in
buy, still need customers to make a profit. As
today.”
the consolidation we are seeing.
noted above, many of these deals are driven
Anderson expects the consolidation we’re
Anderson splits the market between box
end user can count on, however, is that their suppliers, no matter who they merge with or
by the profit motive and this is good news for customers.
seeing is partially due to new competition, but
movers and mass distribution on the one hand,
it is also due to the need for more robust busi-
and professional, large project solutions providers
ness plans – trying to be a producer of analytic
on the other. Customers are inclined to opt
you can close your doors,” says Mutinelli.
algorithms only is not likely to be profitable.
for the one-stop shop, or box mover because
“Whether you’re wheeling and dealing to
costs are lower, however, there is often a lack
acquire a customer base or organically grow-
of layers of systems or companies between
of expertise available to extract full value from
ing one, entities will always try their best to
the manufacturer and end user. Too many is
solutions. “The average client is convinced by
look after their customers. Whether Whether they get
too costly. This reduction in the number of
the salesman that this solution is best. It remains
it right or not is the question, and if not then
mark-ups is driving a change in the rest of the
debatable if this solution is well serviced.”
there are more than enough choices out there
“There is also a need to reduce the number
market and the result is good for clients.”
“Share of wallet and how much of i t they
“If you’re not looking after your customer,
for clients to try something else.”
can get drives how companies view their
Holistic offering
market,” notes Mutinelli. “Consolidation and a
For more information, contact:
It’s nothing new to say that the physical
holistic offering is where manufacturers and
• Elvey Security Technologies,
security market is moving away from point
suppliers are headed. Customers also want
+27 (0) 11 401 6700,
[email protected],
solutions, or silos as the IT word calls it,
one port of call and they want simplicity, not
www.elvey.co.za.
towards holistic solutions that aim to deliver
complicated value chains from many different
• Rob Anderson,
[email protected],
everything the client requires. The The drive to
vendors.”
www.robanderson.co.za.
Continued from page 85 Finally, Axis offers a wide range of entry-level cameras such as the Axis M10 and M11 series. The cameras cameras offer best-in-class best-in-class image quality quality and and professional monitoring capabilities. For outdoor surveillance, Alves recommends the affordable AXIS M30 Series which are highly discreet and easy-to-install fixed domes. “Our Axis Camera Companion is a simple yet sophisticated video surveillance solution for businesses/ residents needing to monitor their premises. It is an efficient solution for small systems with one to four cameras, but there is also full support for up to 16 cameras – and it is available for download free of charge. For more information, contact: Axis Communications, +27 (0)11 548 6780, sasha.
[email protected],www.axis.com.
[email protected], www.axis.com. FLIR Systems, +44 780 151 4810, theresa.turner@flir.uk.com,www.flir.com. theresa.turner@flir.uk.com, www.flir.com. Reditron, 087 802 CCTV (2288),
[email protected], www.reditron.co.za.
Dahua eyes home security Dahua Technology has introduced home Wi-Fi solutions, offering real-time monitoring for home surveillance surveillance.. The resolution resolution of the Wi-Fi Wi-Fi series cameras cameras is up to 3 megapixels megapixels and it can connect to to the easy4ip app for remote control and viewing the footage which is saved on local storage. Users are also able to communicate remotely via the built-in bi-directional audio. The cameras can also send alarm notifications when they detect activity. The simple 3-step 3-step installation process enables enables it to detect and and connect to the Wi-Fi Wi-Fi network automatically, automatically, letting users view streamed video right away away.. Due to its compact design, the camera can be placed almost anywhere and provides 120 degree monitoring.
Product highlight highlightss • Capture detail with 3 MP camera • 7x24 real-time monitoring monitoring & playback. • Bi-directional audio. • Push alarm (motion detection detection & sound detection). • Plug-n-play with easy4ip app. • Easy installation. For more information, contact Dahua Technology, +86-571-87688883,
[email protected].
www.securitysa.com
CCTV Handbook 2016
87
MOBILITY
Video management in the age of the mobile Internet By Anders Johansson, director, Milestone Eastern Europe.
Enhancing the value of video and providing visual awareness at the edge of the network. Mobility – the rise of Internet-enabled
this goes beyond traditional systems like
Can you handle it?
smartphones and tablets – is radically
Enterprise Resource Planning (ERP) software:
With mobile devices becoming so common-
changing the way that business systems
video-enhanced business systems used for
place, and with the trends mentioned above
operate: enhancing the value of video and
securing people and assets are the next in line
rapidly developing, the systems that handle
providing visual awareness awareness at the edge of the
to be given the mobile device treatment.
them also need to evolve. They can’t be the
network where it can have the most powerful
And this trend doesn’t stop there.
same systems designed for a non-mobile,
and immediate impact.
Next up is the concept of the Internet of
stationary world, where cameras are only ever
Safety Things. The IoST is concerned with
mounted on walls and all networks are wired.
is pretty great. Not only can we share our
The Internet, we can probably probably all agree, agree,
connected smart assets and sensors which
They need to be built with with the under understandin standing g
photos with far-flung family and friends, we
are able to collect and share data, enabling
that the notion of a ‘system’ is flexible and
can also do some pretty nifty things with it in
new insights that can transform a standard
expandable, according to the way technology
our working lives too. It continues to provide
company into a data driven business. It’s a
and applications develop.
a seemingly endless set of possibilities for
specialised Internet of Things, with safety and
companies to help them work harder, better
security-centric devices communicating to
like open platform technology – platforms
and smarter. And now mobility adds another
deliver enhanced functionality and powerful,
that can provide organisations with the
range of opportunities into the mix.
actionable information.
necessary adaptability to ensure that they
The mobile Internet Internet enables enables huge swathes
Beyond the IoST lies Managed Visual
We’re talking, of course, about concepts
can implement changes when and where
of the world’s population to more rapidly
Services: the capability of effectively and
they are needed, according to their business
access information and engage with others
meaningfully using video from hundreds or
requirements.
on a scale never seen before. For businesses,
thousands of connected sensors.
88
CCTV Handbook 2016
www.securitysa.com
So while the IoST might be in its early
MOBILITY
stages, where standards, privacy issues and
responder can access the VMS and get the
administration have yet to cohere into a more
full story without delay or the filter of
mature and corporate-ready, implementable
interpretation. This not only improves the
concept, mobility is clearly alive and very
quality of the response, it’s also much more
present today in the form of smartphones and
convenient for the responder.
tablet computers. Consumer adoption of both categories is,
One example of this is the system at Copenhagen zoo. The zoo has numerous
we know, widespread – and now mobility is
gates for receiving supplies. All of these gates
broadening its reach into the corporate world
are unmanned, meaning that, previously, an
as well. Tablet computers, a category that
employee had to leave the zoo administration
barely existed three years ago, is estimated to
building when access was requested and
grow by almost 50 percent per year in
walk to the gate to verify the identity of the
enterprise use, according to a recent IBM
visitor and allow them entry. But now, by
study.
using a mobile client integrated with the zoo’s
Data from the same study indicates that
VMS, any authorised employee can access
individuals are using both mobile phones
the video feed from the camera covering the
and tablet computers to accomplish a wide
gate in question, verify the identity of the
range of work activities that were previously
delivery and open the gate remotely. The use
restricted to desktops. These activities range
of mobile clients saves the zoo 180 man-days
from accessing email (62 percent via phone,
a year, improves handling of deliveries due to
38 percent via tablet) to collaboration and
reduced waiting times, and heightens security.
project management (25 percent via phone,
Mobile clients can also benefit more
34 percent via tablet) to videoconferences
traditional video security installations. The
(30 percent by phone, 33 percent via tablet).
Skult chain of hairdressers in Sweden use their
The study concludes: concludes: “The ability to perform
video installation for security and improving
these and access other enterprise applications
salon efficiency. But in their new video
from non-traditional office settings holds the
infrastructure no traditional clients are used.
stationary cameras; it can provide extra,
possibility to reinvent at a fundamental level
They operate operate with mobile clients clients only. only.
complementary angles to recordings from
how companies execute a range of activities
This enables the owner of Skult Skult to ensure
Anders Johansson, director, Milestone Eastern Europe.
stationary cameras; and it could be used to
– from sales and customer service to logistics
that every salon in the chain meets her
provide additional video data, as smartphones
and maintenance.”
standards, and can quickly handle security
have plenty of capacity for running video
Video business systems also benefit from
incidents, no matter where she is. But it’s not
analytics. Of course, optimised video push
this focus on mobility: “Mobile strategy leaders
just security incidents that that can be monitored, monitored,
capabilities demand that the VMS is adaptable
have also seen clear benefits in their mobile
as CEO and owner Maria Jörgensen explains:
and capable of handling the video metadata.
investments to date: 73 percent of leaders have
“If I want to, I can check up on my salons when
If it can’t, the use of mobile devices as effective
seen measurable ROI from their mobile
I sit at home. Then I can call the store right
cameras is, at best, difficult.
initiatives versus 34 percent of all other
away if decorations at the store need to be
companies in our study. Further, 81 percent
changed, for example. It is great to have such
Building for the future
stated that mobile capabilities are fundamentally
flexibility.”
It’s clear that the corporate use of mobile
changing the way their organisations do
devices is increasing. This means that business
Cameras on the move
systems, infrastructure and workflow will
This is impressive stuff. stuff. But mobile mobile devices
now all have to be designed, or adapted, to
Mobile video: a radical departure
can be used for much more than just functioning
accommodate these devices.
When smartphones or tablets are used as
as a mobile video client. Consider this: all
clients, they enable a radical shift in how the
smartphones and tablets have an integrated
here. The use of mobile devices as clients can
VMS (video management system) is used.
video camera, they have fairly accurate time
improve productivity, as they enable a ‘watch
They allow allow a decentralised decentralised workflow workflow where
services, and nearly all are GPS-enabled. The
and react everywhere’ workflow. Video pushed
video feeds can be used everywhere, not just
more advanced devices add a compass to
from mobile devices is enabling both new
in front of a smart wall.
the feature set. These features make mobile
opportunities and giving first responders to
devices very capable cameras for use in a
incidents ways to be more efficient.
business,” the study says.
Push alerts to mobile devices effectively
Video business systems are no exception
break the monitor-wal monitor-walll restriction, removing
VMS-context. Add to this the availability of
All of this demands a VMS with a high
the last barriers for t rue mobile video systems.
nearly omnipresent fast data connections, and
degree of adaptability and true openness – a
It’s no longer a single operator handling an
the resulting practical devices enable a large
video management system built with an
alarm and using video feeds to investigate the
number of new uses.
understanding of the requirements of the new era of mobility.
incident further, manually setting in motion
The ability to push push video to a central VMS
the proper actions for resolving the incident.
from mobile devices, complete with evidence
Push alerts now mean the person responsible
class metadata like GPS position, camera
For more information contact Milestone
for resolving the incident gets all the
direction and time of day, is a truly compelling
Systems, +27 (0)82 377 0415,
information they need to do so, directly.
concept. It offers the potential to report
[email protected],
incidents at locations not covere covered d by
www.milestonesys.com.
Using the mobile video client, the
www.securitysa.com
CCTV Handbook 2016
89
CYBER SECURITY
Is your CCTV system secure from cyber attack? A Cloudview White Paper Paper..
Does your surveillance installation make it easier to hack your organisation’ss network and everything on it? organisation’ Visual surveillance is more integral to society
The security of the network is now entirely entirely
valid domain. In the case of specifically target-
than ever before, helping organisations to safe-
compromised by the DVR.
ing DVRs, an attacker does not need to scour
guard their most valuable assets. However, the
A number of DVRs automatically set up port
the entire Internet but need only search the
DVR systems traditionally employed in CCTV
forwarding rules without notifying the user.
domains used by known brands.
networks can make those very organisations
The DVR simply asks the router router to set up port
vulnerable. This paper will explore the ways
forwarding. This This makes set-up easier, but at the
Firmware updates
in which even well known DVR systems are
expense of weakened security.
Nowadays, Nowaday s, everyone is familiar with companies
exposed to external cyberattack, often acting
Some DVRs recommend running on a
as a potential entry point for wider corruption
non-standard port. Although this may reduce
vulnerability vulnerabil ity is found, the software company
or extraction of network information.
the number of automated attacks, it does make
will develop a fix and deploy it to users, often
finding vulnerable DVRs easier.
using an automated mechanism.
