Home Articles posted by a&s Adria (Page 132)

FlipX – OPTEX’s new highly accurate and flexible indoor detectors

On Thursday, September 8, OPTEX will present FlipX, a new highly accurate, and flexible indoor detector.

Installers and end-users in Europe, the Middle East, and Africa (EMEA) can now take advantage of FlipX, a new range of flexible indoor sensors from OPTEX, the leading global sensor manufacturer.  New techonlogy features a bespoke pyroelectric sensor for increased performance that adapts to the human shape, and a unique lens that can be ‘flipped’ to provide both narrow and wide detection in a single sensor.

This ‘flipped’ lens has been designed with flexibility in mind. It effectively gives installers “2 sensors in 1” to satisfy multiple customer demands. It helps installers manage both their inventory and their cashflow while giving them the versatility and confidence of arriving on site with the solution they need to match their customer’s needs.

The new indoor sensor series is built on OPTEX’s extensive track record of providing outstanding sensing performance for intruder detection applications. By simply rotating the lens through 180°, the sensor can be used to protect narrow or long areas such as a hallway up to 18m, or a wide, open area like a living room or retail store up to 12m at 85°.

FlipX Standard, the first to be released from the new series, is a Grade 2 sensor, that also features a digitally enhanced signal recognition logic called Super Multi-Dimensional Analysis (SMDA), which means nuisance alarms caused by changes in light or temperature can be avoided.

Following the FlipX Standard launch, OPTEX plans to release other models in the FlipX series in late 2022/ early 2023.

Link to join: https://pro.connect2bnet.com/live-stage/6210

Top surveillance industry players expand their lead

Genetec, Motorola Solutions and Milestone Systems continued to grow their combined global share of the market for video surveillance software and service agreements in 2021, according to a new report from Novaira Insights. The research shows that this global market was worth $2.4 billion in 2021 with around 68% of this outside China. The, so-called, “big 3” grew their combined share of the market for video surveillance software and managed services to over 35% in the world excluding China.

The supply base for video surveillance software outside China remains very different to that of the Chinese domestic market. China continues to be mainly served by large domestic vendors. In contrast, the world excluding China is served, not only by the big 3, but also by a multitude of other suppliers, each with a small market share of less than 3%.

Novaira Insights’ latest report, “The world market for video surveillance hardware and software”, shows that, outside China, the market for video surveillance software and managed services grew quickly at 10.1% in 2021, as restrictions on movement due to the Covid-19 pandemic eased and pent-up demand for video surveillance equipment was served.

According to Jon Cropley, principal analyst at Novaira Insights, “An important factor in the big 3 continuing to grow market share in future will be their strategies for cloud. We are forecasting that the market for cloud video management software will grow much faster than the market for on-site video management software licenses. So far, each of the big 3 has adopted a different approach to cloud so it will be interesting to see how these approaches evolve going forward”.

The pandemic appears to have catalysed interest in cloud video surveillance. 53% of respondents in a Novaira Insights 2022 survey of North American end-users indicated that the pandemic had either started, accelerated, or greatly accelerated their organisation’s cloud strategy specifically related to video surveillance. Furthermore, 68.3% of respondents thought their organisation will move to managing or storing more of its video surveillance data in the cloud in the next two years.

According to lead analyst and founder of Novaira Insights, Josh Woodhouse, “The medium-term future for many video surveillance installations will be largely a hybrid approach in which software is hosted off-premise in the cloud but a primary tier of video storage is on-premise. Cloud storage will likely be increasingly used but this will be often in conjunction with on-premise storage tiers.”

Strengthen protection and control with Unified Security Solution

Over the last decade, the security landscape has been evolving in fundamental ways. Where once security systems were primarily based on cameras, access readers and other electronic devices focused on protecting physical spaces, they have become software-based, securing both physical and digital spaces. Today, for most organizations, security encompasses even more – it’s now also about bringing added value to the organization.

Unified systems make operations more secure

When your video and access control security systems talk to each other, you have the potential to increase protection levels exponentially. The seamless sharing of data significantly improves your ability to keep your people and assets safe. Siemens unified security makes this happen. By connecting our SiPass integrated Access Control and Siveillance Video Management systems, we provide a smart, highly transparent way to manage security systems.

When our SiPass integrated and Siveillance Video systems interact with each other, events from both systems are analyzed as a single data set. The information you need for seamless alarm management is delivered immediately – all on a single screen.