Port forwarding
releasing software updates. When a bug or
However, automatic DVR firmware updates
Many DVRs allow users to view live or recorded
Finding vulnerable devices
are almost unheard of. For a large number of
footage remotely using a web browser or app,
Everything connected to the Internet is
devices, there may only be a couple of firmware
typically using ‘port forwarding’ to enable this
identified by an IP address. So when using
updates to fix the most serious of bugs. Once the
functionality. At the heart of most organisations’
port forwarding to access the DVR, its IP
DVR is a few months old, and of no commercial
security protocols is their firewall. This works by
address needs to be known. As a result, many
interest to the manufacturer, updates generally
preventing all inbound connections to a device,
manufacturerss recommend using Dynamic manufacturer
cease, leaving companies vulnerable to attack.
so there is no way for the DVR to form a direct
DNS, which automatically updates a name
connection to the Internet. To get around this and
server in the Domain Name Server (DNS).
enable port forwarding, a hole is punched in the
However, Dynamic DNS also allows an
Even when manufacturers do update the firmware, it is often only a small subset of the entire system. This means that they update the
firewall, and connections are forwarded to the
attacker to quickly find hundreds, or even
programs developed to handle the DVR
DVR. The browser or app can now reach through
thousands of vulnerable devices relatively
functionality, but not the underlying operating
the firewall and access the DVR, allowing users to
easily. They simply need to test as many names
system. An analogy would be running an
connect remotely. However, However, with an open hole in
as possible until they get a response; an IP
up-to-date web browser on a Windows 95
the security perimeter, anyone can get in.
address will only be returned when there is a
machine. The browser may be secure, but the
90
CCTV Handbook 2016
www.securitysa.com
CYBER SECURITY
underlying operating system is so riddled with
beginning to replace traditional DVRs. Unlike
are viewing is not from two weeks ago?
holes that it does not matter. You have locked
DVR systems which have bolted on Internet
How can the police be sure the video has
the door, but left the windows wide open.
features along the way, dedicated cloud video
not been tampered with? This is where
solutions have been built to take advantage
digital signatures are required. A digital
No oversight
of the Internet from day one, offering features
signature, which is difficult to copy yet
Generally, the first signs of a malware infection
such as remote video streaming and data
easy to verify, proves that a certain device
on a PC are unwanted pop-ups, a general
back-up in a more reliable and user-friendly
has handled a piece of data. However,
slow-down, continuous continuous network and disk
way. However, they often suffer from the same
few cloud-based providers use digital
activity, strangely-named processes processes or alerts
vulnerabilities as those found in traditional
signatures.
from anti-virus software. Now imagine that the
DVRs.
PC is rarely used, and when it is used, it runs
the surveyed sites were also found to have
software. How can problems be detected? The
Inbound RTSP connections to IP cameras
simple answer is that they can’t.
Most IP cameras support incoming
a cut-down user interface with no anti-virus
The same issues exist with a DVR. It will
4. Common website vulnerabilities: Nearly all one or more other vulnerabilities. 5. No controls around access to customer data. Beyond this, many cloud-based providers
connections using RealReal-Time Time Streaming
have clauses allowing them to share data
rarely be used; live footage might be looked
Protocol (RTSP). This allows video from the
with third parti es. However, However, when we are
at now and then, and recorded footage even
camera to be viewed from another machine.
talking about sensitive data such as CCT V
less frequently. The user interface provides no
RTSP is very widely used; a scan of the Internet
stored on a server as part of a paid-for
feedback as to what is going on inside.
shows that there are about 2.4 million devices
service, there should be no need to share
running RTSP. Approximately 1.3 million of
user data with a third party without the
Vulnerabilities are common
these have no authentication at all, with many
explicit consent of the user.
Any complex system will have some vulner-
allowing an attacker to freely view live video
abilities, whether obvious or very subtle.
remotely.
Unfortunately,, the majority of DVR software is Unfortunately
Just as with most traditional DVRs, a large
Conclusion It should be clear that neither traditional
not built by highly skilled developers. developers. Many
number of cloud video providers recommend
DVRs nor newer cloud video systems provide
manufacturers only require that the soft ware
port forwarding to allow access to the RTSP
the high levels of security necessary for the
works immediately. immediately. Often, the mistakes are
stream from outside the firewall firewall..
protection of sensitive data gathered by visual
avoidable: common errors such as unbounded
surveillance operators. Not only are such
memory access, SQL injection, and default
Poor website security
systems vulnerable to attack from external
credentials.
Cloudview’s recent passive survey of 24 popular
forces – compromising the security of the
cloud-based cloud-base d video websites showed that
entire network – but the operators them-
Consequently, many systems acquire security
many of them were making common security
selves are also in danger of failing to comply
features as and when their weak points are
mistakes. These include:
with data protection legislation. Indeed, very
uncovered by third parties. In over 15 DVRs
1. Use of insecure protocols: A number of the
few operators currently reach the standards
Security, then, is often an afterthought.
tested by an independent consultant, none was
sites did not use secure protocols protocols to ensure
required, due to the failure of manufacturers
free from serious vulnerabilities. Some took many
that communication between the user and
to provide adequate access and storage
hours to breach, but the majority took less than
the site was secure. Using standard web
controls, implement protocols or defend
an hour. Without the ability to update firmware,
protocol (HTTP) allows an attacker to either
against malevolent intrusions.
backdoor vulnerability can persist for years,
passively monitor, monitor, or actively tamper with,
leaving businesses’ entire network exposed.
communications. communicatio ns. Usernames and pass-
important, companies must move away
words can be gathered, or videos viewed.
from inherent vulnerabilities vulnerabilities in DVRs and IP
Powerful machines
2. Poor configuration or implementation of
As visual surveillance grows ever more
cameras and embrace the technology of the
Inside a DVR is a powerful and highly capable
secure protocols: While While some sites did use
cloud – provided that the cloud solution has
computer, normally running a full operating
secure protocols, protocols, they made mistakes in
the necessary security safeguards to mitigate
system. There is little difference between a DVR
their configuration, massively reducing
the common flaws outlined on previous
and a small web server; this makes DVRs ideal
security. A significant number of sites
pages. Security cannot be bolted on. Services
machines for launching an attack against your
were still found to support options that
must be designed to be secure from the
network. In comparison, a router or internet-
are known to be insecure. These allow an
ground up; and if organisations are to protect
connected thermostat is far more limited, while
attacker to downgrade the user’s connection,
their assets effectively effectively,, transparent security
many IoT devices have slow network connections,
giving the impression that the connection is
must be at the top of the agenda.
limited processing power and very little storage space. This ability of a DVR DVR to be used to to launch
secure when it is not. 3. No encryption or digital signatures:
For more information, contact
Encrypting the communication link is only
Cloudview, +44 203 436 1100,
an attack against the rest of a network makes
part of the picture. Once that data has
[email protected],
the use of a cloud-based system even more
reached the cloud, how is it protected from
www.cloudview.co.
compelling.
unauthorised access, and what happens if the cloud system itself is breached?
Insecurity of cloud video solutions
Further to this, few cloud-based
This white paper has been shortened. The full version is available at http://www.cloudview.co/dls/white/
Cloud video solutions are a newer breed
providers ensure the integrity of the data.
cyber-attack-white-paper.pdf (short (short URL: URL: http://goo.
of video surveillance systems which are
How can users be sure that the video they
gl/SFpp9v).
www.securitysa.com
CCTV Handbook 2016
91
VIDEO COMPRESSION TECHNOLOGY
More video, less storage An Axis Communications White Paper.
Zipstream improves video compression without reducing usability. usabilit y. Most networked video surveillance systems
that ensures that important details in the
syntax created for storing, sharing and viewing
today are limited by the amount of video that
image get enough attention in the video
video. Today, the most used video compression
can be stored for later use. Camera technologies
stream while unnecessary data can be
standard is called H.264, which is a method
such as sensors, optics and embedded image
removed. Axis’ Zipstream technology cuts
that is efficient enough to reduce several
processing have evolved rapidly over the last
the reduced storage cost by an average of
days of surveillance video onto one single
10 years, resulting in video with higher resolu-
50% or more without costly and complicated
SD card.
tion, frame rate and dynamic range, capturing
integration.
more details of a scene. The development has
The solution solution used to to compress compress video according to H.264 is not part of the standard,
improved the quality of video evidence and
Background
only the syntax and the method to perform
forensic analysis such as face identification, but
Before video from surveillance cameras can be
playback is standardised. This enables i mproved
only when it is possible to retrieve the video from
efficiently stored on any media it has to be
H.264 encoding solutions to be created while
the right place, the right time and with the right
processed to fit into i nto the allowed space. To fit
keeping the file format for interoperability.
quality. A high quality video source is of no value
video with high resolution and full frame rate
if storage was limited and the system was
onto SD cards, which are the most popular and
effective implementation of an H.264 video
configured to remove valuable information
cost-efficient media for embedded applications,
encoder for surveillance applications. It includes
before it was needed.
the original information has to be encoded. This This
various surveillance-unique methods that
is done using video compression algorithms that
enable networked cameras to produce video
requirements by reducing the video bit rate,
encode video data by reducing and removing
with markedly lower bit rate.
such as limiting the storage retention time,
redundant information.
There Ther e are vario various us methods methods to limit storage storage
Axis’ Zipstream technology is a more
How does Zipstream work?
saving video in a lower resolution, reducing the frame rate and increasing compression. In
Video compression algorithms
Axis’ Zipstream technology is a collection of
all these methods, information about some-
Video compression algorithms are used to
algorithms in the camera that analyses the
thing critical might be missing when really
find regions in the video that already has been
video stream in real-time. Interesting details
needed.
transferred and do not need to be sent again
and motion are preserved with the given video
in the next image frame. Another task for the
quality while the Axis-unique module can filter
Zipstream technology is a radically more
Optimised for video surveillance, Axis’
algorithm is to identify where in the video
other areas harder to optimally use the available
efficient H.264 implementation, lowering
details can be removed without reducing the
bandwidth.
bandwidth and storage requirements by an
visual quality.
average 50% or more. Axis’ Zipstream
State-of-the-art video compression methods
Axis’ Zipstream technology is not in any way a replacement for High Efficiency Video
technology adds a module inside the video
that function well together are grouped into an
Coding (HEVC)/ITU Telecommunication
compression engine of the network camera
international standard, standard, which is a video stream
Standardisation Standardisatio n Sector (ITU-T) H.265, which
92
CCTV Handbook 2016
www.securitysa.com
VIDEO COMPRESSION TECHNOLOGY
was jointly developed by ISO/IEC Moving
average bit rate by using real-time scene
on cost-efficient edge storage. However, video
Picture Experts Group (MPEG) and ITU-T Video
information. One method to estimate total
quality should be decreased in a controlled
Coding Experts Group (VCEG). Zipstream is
savings is to look at the bit rate savings from
manner, in order to easily find and understand
a video coder enhancement, which can be
each method independently and multiply the
the course of events. Zipstream reduces the
applied on many video compression standards
reduction factors.
amount of missed triggers by allowing longer
with minor adaptations adaptations..
recording recordin g segments for each motion-triggered Parameter settings
event without generating excessive data.
Configuration options
The original compression compression parameter parameter is still
Axis’ Zipstream technology adapts the com-
used when Axis’ Zipstream technology is
users that wish to reduce the cost of storage,
pressed video stream based on four factors:
enabled. This parameter controls the amount
but the primary application is in small systems
• Scene motion.
of compression applied to important forensic
using edge storage. Any business with a need
• Scene content.
details. Compression Compression is usually set to 30
for small, stand-alone, easy-to-use video sur-
• Ambient light light level.
and this value is recommended also when
veillance, veillanc e, such as startup companies or smaller
• Configuratio Configuration n options.
Zipstream is enabled.
businesses, will benefit from using Zipstream.
Configuration Configuratio n options that affect Zipstream:
Axis’ Zipstream technology is relevant for all
The bit rate controlle controllerr built into the encoder
• Compression parameter.
can be combined with Zipstream to enforce
Forensic details
• Group of Pictures Pictures (GOP) length. length.
a Maximum Bit Rate (MBR) limit. MBR is a VBR
Axis recommends using networked video with
• Frame rate.
configuration with includes an upper limit to
VBR where quality is adaptive to scene content
• Strength parameter.
protect the system from temporary bandwidth
in real-time. Using Constant Bit Rate (CBR) as
• Dynamic GOP parameter.
spikes. However, the MBR limit must be suf-
a storage reduction strategy is not recom-
ficient to capture the details of moving objects
mended, since cameras delivering CBR video
Bit rate reduction
in the scene to enable the full potential of Axis’
may have to discard important forensic details
The bit rate reduction reduction can be be derived from from
Zipstream technology and VBR.
in critical situations due to the bit rate limit.
either the dynamic Region of Interest (ROI) of
To limit the bit rate for for increased storage
Axis’ Zipstream technology makes it possible
time, cloud-connected cameras or cameras
for the system installer to continue using VBR
using edge storage should be configured with
for optimum video quality while reducing the
Dynamic ROI: The dynamic ROI optimises
the strength parameter set to 30 and dynamic
storage requirements. requirements. This way the surveil-
bandwidth in real-time by
GOP enabled. This setting is suitable to com-
lance system can keep delivering high quality
analysing where available bits will give the
bine with motion detection triggering and/or
video. Important forensic details such as faces,
maximum benefit from a forensic perspective.
MBR systems where the bit rate is allowed to
tattoos and clothing patterns are isolated and
This proce process ss is performed performed for all all image image content, content,
adapt to changes in complexity complexity.. Edge storage
preserved, while irrelevant irrelevant parts such as white
resulting in a totally flexible dynamic ROI. This
is a development in Axis network cameras and
walls, lawns and vegetation are smoothed out.
dynamic ROI automatically automatically expand, shrink, shrink ,
video encoders that enables video recording
change shape, split, merge, disappear and
directly to an on-board SD card or a Network-
Conclusion
reappear depending on content, for the benefit
attached Storage device (NAS).
Optimised for video surveillance, Axis’
Zipstream or its dynamic GOP.
of tuning the instant bandwidth.
The dynamic GOP algorithm of of Zipstream
Zipstream technology is a radically more
can be used to compress low motion
efficient H.264 implementation, lowering
image relevant information may appear,
sequences. When using dynamic GOP, the GOP
bandwidth and storage requirements by an
Zipstream prepares the system for unexpected
length will vary, which might pose a problem
average 50% or more for many common 24/7
events. This dynamic automatic ROI is much
for some VMS and other types of client soft-
surveillance use cases.
more convenient than other traditional ROI
ware. To To improve support i n existing software
implementationss where the region is set implementation
solutions that do not optimally implement
sible to use higher resolution and increase
manually.
playback of H.264 video with dynamic GOP,
forensic detail, while reducing storage cost and
either a shorter maximum GOP length could
enabling longer recordings. It enables high
be selected or dynamic GOP could be disabled.
bit rate in scenes with especially interesting interesting
Since it is unknown in which parts of the
Dynamic GOP: The dyn dynamic amic GOP red reduce ucess
the bit rate by avoiding storage consuming
Axis’ Zipstream technology makes it pos-
events in combination with low bit rate when a
I-frame updates. Typical surveillance scenes
Application Applicatio n areas
with limited motion can be compressed to an
In professional VMS systems, bit rate reduction
extremely small size without any loss of detail.
is desirable while the image quality must be
H.264-based H.264-ba sed products but there is nothing
This algorithm makes makes a real-time real-time adaption
kept for operations on critical sites around the
in the technology that prevents the solution
of the GOP length on the compressed video
world. These systems must detect even the
from migrating to H.265 encoders when that is
according accordin g to the amount of motion. All clients
smallest threat, and enable advanced forensic
technically possible.
or Video Management System (VMS) solutions
work after any incident. Axis’ Zipstream
may not support smooth playback of video
technology enables enables high security systems to
For more information contact Axis
with this algorithm enabled even though the
use continuous recordings due to the low bit
Communications, +27 (0)11 548 6780, sasha.
compressed video stream conforms to the
rate used for statics scenes.
[email protected],www.axis.com.
[email protected], www.axis.com.
H.264 standard.
scene is relatively static. Zipstream will initially be available for
When using Axis Camera Companion Companion (ACC) an even lower bit rate is desired, since
[Footer] This white paper has been shortened. For
Expected reduction rates
system cost and easy installation is a priority.
more information, go to http://ww w.axis.com/global/
Axis’ Zipstream technology reduces the
The aim is to store store video of sufficient sufficient quality
en/technologies/zipstream.
www.securitysa.com
CCTV Handbook 2016
93
PANORAMIC CAMERAS
Exploration of panoramic surveillance A Bosch Security White Paper.
Bosch compares single-lens panoramic cameras with multi-lens panoramic cameras, fixed cameras and PTZ cameras. Securing public areas with video surveillance can be challenging. Specifically, blind spots cause problems when tracking people passing through the area. Whether Whether it is an airport, a bank building or a retail outlet, there are lots of places where it is important to monitor people from the moment they enter the building and follow them as they move around. All of their movements may be crucial in terms of monitoring behaviour or forensic search. Even though today’s conventional IP cameras can deliver perfect images of what they view, they simply cannot see everything – there will always be blind spots. However, a panoramic camera can eliminate blind spots that would otherwise impact the effectivene effectiveness ss of video surveillance. But how do panoramic
Multi-lens panoramic cameras generally
Panoramic versus fixed cameras
cameras work and in what kind of applications
have three or four lenses/sensors. The camera
Panoramic cameras are used to gain full
can they be beneficial?
stitches together the separate video streams
situational awareness with a single camera.
from each sensor to form a single image.
Fixed cameras are a great complement to
Panoramicc surveillance Panorami
Single-lens panoramic cameras use an
camera systems when identification and
Following Follow ing the transition from analogue to IP
extremely wide angle lens of 180° or 360°.
details in a more restricted scene are needed
video surveillance over recent years, multi-
A multi-lens camera provides four images
on short and long distances – for instance,
megapixel (MMP) cameras are now grabbing
from 90° lenses. The images are rectangular
when monitoring a local grocery store or over-
all the attention. While the dramatic increase
in shape and are not optically distorted.
seeing an entire queuing area at an airport.
in resolution benefits any surveillance applica-
However, to create full situational awareness
However, a panoramic camera can be used to
tion, it has also spurred development development of high
the images need to be stitched together using
provide a complete overview of a certain area.
resolution panoramic cameras.
specific software.
Panoramic cameras usually come in two
A single-lens panoramic camera uses
different types: a 360° or a 180° field of view.
a fisheye lens that creates a hemispherical
Panoramic versus moving camera (PTZ)
The extraordinary extraordinary 360° field of view of these
image of the full region located below the
A PTZ camera provides identification possibilities
cameras, coupled with exceptionally high
lens. These lenses form a circular field that
on short and long distances thanks to its
resolution sensors of 12 megapixels and even
ranges 180° horizontally and 180° vertically.
optical zoom, which has a larger range than
beyond, results in detailed overview images in
Optical distortion correction technology is
the panoramic camera. PTZ cameras can display
one single view. Usually installed in a ceiling,
needed to create useful images, this is k nown
and record only one part of the scene and are
a 360° camera covers the entire area below
as dewarping.
sometimes pointing in the wrong direction
the camera, providing a full surround view
Single-lens panoramic cameras are generally
when an event occurs. This is where pan-
without any blind spots. A 180° panoramic
available in two versions: 180° and 360°. The
oramic cameras can complement PTZ cameras
camera provides full situational awareness
difference is in the size of the projected image
by monitoring and recording all events and
when installed on a wall, e.g. in corridors or
circle. With a 360° camera, the sensor captures
activities in the full area simultaneously.
reception areas.
the full hemispheric region. The circular image
This means that that operators have have full-area full-area
Panoramic cameras start to prove them-
fits the size of the sensor and has a 180° field
access to both live and recorded images. The
selves as a critical component when building a
of view horizontally and 180° vertically. With
panoramic camera monitors, analyses and
video surveillance system that needs to meet
a 180° camera, the circular image fits within
continuously records everything. What’s more,
the highest security standards as their ability
the vertical field of view of the sensor, but not
panoramic cameras can effectively pan, tilt and
to avoid blind spots enables operators to
within the horizontal field of view. The camera
zoom into a specific region without losing sight
minimise the risk of missing important
therefore has a 180° field of view horizontally,
of other regions of interest. However, a panoramic
information. There are two panoramic camera
but less than 180° vertically.
camera can zoom in only digitally and is
designs: multi-lens panoramic cameras and single-lens panoramic cameras.
94
CCTV Handbook 2016
www.securitysa.com
This paper will continue with the focus on single-lens panoramic cameras.
therefore not very suitable for identification as resolution drops due to loss of pixel density.
PANORAMIC CAMERAS
Image performance
As an example, take a 12 MP sensor with
Increasing resolutions means increasing
The image performance performance or quality quality of a
4000x3000 4000x300 0 pixels and measuring 6.20x
amounts of data and this drives bitrates up. This
panoramic camera depends on the sensor
4.65 mm. The 360° optical circle of the lens
calls for tools and technologies to help managing
and the image processing algorithms applied.
has a diameter of 4.1 mm. This would result in
video data efficiency. Innovative data compres-
When assessing image performance performance,, users
square with a resolution of 7.0 MP. So when
sion technologies such as H.265 reduce the
typically look at four areas: resolution,
selecting a panoramic camera it is important
amount of data provided by a high resolution
dynamic range, sensitivity and bitrate.
to know whether it will really provide the
camera such as a panoramic camera.
advertised resolution or whether this is just Resolution
the sensor’s resolution.
Resolution is the number of pixels that can
Intelligent Dynamic Noise Reduction (IDNR) To reduce bitrates bitrates after encoding encoding and further
be displayed. If the number of pixels on the
Dynamic range and sensitivity
minimise strain on bandwidth and storage
sensor is low, the image resolution will be low,
Besides capturing details, the sensor is also
requirements, several forms of noise reduction
and details will not be visible. Low resolution
responsible for the dynamic range and low
can be applied. ‘Intelligent ‘Intelligent Dynamic Noise
results in either pixilated or blurred images,
light sensitivity of the camera. The usability
Reduction’ (IDNR) is an innovative technology
especially in places where panoramic lens
of a panoramic image is highly dependent
that uses a combination of two noise reduction
distortion needs to be heavily corrected corrected and
on the dynamic range of the sensor (i.e. the
techniques: one that is best suited for scenes
the correction algorithms need to expand
strength of its ability to capture detail in both
with motion (spatial noise reduction) and
images. A camera containing a sensor with
bright and dark areas of the scene – the higher
another that is best suited for still scenes
more pixels will require significantly greater
dynamic range the more details the sensor
(temporal noise reduction).
computing power.
will capture in bright and dark areas). With a
In this way, IDNR reduces bitrates and
panoramic camera, there is a far greater like-
required storage capacity without affecting
as straightforward as conventional security
lihood of bright and dark areas in the field of
video quality. By combining these processes,
cameras. A panoramic camera using a 12 mega-
view. A sensor with a low dynamic range will
bitrate increases when an event occurs and
pixel (MP) sensor will not provide full 12 MP
then not be able to show details in every area
is minimised when there is no motion and
resolution. The optical circle of the lens is smaller
of the scene.
thereby lowers the total required bitrate.
therefore does not cover all active pixels. The
Bitrate
Encoder regions
effective resolution of the image is the amount
All IP networks have a limit to the traffic they
Area-based encoding (encoder regions) can
of pixels that will fit within the optical circle.
can carry, this limit is known as bandwidth.
The reso resoluti lution on of of a pan panoram oramic ic came camera ra is is not not
than the active image area of the sensor and
Continued on page 96
PANORAMIC CAMERAS
areas can be selected by the user, further lowering bitrates.
Two new panoramic cameras In 2015 Bosch Security Systems launched its first panoramic cameras, the FLEXIDOME IP panoramic 7000 MP and the FLEXIDOME IP panoramic 5000 MP. They also offer the same intelligent data minimisation for efficient Multi-lens panoramic camera versus single-lens panoramic camera.
transmission and storage and are half the size of multi-lens panoramic cameras. The FLEXIDOME FLEXIDOME IP panoramic panoramic 7000 MP MP
Continued from page 95
before sending the video data to the Video
lower bitrates even further. This feature allows
Management System, this is known as edge
uses a 12 MP sensor resulting in effectively
the image to be divided into zones of high
dewarping, or on PC via a specific Video
7 MP resolution at 30 fps The FLEXIDOME IP
importance and less compression to show
Software Development Development Kit ( VSDK), this is called
panoramic 5000 MP uses a 5 MP sensor at
more detail, and those of low importance and
client-side dewarping.
15 fps. The 360° lens on the 5 MP sensor results
therefore high compression and less detail. For
Edge dewarping has some advantages over
in a 3.2 MP effective resolution. Both models
example, if the top of the image is always
client-side dewarping:
include built-in Intelligent Dynamic Noise
looking at the sky, this area can be marked
• Edge dewarping makes the camera’s integra-
Reduction (IDNR), which reduces bitrates by up
for high compression. By selecting important,
tion into a system easier. Most panoramic
to 50% at the source. This significantly reduces
unimportant and normal regions in a
cameras require a specific VSDK for dewarping,
storage costs and network strain without
scene, and adapting the compression ratios
which makes integration into VMS challeng-
compromising video quality.
accordingly, a lower average bitrate can be
ing. The VMS will need to support the VSDK,
achieved.
which can result in poor or no integration
includes Content Based Imaging Technology
with third-party software. This can, in turn,
(CBIT), which ensures the highest quality of
Dewarping for distortion-free viewing and recording
limit the wide implementation and use of
relevantt images by tailoring the captured relevan
panoramic cameras. Edge dewarping allows
images to the content of the scene. The
The fisheye lens of a panoramic panoramic camera camera
the user to see a corrected image directly
FLEXIDOME IP panoramic 7000 MP also features
produces optically distorted images that are
from the camera without the need of any
CBIT in which Intelligent Auto Exposure
circular in shape. Image correction technology
special integration.
automatically automatica lly adjusts the exposure settings
The FLEXIDOME FLEXIDOME IP panoramic panoramic 5000 MP MP
• Edge dewarping dewarping sends undistorted virtual virtual
of the camera when the lighting conditions
image without distortion, this is known as
camera images to the VMS. If the camera
change. The camera also comes with Bosch’s
dewarping. The dewarping algorithm remaps
architecture allows it, the camera can create
VCA, Intelligent Video Analysis (IVA), so you
the pixels in the scene to optimise the image
multiple virtual cameras, and edge dewarping
are alerted when needed and can trace back
and remove distortion. The algorithm can offer
will help send undistorted virtual camera
important events from hours of video in
various dewarped view mode options such as
streams to the VMS. Access rights to the
seconds. You can choose between a 180° lens
panorama, double panorama and surround.
virtual cameras can then be managed by
with effectively 8 MP resolution or a 360° lens
Dewarping can in some cases provide
the VMS and so providing different video
with effectively 7 MP resolution.
is needed to create an optimised and useful
real-time views across multiple streams. The
streams to different users.