Gone are the days of toggling between two screens and learning two or more systems. With centralized monitoring and operations, you’ll have situational awareness from one user interface. You minimize the possibility of missing important events while increasing response times when events occur.

Greater efficiency 

Handling and reviewing events is easier and faster with a Unified Security approach. When access events occur, a security operator receives an associated live or recorded event video to better understand the situation in order to respond to the event. Unification enhances the security system process by combining operations into one interface to better manage and review events onsite or remotely – at desktop workstations or on mobile (Android or iOS) devices.

Flexible and scalable

Most set ups are easy and require minimal onsite configuration. As security needs change,

you can easily add video and access control enhancements. You can also integrate with other building applications, such as visitor registration, elevator management, gunshot detection, intercoms, license plate recognition (LPR), forensic search platforms and various types of video analytics.

Reap the rewards

If you choose to fully implement our unified access and video solution, you’ll be able to:

  • Control on one screen: Manage events, stream and state changes, and trigger rules and actions from both video and access control systems through one interface
  • Search by identity: Receive and search by cardholder information and compare to live video
  • Customize alarms: Create alarms based on access control events and associate alarms with video feeds
  • Intrusion integration: Monitor and control video, access and intrusion systems from a single all-purpose security interface by adding Siemens intrusion stations
  • Manage technology: Display video cameras, access points, intrusion points, alarms and events on a graphical map in a single platform
  • Leverage powerful APIs: Allows open integration of systems and products, including third-party offerings
  • Select preferred equipment: Leverage open integration capabilities and choose from a variety of video cameras, biometric readers and mobile credential readers
  • Implement system easily: Get started without complex integration, scripting or APIs
  • Secure by design: Increased connectivity and interoperability without increasing vulnerability

False alarms make up 98% of automatic fire alarm confirmed incidents in 2020/21

In new data released by the Home Office, statistics show that the vast majority (98%) of confirmed automatic fire alarm incidents are false alarms, while only 2% were a result of an actual fire in 2020/21. This is down from 3% from 2019/2020.

The majority of false alarms (90%) are due to ‘false apparatus’, with 2% deemed as malicious. 6% are a result of ‘good intent’.

The overall number of fire incidents from automatic fire alarms in 2020/21 was 129,221 – a decrease of over 6.5% on the previous year. Of those that were confirmed fires, 1,855 were from dwellings, 740 from ‘other buildings’, 52 from secondary fires, nine from ‘other outdoors’, five from road vehicles and four from chimney fires.

Automatic fire alarms are designed to sent a signal once a fire is detected via the fire alarm panel straight to an Alarm Receiving Centre (ARC) for the local fire and rescue service to respond to. Some fire and rescue services now also require a confirmed fire before responding, due to the high number of false alarms received, though many do not, such as the London Fire Brigade, who will response to every alarm unless a false alarm is confirmed beforehand.

(IFSEC)

The right Door Closer is critical for building fire safety

London, September 2022 – No one needs a reminder of the devastation caused by fire in a large building. One result of recent tragedies is that fire doors now receive the attention and regulation they deserve. Just as importantly, however, any fire door must be properly closed to be effective. This is where a building manager’s choice of door closer technology can make the difference.

“Historically, fire doors and their components have often been overlooked in building fire safety,” says Richard Wilson, Door Closer Product Manager at ASSA ABLOY Opening Solutions EMEIA. “But over the last few years, their vital importance has been recognized. Doors are critical safety features. They provide fire protection and compartmentation.”

However, he warns: “Like any door security technology, fire protection will only work if the door is fully closed, preventing the spread of fire and smoke. Relying on building users to do this 100% of the time is not realistic.”

Door closer technology can help. A certified door closer which is properly fitted helps to build a barrier to aid escape and slow a blaze’s progress with compartmentation. After analysing one recent tragedy in New York, city officials said the death toll would have been lower if doors were properly closed1.

Door closers and fire safety

Every element on a fire door, not just the leaf, must be tested to industry standards and certified. This includes door and architectural furniture. Among these components, door closing devices are of vital importance.

“Companies which supply life-critical building equipment must be confident in its performance in real-world situations,” explains Richard Wilson. “Most architects and building specifiers now request product datasheets with primary fire test data from an accredited third-party testing house.”

The added value when building managers choose ASSA ABLOY

The broad portfolio of ASSA ABLOY door closing solutions is fully tested and certified to meet the needs and regulations of new buildings and retrofit projects.

“There is an effective, efficient ASSA ABLOY Door Closer available for almost any opening, of any door size or type,” adds Richard Wilson.

Besides full test coverage, correct installation is of course critical, as Fire Safety Week advice for landlords highlights2: “Fire doors are not ordinary doors. They’re a carefully engineered fire safety device. They must be fitted correctly.” To support installers, all ASSA ABLOY product labels include QR codes which link directly to installation walk-through videos.

To assure ongoing performance, every ASSA ABLOY model has a long warranty and is supplied with maintenance instructions.

Cam-Motion guiderail vs. rack and pinion door closing technology

Cam-Motion Door Closers provide an ergonomic opening experience for everyone who passes through the door. The necessary user push-force falls rapidly on opening, which enhances comfort.

Because ASSA ABLOY Cam-Motion devices’ closing force and latch speeds are independently adjustable, the door can be configured to close reliably each time. Thermo-resistant valves with metal heads, rather than plastic, ensure adjustments are dependable: Once door speeds are set, they stay set. Even with wind pressure, draughts or air suction effects, doors shut tight.

In comparison, rack and pinion door closers are more common and cost-effective, but do not tend to operate as efficiently for fire doors, according to the UK’s Fire Protection Association3.

All ASSA ABLOY Cam-Motion devices are tested to EN 1154 standard for fire and smoke protection. The door closers’ symmetric cam is designed to fit to either frame or door, and on hinge or non-hinge side: Whatever suits the opening best with no compromises or workarounds needed from the installer.

“The degree of so-called ‘passive fire protection’ given by a fire door is greatly enhanced by the intelligent technology inside an ASSA ABLOY Door Closer,” says Richard Wilson.

To learn more about the benefits of an ASSA ABLOY Door Closer, visit https://campaigns.assaabloyopeningsolutions.eu/doorclosers

Face recognition – the new standard for new generation systems

By Artem Arifov, Suprema Business Manager; sales_eu@supremainc.com

Traditionally if we look at Access Control systems, we would find touch solutions either with RFID cards, keypads or fingerprint sensors. For many years, these technologies have conquered the market over all its verticals. But as time passed, the technological breakthrough introduced in our everyday life such features, that no one had ever thought of before.

The IFSEC Global Physical Access Control Trend report found that 43% of respondents listed contactless capabilities as one of the top three features they would require of any new access control system. Touchless access becomes the gold standard and the face recognitions technology becomes the cornerstone of the new generation access control systems.

Open the door by walking up to the system? Get access granted even when staying in motion? Gain access without having to lift a finger or do anything ? – This isn’t any more a science fiction dream, but our daily life. Today the Facial Recognition allows to confirm “in motion” individual’s identity at affordable price by providing the highest security level. How did we get there and how will look like the next generation industry standard tomorrow? Artem Arifov, Business Manager at Suprema, the company that has been moving the entire industry for more than 20 years, will talk about the new door access experience and latest market requirements for access control solutions.

The cradle of Face Recognition technology

The interest in Face Recognition has been increased specifically for the last couple of years. However, the technology is more than 50 years old. The earliest pioneers of facial recognition were Woody Bledsoe, Helen Chan Wolf and Charles Bisson. In the 1960s, this research team ran the first experiments in machine facial recognition. The working group used a database of 800 pictures of people in different angles.

The challenge was to find automatically matches by running the first face recognition algorithm. The experience was based on the idea of using distances between human face landmarks. By the way, this basic concept is still fundamentally relevant even for the new generation algorithms.

The scientists marked manually various “landmarks” on the face such as the person’s hairline, eyes, and nose. Even if in the end, the computer coped 100 times faster than a human, the experience wasn’t successful because of the technology of the era.

Outstanding development

Face Recognition has come of age only at the beginning of 2000s. Mostly thanks to high-resolution cameras, mapping processes, machine learning, artificial intelligence and processing speeds.

To demonstrate the advancements in facial recognition technology over the past decades, we should mention that the face recognition algorithms in 2006 were 10 times more accurate than the ones of 2002 and 100 times more accurate than those of 1995. And the same exponential growth continues still now. According to the National Institute of Standards and Technology (NIST) test, between 2014 and 2018 there was a twenty times improvement in algorithms performance over four years.