They both offer offer edge and client-side dewarping to correct image distortion.
various video viewing modes allow the user
• Lower costs. costs. Dewarping on the client-side client-side
to control the 180° or 360° images and guarantee
requires a lot of computing power. Edge
distortion-free video. It is also possible to
dewarping is done by the camera rather than
For more information contact Bosch Security
define customised Regions of Interests (ROI) by
using the computer’s CPU, which significantly
Systems - South Africa & sub-Saharan Africa,
adding presets. This way, dewarping can also
reduces the processing power needed on
+27 (0)11 651 9600, 9600 ,
[email protected],
help to make video data more manageable.
a PC.
africa.boschsecurity.com
• Lower bitrates. bitrates. Edge dewarping enables enables the
Edge versus client-side dewarping
user to monitor only those areas that are
[footer] This white paper has been shortened.
Dewarping video images can be done either
relevant for the user when there is no need
The full article can be downloaded at
by dewarping algorithm on the camera
to monitor the entire image circle. Relevant
africa.boschsecurity.com
360° surround view vs. conventional fixed camera view
96
CCTV Handbook 2016
www.securitysa.com
360° full image circle / Double panoramic view
CASE STUDY
4K in your trolley 4K surveillance – the future of video security in shopping centres is here. Eden Shopping Centre, a large retail and
and panic buttons can also be programmed to
entertainment complex in High Wycombe,
alert the control staff of any issues.
Buckinghamshire, UK, has taken the giant leap
Mitchinson comments: “People counting
from an analogue to a HD video surveillance
software upgrades can also be integrated
system.
alongside ANPR, facial recognition and
system has improved tremendously. Every
many more analytic packages. This flexibility
critical square metre is now covered.”
Ryan Mitchinson, head of commercial operations at installer Link CCTV advises: “When
coupled with the ongoing software upgrade
we originally inherited Eden Shopping Centre’s
package that FLIR provide allows Eden
Shopping Centre, agrees that the upgraded
CCTV system, we were tasked with providing
Shopping Centre to always have the latest
system has had a considerable influence on
a solution to upgrade the existing analogue
technology in use when required.”
the centre: “We are very proud to have such
platform with a HD solution that was not only
Ray Walker, centre manager at Eden
an innovative and impressive surveillance
capable of capturing and controlling CCTV
Better images, better evidence
system here at Eden. From the beginning we
cameras, but also of a multitude of modern
Prior to their system upgrade, the Eden
were excited with the image quality and our
functionalities that would enhance the security
Shopping Centre was confronted with insuf-
local police force has found the improvements
operation on site. We opted to install a FLIR
ficient image quality from the surveillance
invaluable, often requesting to share video
Latitude virtual matrix and recording solution.
cameras. In addition, the limited resolution of
evidence.”
“Security technology is constantly devel-
the obsolete camera technology resulted in
All camera video feeds terminate in the
oping, so from the centre’s perspective it was
the fact that not all critical areas were com-
centre’s control room, which is manned 24/7.
imperative to develop a future-proof system,
pletely covered.
Maddox comments, “moving from an ana-
preventing the need for expensive replace-
One of the new technologies that
logue system to a digital system has had a
ments down the line,” says Paul Maddox,
Link CCTV Systems brought into the Eden
positive reaction from the controlle controllers rs using
security manager at Eden.
Shopping Centre was the FLIR Quasar 4K (Ultra
the equipment and also a very positive line of
HD) mini-dome camera. The Quasar camera
feedback from the local police that come to
towards bodycams, FLIR created Truwitness
has provided the centre with broadcast qual-
view footage for various reasons. The easy-
software that allows remote guards to stream
ity video and multi-streaming at zero frame
to-use client software has allowed the centre
video directly to the control rooms monitor
drops. Mitchinson confirms this improvem improvement, ent,
to easily hand over high-quality evidence to
wall from anywhere within the centre using
stating that “the Quasar 4K cameras have
the police force in just a few clicks, which is
their smart device. This is a two-way commu-
not only significantly improved the overall
exceptional.”
nication which also allows the control room
image quality; thanks to their high resolution,
staff to transmit video streams to playback on
they also cover twice as much floor space
For more information contact FLIR Systems,
their smart device. The software can also track
in comparison to the previous systems, so
+44 780 151 4810 , theresa.turner@flir.uk.com,
staff members, display their location on a map
the evidentiary use of the video surveillance
www.flir.com.
As security within shopping centres turns
www.securitysa.com
CCTV Handbook 2016
97
CASE STUDY
Four cameras watch 7000 cars Panomera cameras offer airport an impressive surveillance system. It is frustrating, at the end of a tiring day of travelling to finally get to your car in the airport car park, only to discover that someone has vandalised or even broken into your vehicle. In one fell swoop, all memories of a successful business trip or a relaxing holiday are swept away in the flood of insurance questions, making arrangements for repairs and filing a police report. Fortunately,, at Billund airport the chances that Fortunately travellers will experience such unpleasantness are practically zero. The The main reason for this is effective surveillance of the parking areas. “Before “Before we took over as operators of the parking areas in 1997, patrons were filing over 500 reports per year.These days, it is just a few isolated incidents – in fact, in 2014 not a single report was filed regarding a car being broken into while it was parked here,” declares Thomas Holm, technical director for APCOA Parkering, the company that now runs the parking areas at the airport. The company, company, formerly formerly called called Europark, raised the level of security significantly by introducing enclosures, security guards, barrier systems and systematic video surveillance. In cooperation with Dallmeier and its Danish partner, Fredericia-based Scanview A/S, which
Substantial savings
turned out to be a false alarm), and both said
has been working with APCOA Parkering Parkering on
“In our case, all we needed to cover a vast
how impressed they were with the quality of
video surveillance since 2002, a new era was
expanse for almost 7000 parking spaces was
the surveillance surveillance..
begun last year.
one mast with four Panomera cameras trained in different directions. According to our calcula-
Integration with other cameras
figuration of the parking areas, we wanted to
tions, with a conventional solution we would
Of course, the new cameras can be used in
set up a surveillance capability capability for zones P6,
have needed a total of seven masts and about
conjunction with existing Dallmeier products.
P7, P8 and P9. After thorough deliberations,
30 cameras. So it goes without saying that we
“We still have a large number of older cameras
and having taken advice from Scanview, we
have realised substantial savings with regard to
in operation, the oldest date back to 2002.
decided to go with the Panome Panomera ra system from
excavation and embedding work, cable laying,
We have cameras at every barrier installation,
Dallmeier. And we have not regretted it,” says
camera maintenance and so on,” Holm continues.
for example, in case someone forgets to pay,
This also represents represents a great great improvement improvement
and at the ticket dispensing machines in case
“As part of a major expansion and recon-
Holm. The Panomera Panomera cameras cameras enable surveillance surveillance of very large expanses. All cameras are fitted with several lenses (the models used at Bi llund
for the watchman sitting in the APCOA control
anyone needs help. And we also have more
room in one of the car park buildings.
than 1200 spaces inside the car park buildings,
“We can track a vehicle or an individual
and these have to be watched too,” says Holm. In yet another innovation, APCOA has
have 14), each of which covers a section of
without having to change cameras, and we
the area of interest. These ‘picture squares’
can zoom in on an incident without losing the
installed a Panomera that takes in the front-
are joined together seamlessly by software
general view of things that are happening else-
age of the entire garage complex opposite the
to form one large picture that can be viewed
where. With the conventional, controllable cam-
terminal building. “We “We would have had to set
comfortably by the watchman in the control
eras, there was always the risk that we would
up four cameras at different locations to do the
room.
be concentrating on one location and would
same job as this one Panomera. Consequently,
have no pictures when something happened
installation and setup were much simpler here
the entire coverage area, taken at a rate of 25
somewhere else. Now, we always have pictures
too; we only have to watch one picture, which
pictures per second. Up to about 175 metres,
of the entire area, which is a major advantage –
also happens to be of much better quality.”
the image is so sharp that, for example, a
this makes us much less vulnerable.”
The system delivers delivers detailed detailed images of
car number plate can be read with ease. This
The pol police ice hav have e alre already ady use used d vide video o mate materia riall
For more information contact Dallmeier
means that one multifocal sensor system
from APCOA several times, and in one case
Southern Africa Office, +27 (0)11 510 0505,
Panomera camera can replace several
even the staff of Billund airport looked at
[email protected],
conventional HD cameras.
material relating one incident (although this
www.dallmeier.com.
98
CCTV Handbook 2016
www.securitysa.com
CASE STUDY
Long-term upgrade to AHD AHD technology allows for the integration of older analogue technology and the newer IP cameras into an AHD solution. Alt-AV,, a company that handles audio visual and Alt-AV
from three DVR/NVRs to two, saving space
CCTV installations for a range of industries, was
and organising the cameras more suitably.
recently called in to upgrade an old analogue
Opting for AHD technology also allowed the
installation to Analogue High Definition (AHD).
client to upgrade their image quality without
Alt AV’s Lawrence Hill explains that the
having to re-cable their whole premises. The
client had an older analogue system consisting
ProvisionISR equipment equipment used was supplied by
of 40 cameras, but the DVR capacity was only
HiTek Security.
for 32 channels. They also had a generic NVR servicing five IP cameras. The solution previously installed installed had served served
A hybrid AHD system would allow the client to amalgamate existing and new equipment into one system. The ProvisionISR
a purpose when it was first installed, however,
hardware is ideal for this as it supports both
as time progressed progressed,, the client realised the value
the older, unbranded analogue cameras
of high quality images and began installing IP
that were not going to be upgraded in the
cameras at key areas. The result was a mish-
first phase, and the new Provision AHD Pro
mash of products and technologies that the
cameras, the new Provision IP cameras and
client could not manage effectively.
also the older ONVIF compatible IP cameras
The biggest biggest proble problem m with the the job, job, according according
already in use. This also allowed the client to
to Hill, was that we were upgrading a previously
free up desk space by removing one DVR and
(and rather badly) installed system with no
one monitor, which they were happy about.
record of cable scheduling or labelling, meaning
A future phase planned is where both
that it was very time consuming to first establish
the remaining monitors will be put through
a suitable starting point for the upgrades.
a video matrix to display side by side on one
footage in the key areas of the business
large wall-mounted TV screen, which will
(till points, goods receiving areas, car parks,
tion involved tracing cables from point to point,
further free up desk space. The The aim of the
etc.).
repairing any faults found along the lines, put-
upgrades is to give the client a number of
ting us in a position to begin the upgrades from
new, higher resolution cameras in key areas
upgrade the old analogue cameras to new AHD
a suitable base,” says Hill. “This involved a lot of
with an easy plan to upgrade further cameras
cameras using the existing cabling in the most
wasted time that could have been avoided if the
as and when the budget allows.
part, until the project is complete,” says Hill.
“This meant that a large part of the installa-
job had had been been done right the the first time time around around..”
“The future phases will allow us to easily
“The client will then have a full HD system com-
Planning
prising of 32 AHD cameras and a planned 8 IP
as the job progressed, including cables badly
Detailed planning involving AutoCAD wiring
cameras (although they are currently planning
terminated, in some cases not terminated but
diagrams for both the new hybrid DVRs as well
more), split across 2 Provision 16 channel AHD
sellotaped to the connector, and multiple CAT5
as the system as a whole meant that when the
Hybrid DVRs and viewed on one large screen.”
cables terminated into single RJ45 connectors
team went in to start the re-cabling process
to assumedly try to save on Balun costs. Poor
there was a clear blue print for what needed
with the Provision product line from HiTek, I
cable running meant that some cables had
to be achieved achieved.. A full equipment register
knew that the products I had chosen could be
become caught in roller doors and the cable
was compiled, which involved calculating
relied on to deliver as expected. It is also very
was unusable, while some cables were glued
power requirements requirements for running both the old
useful that all the DVRs are ONVIF compatible,
under roof tiles, meaning they could not be
and new equipment combined and forward
meaning they immediately recognised and
accessed to repair. The result being that all
planning for changes as the equipment was
displayed the existing IP cameras.”
these cables needed to be replaced.
upgraded.
Additionally, the team found other problems
An equipment specification was agreed upon
A review of the storage facility was also
Hill concludes, “Having a lot of experience
For more information, contact:
with the client and then a timeline put in place, as
done to ensure there would be sufficient hard
Alt-AV, +27 (0)60 494 7296,
the upgrade process will continue over a longer
disk space to allow for satisfactory footage
[email protected].
time to allow the client to budget appropriately.
retention taking into account the new, larger
HiTek Security Distributors, +27 (0)21 946 3344,
This mea meant nt that that going going forw forward ard the infr infrastr astructu ucture re
file sizes of the HD footage.
[email protected],www.hiteksecurity.net.