NIST computer scientist Patrick Grother says: “The accuracy gains stem from the integration, or complete replacement, of prior approaches with those based on deep convolutional neural networks. As such, face recognition has undergone an industrial revolution.”

Face recognition implementation in smartphones

While outstanding technology development, Face Recognition has been considered for a long time as “”luxury” product for the most critical security sites. A watershed moment arrived in 2017, when Apple announced the new “Face ID” features on iPhones. Suddenly Face Recognition stopped being viewed as fantastic technology and came out in a large public.

However, the phone’s solution isn’t the most secured, especially when based on basic optic camera technology that can be spoofed with photos and 3D mock-ups. It’s not something reliable when trying to secure the most critical data. It’s one of the reasons why professionals still recommend using fingerprint scanner rather than the face unlock feature on smartphones. Similarly, the basic algorithms running in most phones today doesn’t adapt to changes in clothing habits, such as wearing new glasses, hat or a face mask.

Rather than using color camera image data like traditional face unlock methods, the modern facial recognition system combines classic optical and infra-red images of the face. AI-based visual recognition makes a fusion of both images together, which analyses this unique enhanced spectrum facial data for key facial profile features. So it can’t be spoofed by pictures, sculptures, etc., and works well in all lighting conditions. It’s also designed to work with hats, scarves, glasses, contact lenses, and many sunglasses and automatically adapts to changes in someone’s appearance, such as wearing cosmetic makeup or a beard. It can even work in total darkness due to the IR camera.

For example, FaceStation F2 Fusion Multimodal Terminal optimizes IR and visual face recognition to produce exceptional authentication results, achieving extremely low false acceptance rate (FAR) of 1 in 10 billion.

Covid-19 and spread of contactless payments

 The main manufacturers started tracking touchless Access Control solutions even before 2019. But the pandemic has changed especially the European way of thinking. Before the COVID-19, most of payments in Europe used to be cash. COVID19 has accelerated the Credit Card payments and contactless technologies by card or on your smartphone. Mastercard reported that 75% of all transactions in Europe are now contactless.

Similarly Face recognition and Mobile Access have been gaining traction with physical and cyber security professionals. Practically, this trend contributed to commercial activity with Suprema’s facial recognition products deployed by Nomura Real Estate Development in Japan, Kuwait National Petroleum Company, and Samsung Electronics.

Suprema’s world-leading facial recognition access control business grew at three times the industry compound annual average reported by Omdia from 2018 to 2021. A 2021 report from Omdia says Suprema has the largest share of the biometric access control market in the world outside of China.

“Suprema and our partners have made a breakthrough during the COVID-19 pandemic by responding to the needs of the market with advanced technology and innovation.” says Suprema Inc. CEO Hanchul Kim, “This year, with our upcoming facial recognition solution, Suprema will also lead the fast-growing global facial recognition market.”

The new industry standards

Improved accuracy and benefits provided by today’s facial recognition leaders make it an ideal primary access control authentication tool. In line with the new paradigm of post-COVID access control, facial recognition is now the preferred access credential over fingerprints. In the contactless era your face is now your key. Furthermore, the technology is becoming more affordable for few reasons :

“First, Technological advancement in the field of sensors and processors has increased the performance of Facial Recognition and decreased it cost. For example, by adopting fast and smart AI processor called a Neural Processing Unit (NPU), Suprema achieved lower power consumption. Secondly, thanks to Artificial Intelligence and Machine Learning, our algorithms have become more complex, improving the performance of the devices”, explains Baudouin Genouville, Suprema Europe’s Sales Director.

Another recent Face Recognition’s revolution was a launch of algorithms that are increasingly tolerant of poor-quality images. A benefit is that empowers the algorithm by reducing the number of neurons an algorithm needs to measure image variations at the pixel level.

All the security experts know well that the highest security level of identity confirmation is to use multi-factor authentication combining RFID or mobile cards, PIN or QR-codes with biometrics (Face or/and fingerprint). This enhanced level of security is suitable for the most critical sites (banks, military areas, police, airports, etc).

But the vast majority of access control systems are used for everyday purposes at business offices, factories, universities, hospitals, construction sites or fitness studios. All these customers require cost-efficient, flexible solutions to use for fast and accurate access control identity authentication. Today the Facial recognition as a credential is the ideal solution for organizations looking to deploy the most current, accurate, and rapid technology while simultaneously enhancing the user experience in most access control applications. What are the new requirements on the market ?

1. GDPR-designed systems

 For many years people have been really concerned about anything related to tracking or biometrics in general, because of the privacy. This issue was mostly driven by people not understanding the technology. However, a big part of responsibility is now on the side of manufacturers. Since the new GDPR-regulation, the European privacy world-leading standard was adopted, all manufacturers take very seriously the data protection.

ISO/IEC 27001 certification is a fundamental of each reliable system. It includes more than a dozen standards for any sensitive information management such as financial information, intellectual property, employee details or information entrusted by third parties. All stored data must be encrypted, in addition, the delete option of all relevant information must be available. Furthermore, the communication between access control products uses AES-256 encryption or TLS protocol. Of course, any reader where the data is stored should support Secure Tamper feature : if a product is detached arbitrarily and forcibly, it detects this and provides a function to entirely delete all information within the product. The high-end products are also embedded with Secure Element(SE) to prevent cyber-attacks.

The European market sets up the worldwide highest level of privacy protection. Using biometrics in Europe is strictly regulated by GDPR-laws and only few manufactures in the world as Suprema can guarantee the requested data protection level. To be clear, in spite of the well-known concern, during the enrollment process the reader doesn’t store any image neither on device, nor on server. The algorithms take in account distances between unique landmarks by transforming them into Face template or face profile, a mathematic model of your face. This matrix is irreversible, however, is also considered by GDPR-law as private data. Very few readers today can support Template-on-Card feature that enables identification with biometric data saved on RFID cards.

Since September 2022, Suprema is a pioneer of ‘Face Template on Mobile’ technology for facial recognition authentication. It lets users enroll into an access control system and store their biometric face profile directly on their own mobile devices so the biometric data is not saved in the company’s database. This feature embedded in the new BioStation 3 Fusion terminal will surely change the entire industry, at least in Europe. 2. Cost-efficiency and social responsibility

The most responsible manufacturers understand all risks related to the global warming and are engaged in a world’s fight against this issue. As part of the company’s environmental initiative, we can mention the cut down on plastic waste produced by RFID cards.

A nice example of realization would be Stonyhurst College in the United Kingdom. Sam Moore, facilities director at Stonyhurst, says the school went through “vast, vast amounts” of access cards with an estimate of around 100 per week due to losses and damage. But the Suprema Mobile Access app and FaceStation F2 biometric terminals eliminate the need for cards entirely, which Moore says is saving on costs and reduces the amount of disposed plastic, thus being greener.

“BioStation 3, being the first release in Suprema’s third generation product lineup, is expected to offer an enhanced experience for operators, installers and end-users. Moreover, Suprema will continue to play its duty in environmental protection by minimizing pollution caused by plastic access cards through emphasizing the advantages of using biometric and mobile access solutions,” states Suprema Inc. CEO Hanchul Kim.

Of course, the systems must support basic human rights values and not running the algorithms on ethnical criteria. For example, Suprema industry leading face recognition terminals recognize all people the same way regardless of user ethnicity, skin color and face changes. Today this is a big issue, especially for cheap providers, mainly coming from non-democratic countries.

Another challenge is to face the actual energy crisis. The size of terminals becomes more and more compact that reduces the energy-consumption of screens. So, it not only fits well on small office doors, but provide cost-effectiveness and energy saving improvement. Finally, PoE+ features enable less wiring and quick installation.

3. Supporting VoIP Intercom, RTSP and SIM slots for multitasking

 New generation demands request the highest flexibility of the hardware. To make access control easy, manufacturers equips their hardware with VoIP Intercom feature and RTSP (Real Time Streaming Protocol) for supporting video monitoring and using device as a camera. It enables seamless communication with all doors at anywhere and anytime. Wi-Fi feature is also required in modern sites. Also as custom USB hosts for additional SIM Slots is a kind of requirements for critical infrastructure without network. The Access Control hardware is becoming more universal trying to respond to the increasing multitasking of our everyday life.

 4. Flexibility of integrations

 Integrations with 3rd party software is a “must have” feature for any product today. The systems is becoming more complex involving more and more tools and features. The bright example is Video Management systems, when VMS can control access control readers and cameras at the same time by creating a complex interconnecting environment, when all events are related. Cameras film Access Control events and the hardware sends video streaming through RTSP allowing to manage intercom requests through SIP line. The more performed systems are integrated with alarms, fire detectors, emergency buttons, by assuring the full security of the site.