[email protected], www.hiteksecurity.net.
for all future works could be laid at the beginning,
The first phase of of the installation delivered
and new equipment fitted quickly and without
the benefit of combining the old and new
unplanned issues as the project progresses.
technology to provide a more user-friendly CCTV system which was easier to control,
Hybrid solution
view and review. It also gave the client new
Using the ProvisionISR hybrid AHD DVR meant
high-definition images using the ProvisionISR
that Alt-AV could reduce the client’s system
Pro AHD range, delivering full 1080p HD
Key facts • System Design: Lawrence Hill, Alt-AV. • CCTV equipment: equipment: ProvisionI ProvisionISR SR (provided (provided by HiTek Security). • Installation In stallation and commissi commissioning: oning: Alt-AV.
www.securitysa.com
CCTV Handbook 2016
99
CASE STUDY
Protecting history at Petra VIVOTEK protects one of the Wonders of the World, World, the ancient city of Petra. An ancient historical and archaeol archaeological ogical city in
Luminus Technology, Jordan, was brought in
broader picture and finer details. To protect
southern Jordan, Petra is famous for its rock-
to investigate how such a system could be
the SD8364E against Petra’s desert like condi-
cut architecture and complex water manage-
established. Under the leadership of manag-
tions and any incidents of attempted vandal-
ment system. Established as early as 312 BC,
ing director Hamzeh Labadi, Luminus set
ism, IP67- and NEMA 4X-rated housing guards
its residents’ advanced ability to control flash
about looking for sur veillance systems that
the camera body against even the harshest
floods with an array of dams, cisterns and
were powerful enough to provide protection
environmental hazards and allows for a wide
water conduits led to a city that thrived at
across the great site, durable enough to with-
operating temperature range of between
the centre of a trading network connecting
stand the elements, and discrete enough to
-40°C to 55°C. Boasting WDR Pro technology,
Petra with Gaza in the west, with Bosra and
blend into the beautiful ancient city of Petra.
the SD8364E can also cope with challenging
Damascus in the north, with Aqaba on the Red
lighting conditions, an especially useful fea-
Blending coverage with durability
ture when operating in the highly contrasting
Luminus Technology was searching for a
network of narrow valleys and caverns that is
of the World, and as a UNESCO World Heritage
surveillance system that offered advanced
the ancient city of Petra.
Site, Petra has thrived again as a tourist desti-
surveillance,, reliability and discreteness surveillance discreteness..
nation described by Smithsonian magazine as
VIVOTEK’s wide range of multi-purpose and
FE8180 Fisheye Network Camera. The FE8180,
one of the “28 Places to See Before You Die.”
specialist IP cameras, combined with its
the world’s smallest fisheye camera with a
advanced network video recorders (NVR)
diameter of only 90 mm, and able to blend
2300-year-old city is under threat
and self-developed network video manage-
into the surroundings of even majestic sites
Despite its ability to withstand more than two
ment software, VAST, offered it a way to bring
such as Petra, can nonetheless cover broad
millennia of floods, earthquakes and invasions,
technological advancement back Petra’s
spaces in detail, acting as an invisible, but
Petra is now more under threat than ever
natural environment environment for the first time since the
powerful eye to keep watch over Petra. A
before. This beautiful historical city, known
ancient city thrived two millennia ago.
single FE8180 can easily do the job of three to
Sea, and across to the Persian Gulf. Today, To day, as as one of the New Seven Wonders Wonders
as the Rose City for the alluring colour of the
550 VIVOTEK IP network cameras were
Complementing Compleme nting the SD8364E is the
four standard CCTV cameras.
stone from which it is carved, is now visited by
installed strategically around Petra’s majestic
such a large number of tourists that its ancient
ancient structures and natural valleys. Key
ND8422P and ND8322P NVRs and VIVOTEK’s
structures and rock-cut architecture are in
among these were the SD8364E for its ability
VAST video management software. These
danger of being damaged – a threat both to
to provide broad coverage at high resolutions
NVRs and VAST enabled the team monitoring
the cultural heritage of the region, and to the
while withstanding extreme environments
and protecting Petra to seamlessly operate
tourism and economy of the state of Jordan.
and the FE8180 for its high performance wide-
and maintain the fleet of cameras. Like the
angle views and low-profile design.
advanced water management system of Petra,
Acting against these threats, the Petra National Trust was founded in 1989, and has
To provide the most complete and
Uniting both types of cameras were the
surveillance imagery would now flow harmo-
worked together with international organisa-
highest-resolution coverage of Petra’s unique
niously around the great Rose City, protecting
tions to protect this valuable site. Recently,
ancient cityscape, Luminus specially selected
and serving its natural beauty for generations.
it was decided that the entire site must be
VIVOTEK’s SD8364E Speed Dome Network
monitored in a way that ensured the protec-
Camera. The SD8364E’s 1080p Full HD resolution
For more information contact VIVOTEK,
tion of the ancient city, while blending in with
and 30x optical zoom lens empowers those
+886 282 455 282,
[email protected],
the natural beauty of the surroundings.
who keep watch over Petra to see both a
www.vivotek.com.
100
CCTV Handbook 2016
www.securitysa.com
CASE STUDY
Luxury virtual service Camsecure and Axis customise a solution for Jaguar Land Rover Rover.. Jaguar Land Rover (JLR) approached Axis Gold
eye’. The M1034-W was identified as the most
Partner Camsecure to find a cost-effective
suitable based on the fact that it features all the
solution to solve high-level technical concerns
elements to custom-make a unique solution for
remotely. The headquarters’ technical team
JLR. The small, smart and wireless HDTV camera
devoted a significant amount of time out of
includes a white LED to illuminate the focus
office travelling travellin g to any one of the 44 dealerships dealer ships
point. It also offers two-way audio communica-
across SA and sub-Saharan Africa, identifying
tion with integrated microphone and speaker,
atypical challenges onsite.
allowing remote listening in on an area, as well
JLR commissioned Camsecure to provide an innovative solution to increase its technical team’s ability to offer the same level of assistance from a
as communication with individuals directly or using recorded audio clips. The lightweight camera camera was attached attached to a
central office, while improving the t he customer’s expe-
headband to free up technician’s hands, and
rience by expediting the service turnaround time.
has a stand and clamp for mounting too. It also
Only four technical engineers at the JLR African headquarters are on hand to support
boasts easy to use functionality functionality.. This Axis Axis network network camera camera kit kit is the first of its
the dealerships across the continent; that’s
kind in the automotive industry and its success
technical services manager, Jaguar Land Rover
36 in South Africa and eight in sub-Sahara.
could see it rolling out to other geographically
South Africa and sub-Sahara Africa
Typically Typical ly dealer technicians technicians call call on the headhead-
challenged regions. This device cancels out
quarter team to assist with complex service
any dealer guesswork when facing rare/unique
meets the brief and is already improving improving
problems on vehicles, however in some
complications, while having an expert observe
efficiencies, reuniting reuni ting customers customer s with their
instances they need detailed support, making
the problem area means that cars are repaired
vehicles a lot quicker. Plus, there’s potential to
it diffi cult to explain explai n and resolve without wit hout
quicker. Furthermore, the fast turnaround time
streamline the operating solution and further
seeing the problem area in live view.
positively impacts on customer experience, plus
develop its capabilities.
In that case, the technician then travels through to the dealer, which could result in
time and travel costs will decrease significantly. “The creative customisation of this simple
Although the device is fairly rudimentary it
Given that this is a first in the automotive industry, Coxley firmly believes that this innovative
extended periods of time out of office especially
Axis network camera has helped Jaguar Land
design affords the brand a competitive edge that
when it’s located outside of SA. This, in turn, not
Rover South Africa and sub-Sahara Africa
has potential to go beyond the African borders
only leads to a backlog in the workload, but also
reprioritise customer service, improve the
and rollout to similarly geographically challenged challenged
a delayed turnaround time for customers.
experience with our brand and better manage
regions.
Camsecure partnered with Axis to develop
our operating operati ng efficiencies and an d resources. And,
a unique and affordable solution. The col-
as a first in the industry, this unique device has
For more information contact Axis
laboration led to the customisation of the AXIS
given us the competitive advantage to further
Communications, +27 (0)11 548 6780,
M1034-W Network Camera to serve as a ‘third
differentiate our offering,” says Steve Coxley,
[email protected],www.axis.co
[email protected], www.axis.com. m.
CASE STUDY
Indian Railway opts for Mirasys Indian Railway has over 4000 VMS and 1400 VCA channels in use. When thinking of updating gradually the
In addition to the RDSO Technical
According to Tata Nelco, Mirasys’ other
security systems in different zones, the biggest
Specification, Mumbai’s Central Railway
strong points are:
concern of Indian Railway was the platform
Station set more demands for the project
• The general user user interface of the Mirasys
security. It wanted to have measures to tighten
because of the Heritage station building. It
system is very easy to use ( The Railway Police Police
security, improve the crowd management,
had for example the followed special feature
Force point of view).
apply central monitoring and identify persons
requirements:
and activities. It needed to have an integrated
• The software shall support support audio analytics to
security and surveillance system in every zone
provide alarm with pop up of live video and
• Mirasys’ open platform and easy integra-
and an intelligent system, overall.
audio stream in the control room on sound
tion handling meet the needs of many
of breaking glass or gunshot.
integrations.
An independent body RDSO (Research, Design & Standards Organisation) acts as the
• Identify and locate various various resources like
• The solution is flexible – Mirasys Mirasys is willing to customise according to the client needs.
So far, the Mirasys Solution is in four major
Product Approving Authority. They formed the
cameras, specialised units and sensors
zones out of eight which Indian Railway has
technical specifications which included several
around the station areas on 2D / 3D GIS map.
procured until now. On Pan-India level, Mirasys
items like:
All the mobile points and vehicles which
has helped to procure 29 main junction sta-
• The software shall be an open architecture
have GPS capabilities should be displayed
tions out of 75. Over 4000 VMS and 1400 VCA
on the GIS map as a layer.
channels are in use now and the number is
based solution, highly scalable enterprise level software with end user friendly (unrestricted) licensing policy.
• Incidents management, management, including prelimiprelimi-
increasing. RPF and railway authority use the
nary planning and plan activation to better
Mirasys system for day-to-day monitoring. The
respond to any event and identify all the
solution also includes centralised command
nised playback of different cameras together
needed activities required to resolve the
and control rooms for monitoring and running
in the same video pane. This should enable enable
incident.
the operations. The use of advanced analytics
• The software should allow allow time-synchro-
the operator to watch playback of an event
“As the Mirasys team has shown dedicated
helps to reduce criminal incidents. Mirasys’
from different angles as the event happens in
field support and readiness to customise solu-
automated intelligent intelligent solution has acted as a
an area covered by multiple cameras.
tions for Tata Nelco’s customers already when
deterrent and has already proved to be useful
• Integration with other other security equipment equipment
delivering video management solutions to
for the railway authorities.
like X-ray baggage scanner, under vehicle
Southern, South Central, North Western and
scanner etc.
Central Railway Zones, we want to continue
For more information contact Security &
to work with Mirasys in large scale com-
Communication Warehouse, +27 (0)12 653
object detection, overcrowding and camera
mand and control solutions,” says Nelco’s top
1005,
[email protected],
tampering.
management.
www.securitywarehouse.co.za.
• Video analytics analytics like intrusion detection, left left
102
CCTV Handbook 2016
www.securitysa.com
CASE STUDY
Suburb gets ANPR Northern Gauteng suburb improves security with ANPR from Hikvision. Chubb Fire & Security, local system integrators
reporting and notification of vehicles entering
and remote monitoring service’s provider was
the suburb that have been flagged by shared
tasked with securing a residential suburb with
databases, or the control room operators.
a manned control room, as well as offsite moni-
Even if a vehicle was blacklisted, registration
toring. Using strategicall strategicallyy placed cameras, the
number filtering would be a slow and labour-
company was able to monitor vehicles entering
intensive exercise.
and exiting the suburb. However, the challenge was to do more than monitor vehicles.
Given the existing technology on the si te, the Hikvision entrance management system
Regal Distributors SA’s Quintin van den
with the ANPR ( automatic number plate rec-
Berg explains that the existing Hikvision 9600
ognition) technology was the obvious choice,
series NVR (Network video recorder) solution
offering advanced management features
along with 1.3 and 3 MP varifocal infrared
such as: Auto comparison, Blacklist filtering,
bullet cameras offered exceptional image qual-
Alarm triggering, Result query, Result export
ity both during day, and at night time, which
of picture/record, Remote configuration ANPR,
made identification of vehicles and pedestrians
Linkage action.
in the suburb a reality. Similarly, Similarly, the 9600 series
Quintin van den Berg.
The parties decided decided to opt for for the Hikvison
NVR along with IVM-4200 VMS VMS software offered
DS-2CD4A86FWD-IZS 2.8 – 12 mm motorised
says the company is constantly measuring the
great ease of use in the site’s control centre.
zoom ANPR cameras, again supplied by
progress, as the system expands. In addition,
However, there was initially no way of notifying
Regal Distributors. The cameras were put to
with the remote configuration ANPR function,
the control centre when a blacklisted vehicle
the test in a proof of concept project, after
Regal can remotely assist with software and
entered the area, or to do a search for a specific
which it was decided that the existing head-
firmware upgrades and monitor the perfor-
vehicle via the number plate.
end equipment would be used, by upgrad-
mance of the solution.
Chubb and Regal addressed the problem,
ing the firmware and field cameras to the
The result result is a fully functioning functioning ANPR
with the goal of improving the quality of
DS-2CD4A86FWD-IZS ANPR cameras and
system communicating wirelessly to the
service and security using innovative tech-
calibrating the system to function at optimum
control room in a well-known suburb in the
nology. Specifically, they wanted to achieve
performance.
northern part of Gauteng.
an accuracy rate of above 90% in capturing
Regal has been involved in this project
vehicle licence plate numbers for notifications,
with the systems i ntegrator since inception
For more information contact Regal
real-time reporting and data mining.
and therefore has a vested interest in ensuring
Distributors, +27 (0)11 553 3300, info@
the systems work, as required. Van Van den Berg
regalsecurity.co.za , www.regalsecurity.co.za.