 5. Leads time

The last important criteria that is becoming critical nowadays is the leads time. The sensitive question of respecting engagement and project realization for each installer or integrator. At the era when the delivery time from some manufacturers exceeds 5-6 and sometimes 10+ months, the priority is to choose manufacturers who are producing the most of components ‘in-house’  and in large quantities, assuring sufficient stock of chips and external components and providing reasonable and transparent delivery calendar. For example, Suprema continues delivering the whole portfolio without any interruption even for large quantity projects.

Ten “deadly sins” when installing a video surveillance system

We are all humans, so we all make mistakes. However, there are such common cases that you should be aware of and avoid. Specialists of Partizan company have collected, systematized and listed them to say once and for all – it should not be like that!

 1. DHCP remains enabled after adding to NVR

Most CCTV cameras have DHCP enabled by default. What does it mean? A static IP address does not work, but a dynamic IP address, on the contrary, is active. That is, the CCTV camera, after entering your local network, will find its own IP address. The plus is that you don’t need to input this address manually each time. And the minus is that these addresses can change every time the router is rebooted. The result is that after the reboot, the CCTV camera will get a completely different IP, the client will get a terrible black screen instead of an image, and you will receive urgent calls: “Hey, where did my CCTV camera go?”. Do you really need it?

2. Outdated firmware and password

There are also simple, trivial, but surprisingly widespread reasons for incorrect device operation. The thing is, even if you bought your device yesterday, it doesn’t mean that a new firmware didn’t appear while it was in stock. Always check its relevance and install the latest version. Ideally, you should check the firmware once every few months. Regarding the password — often users and even installers are too lazy to change passwords and sometimes leave it at the default: admin, 1111, etc. A good chance for a hacker!

3. Time synchronization is disabled. Incorrect playback time

A non-obvious mistake, but it can also cause pain and suffering. If we have a desynchronization in time, then even knowing when the alarming event occurred, it will be very difficult to find it in the archive. By the way, there is an easy way to synchronize the recorder (and therefore the CCTV camera) with real-time. Just add the NVR to Partizan Cloud and our service will do everything instantly and clearly.

4. Settings, connection and recording

It may seem obvious to some, but there is one simple thing. If you want the recording to be turned on only by alarms, motion detection or at certain intervals – no one will do it except you. Enter the settings yourself. Now about the connection. There are CCTV cameras that can be connected using the “native protocol”, and there are all others. With the native protocol, everything is finally clear: company’s cloud CCTV camera can be easily connected to its cloud recorder, the SH camera to the SH recorder. But if the connection takes place, for example, according to the Cloud-camera scheme to the SH-recorder (or vice versa), or in general a third-party CCTV camera is used, the Onvif protocol should be used.

5. Incorrect installation of your CCTV camera

The topic, of course, is very broad, moreover, there are many different opinions. So, at this point, we will try to derive a common “denominator” that is understandable even for a new installer. A good, professional installation of video equipment is when:

a) The correct branded accessories are used, including cable junction boxes.

b) The cables are not visible next to the CCTV camera and they do not stick out in all directions. They should be brought inside the building, or at least hidden in PVC pipes or corrugations.

Of course, budgets can be “cut”, but this does not mean that you have to compromise on quality.

6. Incorrect viewing angle or CCTV camera installation location

It is also a rather versatile field for discussion, so let’s highlight the most important points.

  • There is a large object close to the CCTV camera – tree, wall, lamp post, etc.). Such proximity can lead to “reflection” of IR illumination, and at the same time to CCTV camera blindness.
  • The CCTV camera is aimed at a glowing lantern or at a sunrise/sunset. This also results in CCTV camera blindness or image illumination.
  • IR diodes in the dome CCTV camera are under its body. In this case, the backlight is reflected from the housing into the lens. The result is that the CCTV camera stops “seeing” at night.
  • Dirty lens glass or dome CCTV camera sphere. A very simple, but surprisingly common cause of poor image quality.
  • The CCTV camera is installed on a metal or conductive surface without grounding. This is trivially dangerous, because it causes the risk of short circuits and even the CCTV camera catching fire.
  • The CCTV camera is at a low altitude. A real find for criminals and vandals!
  • The dome CCTV camera is installed without proper protection from above. If the model does not have a high degree of resistance to dust and moisture (at least IP66), moisture form of rain or snow can get inside the equipment.
  • The CCTV camera is installed in close proximity to high-voltage power lines. This causes not only a high risk of electric shock, but also provokes interference in image transmission.