“Our biggest challenges were real-time
Wild connectivity on safari Radwin’ss Wireless Mobility Network deployed Radwin’ dep loyed in an American safari park. Radwin’s mobility solutions have been selected
consultants who can give us their expert advice.
by The Wilds Safari Park & Conservation Centre
We’ve also managed to enhance the visitors’
in Cumberland, Ohio, USA, home to rare and
experience; now that there’s high-speed
endangered species from around the globe.
connectivity on the open tour buses, visitors can
The Wilds Wilds required a mobility solution solution to be
share their experiences in real-time and post
deployed across the 9 000-acre safari park to
updates on their social media accounts.”
provide wireless connectivity to its operational
Kyle Quillen, CTO, Agile Networks said,
vehicles and tour buses.
“With Radwin we were able to establish a
The Wil Wilds ds selec selected ted Radw Radwin in Point Point-to-to-Po Point int D+ D+
robust wireless network providing 150 Mbps
radios and Radwin FiberinMotion as best meet-
the offices. If staff treating animals in the field
capacity to cover such a wide area. Radwin’s
ing their specific requirements for broadband
wanted to consult with offsite experts, they
FiberinMotion mobility solution essentially
connectivity within the game park, which was
would have to take a picture, download the
light-ups an entire area with connectivity for
integrated by Radwin partner, Agile Networks.
picture, make it smaller, email it and then wait
mobile and Wi-Fi devices as well as mobile
for something to come back. An ineffective,
payment systems – and really enhances a lot of
time-consuming process.
the different operations at The Wilds.”
Dr Jan Ramer, director of Conservation Medicine, The Wilds said, “There was almost non-existent coverage in the park before we
Following the launch of the Radwin-based
deployed Radwin, so we had to rely on two-way
wireless mobility network we can send real-time
For more information contact Radwin,
radios and a plodding Internet connection in
video of the animals in the field to off-site
+27 (0)74 114 2805,
[email protected].
www.securitysa.com
CCTV Handbook 2016
103
COMPANY LISTINGS
Directory of CCTV product, solution and service providers
4C Technology
ANV Holdings
Installer/System integrator
Distributor/supplier
4C Technology is an ‘electronic security technology integration’ company wholly dedicated to the security needs of medium to large enterprises. It designs, supplies, installs and maintains electronic security systems for customers on a capital and rental basis with contracted service level agreements in place for maintaining systems.
ANV Holdings is a premier supplier supplier of IP and analogue analogue CCTV solutions, in addition to licence plate recognition and video analytics. Infrastructure design and planning, accompanied accompanied by professional project management, ensure customer satisfaction and system stability.
14 High Street, Modderfontein Tel:l: 0861 42 Te 42 8324
[email protected] www.4c-technology.com Contact: Paul Frewen
16 Hudson Avenue, Edenvale, Johannesburg Tel: 0861 000 Tel: 000 228
[email protected] www.anvholdings.co.za Contact: Bradley Cabral Branches: Johannesburg, Cape Town, KZN
ADI Global Distribution
Axis Communications SA
Distributor/supplier
Manufacturer
ADI Global Distribution’s portfolio offers an unparalleled product choice for intrusion, fire, CCTV, networking solutions, access control, building management, as well as a comprehensive complementary complementary range of accessories.
Axis is a market leader in network video, having invented the world’s first network camera back in 1996 and continued to innovate in video surveillance ever since, increasing the security of millions of people worldwide and helping to meet the growing need for a smarter, safer world.
5 Platinum Drive, Longmeadow Business Estate, Modderfontein, Johannesburg Tel:l: +27 (0)11 574 2500 Te 2500
[email protected] www.adiglobal.com Contact: Sales Branches: Johannesburg, Pretoria, Cape Town, Durban, Port Elizabeth, East London, George
Microsoft Office Park, 3012 William Nicol Drive, Bryanston, Johannesburg Tel:l: +27 (0)11 548 6780 Te 6780
[email protected] www.axis.com/za/en/industries-a www.axis.co m/za/en/industries-and-applica nd-applications tions Contact: Vanessa Tyne Branches: Cape Town, Durban Distributors: ADI Global Distribution, Pinnsec, Duxbury Networking, Interdist Alliances
Anco Technologies Bitz Technologies Installer/System integrator Installer/System integrator CCTV system specialists for industrial, commercial and medical environments. The company supplies, installs and maintains systems for CCTV cameras and video surveillance, CCTV Internet and mobile configuration, IP surveillance, digital video recorders and network video recorders. 140A Kelvin Drive, Morningside Manor, Sandton, Gauteng Tel: +27 (0)11 064 1624 Tel: 1624
[email protected] Contact: Anthony Mansour
104
CCTV Handbook 2016
www.securitysa.com
The core offering of Bitz Te Technologies chnologies encomencompasses CCTV installations, design and building of control rooms, system integration, offsite monitoring, and analogue and IP installations. 1095 Ben Swart Street, Villieria, Pretoria, Gauteng Tel: +27 (0)12 333 3749 Tel: 3749
[email protected] www.bitz.co.za Contact: Andre Meintjes Branches: Cape Town, Polokwane, Nelspruit
COMPANY LISTINGS
Bosch Security Systems
Canon
Manufacturer
Manufacturer
Bosch Security Systems is a leading global supplier of security, safety and communications products and systems. Its focus is developing developin g intelligent IP video solutions that deliver the highest quality images, achieve the most efficient bitrate, leading to lower storage requirements and capturing the full potential of the Internet of Things.
Canon’s range of innovative security cameras are designed to deliver robust, high-end video surveillance and exceptional image quality in all light conditions. Investing heavily in R&D and harnessing over 70 years’ experience as a high-quality lens manufacturer, Canon continues to deliver new and technologically advanced products.
Robert Bosch, 96 Fifteenth Road, Randjiespark, Midrand, Gauteng Tel:l: +27 (0)11 651 9600 Te 9600
[email protected] jason.mcgre
[email protected] om www.boschsecurity.com/hdsecurity Contact: Jason McGregor Branches: Nine sales offices throughout Africa and the Indian Ocean Islands. Distributors: Kindly contact Bosch Security Systems on +27 (0)11 651 9600 or security.syste
[email protected] [email protected] om fo forr a list of accredited distributors/re-sellers
BT-SA Installer/System integrator BT-SA’s offering spans standard PIN-code up to state-of-the-art IP-based systems. The company provides access control hardware; hardware; HD CCTV technology with video content analytics; building protection via thermal, ultrasonic, microwave, microwave, photo-electric, gas and vibration sensors, control panels, keypads and alerting; as well as perimeter security. Corporate Park South, 59 Lechwe Street, Midrand, Gauteng Tel: +27 (0)11 314 0601 Tel: 0601
[email protected] www.bt-sa.co.za Contact: Wouter Frylinck Branches: Cape Town, East London, Rustenburg, Witbank
C3 Shared Services Installer/System integrator C3 Shared Services specialises in the design and implementation of intelligent video, fire and perimeter security solutions. Unit 16 & 17, Hambleton Park, 98 Richards Drive, Midrand, Gauteng Tel: +27 (0)11 312 2041 Tel: 2041
[email protected] www.c3ss.com Branches: Gauteng
Camsecure
22 Karee Street, 1st floor, Block C, Southdowns Office Park, Centurion, Gauteng Tel: +27 (0)1 Tel: (0)12 2 675 675 4900 4900
[email protected] www.canon.co.za Contact: Braam Steyn Distributors: Security & Communication Warehouse
Card Control Systems Installer/System Installer/Sy stem integrator Card Control Systems has years of experience providing security to many organisations and knows what works well and what does not. Installing a camera is easy – making sure it secures your business requires experts. You can rely on the company’s expert technology and advice to find the service you need. 11 Helston Street, New Redruth, Alberton Tel: +27 (0)1 Tel: (0)11 1 907 907 3192 3192
[email protected] www.cardcontrolsystems.co.za Contact: Sakkie Coetzee Branches: Johannesburg, Pretoria
Cathexis Africa Manufacturer Distributor/supplier CathexisVision is a powerful IP Video Management Software suite that provides an extensive range of sophisticated surveillance options, tools and functionality to satisfy all security and infrastructure management requirements across a broad range of market sectors. 259 Montpelier Road, Morningside, Durban, KZN Tel: +27 (0)3 Tel: (0)31 1 240 240 0800 0800
[email protected] www.cathexisvideo.com Contact: Ross Joughin Branches: Durban, Centurion Distributors: Elvey, Compass Resellers: RRESS, Protea Coin, SCS Africa, SVS, Netwize, Enforce, DCS
ComNet Manufacturer
Installer/System integrator Camsecure is a world class integrator of network based surveillance cameras, access control and event driven systems. The company specialises in connecting devices and systems, and offers integration and software development aimed at getting greater value from a security system. 65 Conrad Drive, Blairgowrie, Johannesburg Tel:l: +27 (0)11 781 1341 Te 1341
[email protected] www.camsecure.co.za Contact: Francois Malan
PoE, PoE+/++, Fast Ethernet, Gigabit Ethernet, DIN rail, rackmount switch, legacy fibre variations and hybrid solutions from ComNet are available with various configurations to meet different requirements in commercial and industrial CCTV/security applications. 8 Turnberry Park, Morley, Leeds, West Yorkshire, LS27 7LE, UK Tel: T el: +44 113 1133 3 076 076 400 400
[email protected] www.comnet.net Contact: Yunus Mamoniat Branches: Durban Distributors: C-Video Concepts
www.securitysa.com
CCTV Handbook 2016
105
COMPANY LISTINGS
Crown Hyper World
Datavision
Distributor/supplier
Installer/System integrator | Distributor/supplier
Distributors of DVRs, CCTV cameras, biometric access control.
Datavision offers supply, installation, networking and maintenance of IP CCTV surveillance solutions utilising state-of-the-art technology deployments to complement its remote monitoring infrastructure. As a specialised systems integrator, the company’s aim is to protect industrial, commercial and private property by designing, customising, installing, maintaining and monitoring sophisticated electronic security systems.
7 Crownwood Road, Crown Mines, Johannesburg Tel: +27 (0)11 830 1452 Tel: 1452 or +27 (0)82 (0)82 876 2373 2373
[email protected] www.crownhyper.co.za Contact: Muhammed
C-Video Concepts Manufacturer Distributor/supplier C-Video Concepts sells analogue, IP, HD-SDI, HD-TVI, thermal, fibre optic and Ethernet Ethernet products. It also assists with system design, specification, commissioning and training, in addition to servicing and repairing all security related equipment. equipment. Suite 102 Wheeler House, 112-116 Mathews Meyiwa Road, Greyville, KwaZulu-Natal Tel:l: +27 (0)31 309 1048 Te 1048
[email protected] www.cvideoconcepts.co.za Contact: Clinton Holloway Branches: Western Cape, Gauteng
Dahua Technology South Africa Manufacturer Dahua Technology Technology South Africa, a subsidiary of the Chinese firm, offers complete video surveillance solutions as well as alarm, access control, video intercom and more. Its range covers full HD solutions for the likes of smart transportation, banking, mining, public security, farming, electric industry, telecom, intelligent governance governance and safe cities. No. 1199, Bin’an Road, Binjiang District, Hangzhou Tel:l: +86 571 Te 571 8768 8883 8883
[email protected] www.dahuasecurity.com Contact: Dahua Distributors: Elvey Security Technologies, IDS, Reditron
Dallmeier Southern Africa Office
3-5 Dalcrest Centre, Corner Roer and Tiller Streets, Dalpark Ext Ex t 1, Brakpan, Gauteng Tel: T el: +2 +27 7 (0)1 (0)11 1 915 915 635 6350 0
[email protected] www.datavisionglobal.com Contact: Sharon Newton Branches: Gauteng, Maputo Distributors: Datavision Retail Facility
Elvey Security Technologies Distributor/supplier Elvey is one of the leading distributors distri butors of electronic security equipment in Africa. Since its inception in 1946, it has continued to drive the highest hig hest possible industry standards, while continuously evolving to meet the changing needs of its customers. Its product range provides both IP as well as analogue solutions. 27 Greenstone Place, Greenstone Hill, Edenvale, Gauteng Tel: +2 Tel: +27 7 (0)1 (0)11 1 401 401 670 6700 0
[email protected] www.elvey.co.za Branches: Johannesburg, Pretoria, Cape Town, Port Elizabeth, Bloemfontein, Durban, Pietermaritzburg, Nelspruit, Rustenburg, Polokwane, Vanderbijlpark, Vanderbijlpark, George, East London, Windhoek, Gaborone
EOH Security & Building Technology Installer/System integrator EOH SBT offers a full range of CCTV surveillance offerings including IP and analogue solutions for small and medium enterprises as well as large enterprise solutions. By incorporating analytics, HD, video management and remote off-site monitoring as well as a technology lease offering, EOH SBT can ensure the solution is designed, implemented and maintained to ‘best fit’ the client requirements. 6 Trinity Close, Paulshof, Sandton Tel: +2 Tel: +27 7 (0)1 (0)11 1 844 844 320 3200 0
[email protected] www.eohii.co.za Contact: WayneSchneeberger Branches: Gauteng, Cape Town, Port Elizabeth, Durban
Manufacturer Dallmeier is one of the world-leading providers of network-based video surveillance solutions, solutions, with more than 30 years of experience in the development developm ent and manufacture of high-quality components for the CCTV/IP sector. With Panomera, cameras, recorders, intelligent video analysis and video management, Dallmeier offers complete systems from a single source. PO Box 59, 2086 Fourways North Tel:l: +27 (0)11 510 0505 Te 0505
[email protected] www.dallmeier.com Contact: EP Smit Distributors: ESS Engineered Systems Solutions, MASS, Modular Communications Communica tions SA
106
CCTV Handbook 2016
www.securitysa.com
Eurobyte Technology Distributor/supplier Eurobyte Technology Technology is a distributor of leading international surveillance and network brands Geovision, Sunell, Longse, Qihan, Planet Networking and Cattex, as well as related accessories, cabling and enclosures. Unit 7, Cambridge Commercial Park, 22 Witkoppen Road, Paulshof, Sandton Tel: +2 Tel: +27 7 (0)1 (0)11 1 234 234 014 0142 2
[email protected] www.eurobyte.co.za Contact: Roberto Vizcarra Branches: Cape Town
COMPANY LISTINGS
Frank Street Trading
Graphic Image Technologies Distributor/supplier
Distributor/supplier Frank Street is an importer and distributor of CCTV equipment in South Africa. It stocks a complete range specialising in intelligent sur veillance solutions for IP, IP, analogue HD, digital video recording, access control, system integration and design. Frank Street not only provides security solutions, but also client support and training. 53 Crownwood Road, Ormonde, Johannesburg Tel: +27 (0)11 496 2300
[email protected] www.frankstreet.co.za Contact: Abie Ali Branches: Lusaka, Zambia
GIT (level 2 BBEEE), founded in 1991, specialises in broadcast and CCTV solutions. Its security solutions include SerVision’s remote surveillance DVRs for fixed and mobile (vehicle) platforms, GIT’s tactical CCTV CCT V vests, Flir/Dvtel’s IP based NVRs, IP cameras (including 4K), thermal t hermal cameras and image analytics as well as control room technologies. 44 The Avenue, The Gardens, Johannesburg Tel: +2 Tel: +27 7 (0)1 (0)11 1 483 483 033 0333 3
[email protected] www.git.co.za Contact: Laurence Smith Branches: Johannesburg
Hikvision South Africa GeoVision SA
Manufacturer
Distributor/supplier
Hikvision is a leading global supplier of video surveillance solutions. Boasting one of the industry’s industry ’s strongest R&D workforces, workforces, the company uses its state-ofthe-art manufacturing facilities to design and develop innovative CCTV and video surveillance products for any security need.
GeoVision is at the forefront of state-of-the-art surveillance software, video/audio compression techniques, intelligent video analysis and hardware enhancements. Its award-winning GV series surveillance products provide total security solutions for point-of-sale, licence plate recognition and central monitoring systems. 257 Jean Ave, Unit 10 Central Office Park, Lyttelton, Gauteng Tel: +27 (0)12 664 0411
[email protected] www.geovisionsa.co.za Contact: Jacques Taylor Branches: KZN. Representatives in major cities.
Upper Grayston Block F Cnr Linden and Ann Crescent Sandton, Johannesburg Tel: +2 Tel: +27 7 (0)1 (0)10 0 035 035 117 1172 2
[email protected] www.hikvision.com Contact: Evan Liu Branches: Johannesburg Distributors: ADI Global Distribution, Regal Distributors, Pinnacle Africa, Sensor Security Systems
Hi Tech Tech Laboratory Labo ratory Installer/System integrator
GES Africa Distributor/supplier The scope of GES Africa’s offerin g covers risk management, security official services, field ranger services and CCTV. 3 Bauhinia Street, Oxford Office Park, Unit 20, Highveld Techno Park, Cent urion Tel: +27 (0)82 805 8447
[email protected] www.neahgesafrica.com Contact: Kelly Mclintock Branches: Hoedspruit, Klerksdorp, Germiston, Rustenburg, Shambala
CCTV system specialists for industrial, i ndustrial, commercial and medical environments. The company supplies, installs and maintains systems for CCTV cameras and video surveillance, sur veillance, CCTV CCTV Internet and mobile configuration, IP surveillance, digital video recorders and network video recorders. 140A Kelvin Drive, Morningside Manor, Morningside, Gauteng Tel: +2 Tel: +27 7 (0)1 (0)11 1 064 064 162 1624 4
[email protected] Contact: Anthony Mansour
HiTek Security Distributors Distributor/supplier
GIS-SA Manufacturer Distributor/supplier GIS-SA specialises in IR (infrared) LED lighting, LED security lighting, perimeter lighting and IR illuminators. 46 Wellington Road, Irene, Centurion Tel: +27 (0)71 560 4151
[email protected] www.gis-sa.net Contact: Roston Sadie
Importer and distributor of CCTV products covering high-quality analogue, AHD and IP models accompanied by a 3 year warranty; and intrusion detection brands offering an array of panels, PIRs and accessories. The The company provides excellent excellent after sales service, ser vice, technical support and a swap out policy. Kiewiet Close, 4 Eagle Street, Okavango Park, Brackenfell, Western Cape Tel: +2 Tel: +27 7 (0)2 (0)21 1 946 946 334 3344 4
[email protected] www.hiteksecurity.net Contact: Clyde Elhadad Branches: Cape Town, Town, Port Elizabeth, Durban, Roodepoort, Randburg, Centurion, Edenvale, Witbank Distributors: For a list of distributors and resellers contact HiTek Security Distributors
www.securitysa.com
CCTV Handbook 2016
107
COMPANY LISTINGS
Honeywell Building Solutions
Jablotron
Installer/System integrator
Distributor/supplier
A leading provider of full-lifecycle integrated building management solutions that promote innovative ways of working and delivering real business outcomes. All solutions developed, installed and maintained promote safer, more secure, comfortable and cost-efficient facilities. Proven global and local track record across diverse market segments.
Jablotron offers a sophisticated hybrid alarm system with an innovative built-in camera that has a flash in the passive. The company also offers a free cloud service to the end user, and an outdoor camera compatible with the Jablotron system is now available in South Africa.
Honeywell House Treur Close, Waterfall Business Park, Midrand Tel: +27 (0) Tel: (0)11 11 695 800 8000 0
[email protected] www.honeywell.co.za Contact: Richard Creighton Branches: Midrand
38 Boshoff Street, Southcrest, Alberton, Gauteng Tel: +27 (0)11 615 3675 Tel: 3675
[email protected] www.jablonet.net Contact: Bruce Lang Branches: Gauteng, KZN, Cape Town Distributors: Pyro-Tech Security Suppliers
IAC - Industrial Automation and Control Installer/System integrator Distributor/supplier
JCM Technologies Technologies Installer/System integrator
IAC is a Level 1 BBBEE leading distributor distr ibutor of a comprehensive range of state-of-the-art IP camera and surveillance systems including Mobotix decentralised IP & thermal surveillance cameras, network storage, professional visual displays, high-quality control room systems, biometric and RFID access control, perimeter intrusion detection systems, and ruggedised industrial networking equipment. 53 Landmarks Avenue, Samrand, Centurion, Gauteng Tel: T el: +27 (0) (0)12 12 657 360 3600 0
[email protected] www.iacontrol.co.za/mobotix.html Contact: Cliff Nel Branches: Centurion
JCM Technologies designs, installs and maintains comprehensive CCTV systems, with a number of successful installations for various industries under its belt, from retail shopping centres to offices. Its dedicated and experienced installation and maintenance team is on hand to satisfy every security need. Unit A13, Pinelands Business Park, New Mill Road, Pinelands, Cape Town Tel:l: +27 (0)21 531 1918 Te 1918
[email protected] www.jcmtech.co.za Contact: Peter Reed Branches: Cape Town, Johannesburg, Durban
Leaderware IDS - Inhep Digital Security Service provider Manufacturer IDS provides robust video surveillance systems, using high performance HDCVI and high-resolution digital IP cameras to help customers maximise the effectiveness of their security system. The company company offers products for everything from low-cost, small systems to high-end IP surveillance solutions with intelligent analytics. 91 Escom Road, New Germany, Durban, KwaZulu-Natal Tel: +27 (0) Tel: (0)31 31 705 137 1373 3
[email protected] www.idsprotect.com Contact: Mark Naicker Town, Johannesburg, Nelspruit, Port Elizabeth, East Branches: Durban, Cape Town, London, Bloemfontein, Polokwane Distributors: Regal
Human factors specialists in CCTV and X-rays, including selection, training, control room design and human factor audits of security systems. Provision of internationally internationally presented training in CCTV surveillance skills, behaviour analysis, and incident recognition, management and supervisory control room management training, and full body X-ray training. 76 First Street, Linden, Johannesbur Johannesburg g Tel: +27 (0)11 787 7811 Tel: 7811
[email protected] www.leaderware.com Contact: Craig Donald
MASS Distributor/supplier
ISDS Installer/System integrator ISDS brings specialised video analysis and integration technologies to the African surveillance market. 312 Kent Avenue, Randburg, Gauteng Tel: +27 (0) Tel: (0)71 71 642 147 1478 8
[email protected] http://isds.co.za/ Contact: Riaan van der Walt Branches: Johannesburg
108
CCTV Handbook 2016
www.securitysa.com
Renowned for its work on large projects, MASS is the exclusive distributor for Indigo Vision in southern Africa. It also distributes Dallmeier and Surveon, and imports, distributes and supports a comprehensive thermal camera range from the UK. 27 B Philirene Road, Raslouw, Centurion, Gauteng Tel: +27 (0)82 552 4339 Tel: 4339
[email protected] www.mass-solutions.co.za Contact: Ettiene Swanepoel
COMPANY LISTINGS
Mimic Components
PinnSec
Manufacturer | Distributor/suppli Distributor/supplier er
Distributor/supplier
A complete range of custom CCTV control room furniture manufacture manufactured d from its Alutech Console System. It also undertakes the turnkey design and supply of finished control rooms. Other products include audible and visual alarms, security switches, All types of mimics plus Eithernet and USB to RS-485/23 RS-485/232 2 data interface equipment.
PinnSec is a distributor of security and life safety systems. The The company also offers a range of certified training within the security and life safety parameters.
5 Ramsay Street, Booysens Tel: +27 (0)11 Tel: (0)11 689 5700, 5700, +27 (0)87 (0)87 751 5000 5000
[email protected] www.mimic.co.za Contact: Sales Branches: Cape Town
704 16th Road, Midrand, Gauteng Tel: +27 (0)11 Tel: (0)11 041 4300 4300
[email protected] www.pinnsec.co.za Timmins Contact: Tim Timmins Branches: Johannesburg, Cape Town, Namibia
Progroup Manufacturing MiRO
Manufacturer Installer/System integrator
Distributor/supplier MiRO provides expert advice and assistance in planning a surveillance solution, and offers a selection of IP cameras, viewing and recording solutions from Vivotek, Uniview, NUUO and Milestone. MiRO provides a range of wired and wireless networking solutions to build IP networks, delivering cost-effective, fast and stable networks. 9 Landmarks Avenue, Samrand, Pretoria, Gauteng Tel: +27 (0)12 Tel: (0)12 657 0960 0960
[email protected] www.miro.co.za Contact: MiRO Sales Branches: Gauteng, Cape Town, Durban, Nelspruit
Mobeni Integrated Systems Installer/System integrator Mobeni Integrated Systems Systems is a mature company that has been in existence for 14 years. Well established in aviation security, the company also offers smart retail solutions, CCTV solutions, queue management systems, facial recognition, IT data storage solutions and access control. Unit 30 Villa Valencia Properties, Corner Anemoon and Monument Road, Glen Marais, Gauteng Tel:l: +27 (0)11 Te (0)11 396 2616/7 2616/7
[email protected] www.mobeniis.co.za Contact: Krish Deokali Branches: Durban
Custom-designed control and security room consoles, specialised Custom-designed desks and interior fittings. 11 Broad Street, Park Central, Johannesburg Tel: +27 (0)11 Tel: (0)11 493 1545 1545
[email protected] www.progroup.co.za Contact: Angelique Roos
RADWIN Manufacturer Distributor/supplier Provider of point-to-multipoin Provider point-to-multipointt and point-to-point sub-6GHz broadband wireless solutions. Radwin offers solutions specifically geared for NLOS small cell backhaul and incorporates advanced technologies like beam-forming antennas and innovative air interface. Its solutions power applications include backhaul, broadband access, private network connectivity, video surveillance transmission and broadband for trains and metros. P. O. Box 3554, Rivonia, Johannesburg Tel:l: +27 (0)74 Te (0)74 114 2805 2805
[email protected] www.radwin.com Contact: Nick Ehrke Branches: Johannesburg Distributors: MiRO
Reditron Panasonic South Africa Distributor/supplier Manufacturer Panasonic provides industry-leading solutions to capture, record, manage and analyse surveillance video. Its comprehensive lineup comprises video surveillance products and solutions that offer high picture quality, mission-critical reliability and low total cost of ownership. Its motto i s “When it counts, you can count on Panasonic video surveillance products.” Block L North, Central Park, 400 16th Road, Randjiespark, Midrand, Gauteng Tel:l: +27 (0)11 Te (0)11 312 7015 7015
[email protected] j.david@ za.panasonic.com .com www.panasonic.com/za www.panaso nic.com/za/business.html /business.html Contact: John David Branches: Midrand Distributors: Pentagon, Pansmart
Reditron provides reliable IP security solutions expertise and offers quality products from suppliers such as Dahua, Samsung, Pelco and NUUO. Its services extend to system design, sales and after-sales technical technical support including a training academy at its branches. 18A, 5th Street, Wynberg, Sandton, Gauteng Tel: +27 (0)87 Tel: (0)87 802 2288 2288
[email protected] www.reditron.co.za Contact: Lisa Bowles Branches: Johannesburg, Cape Town, Durban, Nelspruit, Port Elizabeth Distributors: Regal Exports
www.securitysa.com
CCTV Handbook 2016
109
COMPANY LISTINGS
Regal Distributors SA
Secure
Distributor/supplier
Installer/System integrator
Regal Distributors is a leading value added distributor of quality branded IP, IP, high definition analogue (HDTVI) CCTV products and technology driven solutions for all market verticals. Its extended services, s ervices, accessible at 25 branches conveniently located nationwide, include system design, quality technical support, repairs and ongoing product training.
Secure is a CCTV and access control specialist company with 14 years of experience in retail, estate and warehouse installations. Based in Centurion with branches in Cape Town and Durban, it can advise on any security related needs and can be contacted for a free site audit.
9 Electron Street, Linbro Business Park, Marlboro Drive, Sandton Tel: +27 (0) Tel: (0)11 11 55 553 3 330 3300 0
[email protected] www.regalsecurity.co.za Branches: Johannesburg, Pretoria, Cape Town, Town, Bellville, East London, Port Elizabeth, Durban, Pinetown, Vanderbijlpark, Nelspruit, Witbank, Polokwane Polokwane,, Bloemfontein
WBH Centre, 176 Sonja Street, Centurion, Gauteng Tel: +27 (0) Tel: (0)12 12 66 667 7 101 1011 1
[email protected] www.secure.co.za Contact: Vincent Blasl Branches: Cape Town, KwaZulu-Natal
RingmasterSecurity
Security & Communication Warehouse
Installer/System integrator Distributor/supplier Ringmaster Security offers a quality, turnkey security service to the commercial, industrial, retail, residential estate, educational, hospitality and allied industries. The company specialises in integrated security systems utilising fibre optic technology and the latest IP security equipment available. All installations are handled in-house by highly trained, competent staff. 1st Floor Zotos House, 183 Smit Street, Fairlands, Johannesburg Tel: T el: +27 (0) (0)11 11 47 476 6 338 3381 1
[email protected] www.ringmastersecurity.com Contact: Vincent Botha Branches: Johannesburg
Security & Communication Warehouse is a distributor of CCTV equipment as well as IP CCTV, access control, gate automation, electrical fencing, and alarm and fire solutions, across South Africa and Africa. 118 Theuns Street, Hennopspark, Centurion, Gauteng Tel: +27 (0) Tel: (0)12 12 65 653 3 100 1005 5
[email protected] www.securitywarehouse.co.za Contact: Marius Stoop Branches: Pretoria, Johannesburg
Sensor Security Systems RR Electronic Security Solutions Distributor/supplier Manufacturer | Installer/System integrator Distributor/supplier RR Electronic Security Solutions was established to provide a complete custom-made electronic solution in the security and surveillance industry. It is able to advise and implement any sized project, professionally and with as little disruption to business as possible, made up of highly qualified and experienced teams. The company is also the sole manufacturers of a 16-way, rack mountable, individually-fused individually-fused AC/DC power supplies used for CCTV installations. Unit 12 Cycad, Savannah Office Park, Cnr of 9th Avenue and Rugby Road Tel: +27 (0) Tel: (0)11 11 02 021 1 107 1071 1
[email protected] www.rress.co.za Contact: Rivash Raghubir Branches: Gauteng, Western Cape Distributors: Mobeni Integrated Systems, AR Surveillance Projects Gauteng, Condo Pro Security
Established in 2001, Sensor Security Systems is a leading importer and distributor of electronic security equipment in southern Africa. As one of the last privately owned distributors in the region, this family-driven company is fuelled by a deep sense of professional pride and strives to set industry standards. 93 Tsessebe Crescent, Crescent, Building 3 Platinum Close, Corporate Park South, Midrand, Gauteng Tel: T el: +27 (0) (0)11 11 31 314 4 941 9419 9
[email protected] www.sensorsecurity.co.za Contact: Henry Brown Branches: Midrand, Durban, Port Elizabeth, Cape Town, Durbanville
Space Television Distributor/supplier
Seagate Technology
Seagate’s surveillance drives and video-optimised HDDs are focused on improving surveillance system reliability and drive lifespan, reducing security system costs and s upporting video analytics. They are suited to high-write surveillance workloads operating 24x7, with capacities up to 8 TB, supporting 64 cameras per drive and 8+ drives per system.
Space Television Television is a leading provider of integrated satellite, interactive television and CCTV services, focusing on providing affordable and seamless solutions to developers, project managers and end users. Space Television specialises in the wholesale distribution of a wide range of products suitable for both commercial and retail market segments within southern Africa, together with exports to the rest of the African continent including the Indian Ocean Islands.
South Africa Tel: +27 (0) Tel: (0)76 76 36 360 0 285 2850 0
[email protected] www.seagatesurveillance.com Contact: Martin Kruger Distributors: Pinnacle Africa, Rectron
78 Republic Road, Ferndale, Randburg +27 (0)11 781 9900/1/2
[email protected] www.spacetv.co.za Branches: Randburg, Johannesburg, Pretoria, Durban, Port Elizabeth, East London, Cape Town, Brackenfell
Manufacturer
110 110 CCTV Handbook CCTV Handbook Handboo 2016 kwww.securitysa.com 2016 www.securitysa.com
COMPANY LISTINGS
Sunell Security
UTC Fire and Security
Manufacturer
Manufacturer Distributor/supplier
Sunell provides high-quality solutions for video monitoring, including front-end camera technology and back-end storage equipment. Aerospace Micromotor Building, Langshan 2nd Road, Hi-Tech Industrial Park, Nanshan District, Shenzhen, People’s Republic of China Tel: +86 755 26 75 433 6
[email protected] www.sunellsecurity.com Contact: Nicky Gao Distributors: MiRO, Pentagon, TPA Secequip, Eurobyte, VCAM
UTC Fire and Security offers a full range of commercial and enterprise video surveillance solutions: local, distributed and centralised digital recording, indoor and outdoor PTZ, dome and fixed cameras as well as all other accessories needed to build analogue, hybrid or full IP video solutions. 29 Angus Crescent, Longmeadow Business Park East, Edenvale, Gauteng Tel: +27 (0)1 Tel: (0)11 1 579 579 7300 7300
[email protected] www.utcfssecurityproducts.eu Contact: Randhir Seodutt Branches: Johannesburg, KwaZulu-Natal, Cape Town Distributors: Available on request
Synapse Installer/System Installer/Sy stem integrator
Verifier Offsite CCTV Monitoring Services
Synapse provides consultation on custom electronic security and facilities management; bespoke R&D and product development; and solutions based on machine intelligence and operational analytics. It is an expert in PSIM, mobile technology, facilities management, machine vision, software development, risk management, asset management, system integration and collaboration, and the Internet of Things.
Service provider
Berkley Office Park, Unit 11, 8 Bauhinia Street, Centurion, Gauteng Tel: +27 (0)12 665 11 52
[email protected] Contact: Gerhard Furter
8 Coniston Way, Constantia, Cape Town, Western Cape Tel: 086 111 602 Tel: 6023 3 simonb@verifier.co.za www.verifier.co.za Contact: Simon Becker
Syntech
VIVOTEK
Distributor/supplier
Manufacturer
Syntech delivers a complete range of CCTV products including analogue and IP solutions as well as cabling, accessories, storage and tools. Brands include IDIS, Smanos, Chuango, Folksafe, Nihon and Raysharp. Syntech believes in enriching people’s lives in Africa with exceptional CCTV surveillance products.
VIVOTEK, established in 2000, has quickly taken its place as a leading brand in the security industry. With innovative R&D teams adopting groundbreaking codec technologies, the company provides a wide range of products, including network cameras, video servers, video receivers, network video recorders, central management software and PoE solutions.
10 Gold Street, Northgate Estate, Brooklyn, Western Cape Tel: +27 (0)21 514 53 46
[email protected] www.syntech.co.za Contact: Christopher Roussouw Branches: Johannesburg
Independent black-screen offsite CCTV monitoring and related services. Multi-platform monitoring of estates, business parks, shopping malls, residential and commercial buildings, incorporating integrated systems, video analytics and alarms. Leaders and specialists in ANPR monitoring via cloud based database technologies.
6F, No. 192, Lien-Cheng Road, Chung-Ho Dist., New Taipei City, Taiwan Taiwa n Tel: T el: +886 8245 8245 528 5282 2 jackie.w jack ie.wu@vi u@vivot votek.c ek.com om www.vivotek.com Contact: Jackie Wu Distributors: MiRO, Rectron
Tyco Ty co Security Products Disclaimer: The information in this publication is
Manufacturer Tyco Se curi ty Produc ts i s a unif ied group of wo rld- leadi ng a ccess control, video and intrusion brands. Its video brands – American Dynamics, Exacq and Illustra – have security integration platforms, built by its developers, allowing customers to see more, do more and save more. Unit 3, Thandanani Office Park, Invictor Lane, Halfway Gardens, Midrand Tel: +27 (0)82 566 52 74
[email protected] www.tycosecurityproducts.com Contact: Ernest Mallett
furnished for
the exclusive use of subscribers and is based on the most reliable data available to Technews Publishing . However, the information was obtained from sources which Technews Publishing does not control and, although although every effort has been made to verify it, the data is volatile. In furnishing this information, Technews Publishing in no way assumes any part of the users’ or suppliers’ risks, does not guarantee its completeness, timeliness or accuracy and shall not be liable for any loss or injury whatever resulting from the use of or reliance on the information, or from negligence.
www.securitysa.com
CCTV Handbook 2016
111
Index to advertisers ADI Global Distribution ............ ......................... .......................... .......................... ........................... ........................... ..........................33 .............33
Leaderware............ ......................... .......................... ........................... ........................... .......................... .......................... ........................... ....................... ......... 23
Axis Communica Communications tions ............ .......................... ........................... .......................... .......................... ........................... ........................... ................. 21
MASS ............. .......................... .......................... ........................... ........................... .......................... .......................... ........................... ........................... .................... ....... 41
Bosch Security Systems............ ......................... .......................... .......................... ........................... ........................... .......................... ................5 ...5
Mimic Componen Components ts .............. ........................... .......................... .......................... .......................... ........................... ........................... .................. ..... 75
Card Control Systems...................................... ................................................... .......................... .......................... ........................... .................. .... 39
MiRO....................... MiRO.......... .......................... .......................... ........................... ........................... .......................... .......................... .......................... .........................11 ............11
ComNet............. .......................... ........................... ........................... .......................... .......................... ........................... ........................... .......................... ................. 80
Panasonic Panason ic South Africa............ ......................... .......................... ........................... ........................... .......................... .......................... .................9 ....9
Crown Hyper World ............ ......................... ........................... ........................... .......................... .......................... .......................... .................... ....... 67
PinnSec............. PinnSec ........................... ........................... .......................... .......................... ........................... ........................... .......................... .......................... ................ ... 61
C-Video Concepts............ ......................... .......................... .......................... ........................... ........................... .......................... ........................31 ...........31
Progroup Progro up Manufacturing............ .......................... ........................... .......................... .......................... .......................... ....................... .......... 37
Dahua Te Technology chnology ............ ......................... .......................... ........................... ........................... .......................... .......................... .....................IFC ........IFC
RADWIN .............. ........................... .......................... .......................... ........................... ........................... .......................... .......................... .........................101 ............101
Elvey Security Te Technologies chnologies .............. ........................... .......................... .......................... ........................... ........................... ................. 35
Reditron .............. ........................... .......................... .......................... ........................... ........................... .......................... .......................... .......................... ............... 19
GIS-SA ............ ......................... .......................... .......................... ........................... ........................... .......................... .......................... ........................... .................... ...... 43
Regal Distributors SA ............. .......................... .......................... .......................... ........................... ........................... .......................... ................ ... 29
Hikvision South Africa .............. ........................... .......................... .......................... ........................... ........................... ..........................69 .............69
Seagate Te Technology chnology ............. .......................... .......................... .......................... .......................... ........................... ........................... .................. ..... 17
HiTech HiTe ch Security Solutions......................... ....................................... ........................... .......................... .......................... ................. 1, 112
Security & Communica Communication tion Wareh Warehouse ouse ............. .......................... .......................... ........................... ..................... ....... 27
HiTekk Security Distributors ............. HiTe ........................... ........................... .......................... .......................... ........................... .................. .... 95
Specialised Exhibitions............ ......................... .......................... ........................... ........................... .......................... ..........................IBC .............IBC
Honeywell Building Solutions ............ ......................... .......................... ........................... ........................... ..........................81 .............81
Sunell Security ............. .......................... .......................... .......................... ........................... ........................... .......................... .......................... .............OBC OBC
IAC............ ......................... ........................... ........................... .......................... .......................... .......................... ........................... ........................... ..........................45 .............45
UTC Fire and Security................................... ................................................ .......................... .......................... ........................... ..................... ....... 71
Jablotron ............ .......................... ........................... .......................... .......................... .......................... ........................... ........................... ..........................73 .............73
VIVOTEK .............. ........................... .......................... .......................... ........................... ........................... .......................... .......................... .......................... ............... 15
112
CCTV Handbook 2016
www.securitysa.com