7. Bad Internet

Probably everyone knows about such a problem, but not everyone is aware of its depth. By the expression “bad Internet” we primarily mean two points: low connection speed and changes in flow transmission. And if everything is clear with the first parameter, then in the second case, even at high speeds, sags and entire seconds of video may drop out. So make sure that the speed of your Internet is adequate for both input and output, and the connection is stable, without losing data packets.

8. Incorrect cable connection

It is not good if the cable of the installed CCTV camera is less than 30 cm from the power cable. It is a very bad idea to put the wires of the video surveillance system and the home electrical network in one box. This is especially true for analog CCTV cameras. Therefore, it is always worth laying the CCTV camera switching separately. So there will be no obstacles or unnecessary picture jumps in the image.

The second point is the considerable distance between the CCTV camera and the recorder. For a coaxial cable, problems with image transmission can begin as early as 500 meters. And the optimal distance is the “hundred meter” familiar to many. It is always better to work with the correct lengths of cable than to be faced with the fact that the video signal does not arrive normally, or the CCTV camera does not have enough power. If we are talking about IP CCTV cameras with a POE system, then the distance to the recorder should be 50-80 meters.

When dealing with an analog system, it is worth remembering that problems may also arise when connecting several CCTV cameras to one power supply unit. Imagine that we have two CCTV cameras. One is at a distance of 10 meters from the power supply unit, the other is at a distance of 50 meters. So, after six months, you can unexpectedly encounter, for example, the failure of the IR illumination of the remote CCTV camera. And the issue here is not the quality of the equipment. It is all about incorrect switching. Therefore, we advise using a separate power supply for each CCTV camera. Why? The CCTV camera must receive its “legal” 12 volts and the correct amperage. And a considerable distance can cause a drop in power supply.

And, of course, always and everywhere you should use the right cables. Trying to save money, some installers “throw away” aluminum or steel wires. But what may be OK for budget Internet in the entrance, will not work for the video surveillance system. Such cables simply will not transmit a normal video stream. Our minimum is copper twisted pair of category 5e. We will not emphasize the correct crimping of the twisted pair. This is an axiom!

9. Low-quality or inappropriate third-party equipment

Use quality routers! We usually recommend the following brands: MikroTik, Zyxel, Cisco, HP, Linksys. Everything will be fine with them. The same can be said about POE equipment. All the above mentioned brands make decent switches.

Hard drives! This is generally the key to success for a video surveillance system. Partizan is an authorized European dealer of Toshiba and we use HDDs of this brand for our recorders. We consider its products to be ideal in view of:

  • Possibility of long-term stable work in 24/7 mode
  • Simultaneous recording support from 32 CCTV cameras
  • Ability to withstand multiple write/overwrite cycles
  • Spindle rotation speed optimal for NVR
  • Resistance to vibrations, high temperature, voltage drops
  • Correct interface (Sata 3)
  • High data transfer rate

10. Incorrect calculation of power and quality of components

You should not save money on third-party components of the video system! Let’s say, the cost of a high-quality power supply unit and a low-quality one will not differ that much. This is a matter of tens of dollars, not, say, hundreds or thousands. But you should always remember that a low-quality product can damage the equipment or cause the quality of the image to deteriorate (bands and waves in the picture, etc.).

We recommend using power supplies with an additional power reserve of at least 30% compared to the expected power consumption of the video surveillance system. It will definitely not be superfluous, and it will protect you and the client from unpleasant surprises.

Of course, these are far from all the mistakes that happen in our field. However, by keeping at least these simple points in mind, you can make life much easier for yourself and your customers. As they say, go and install quality, professional CCTV and do not make more mistakes.

 

Interview: Michal Riha, CEE Sales Manager, Zenitel

a&s Adria: Mr Riha, thank you for sparing time to talk to our readers. Could you present yourself, your educational and professional background, and what business area are you in charge with at Zenitel?

Riha: I am Zenitel’s area sales manager, safety and security, for Central and Eastern Europe. I have 25 years of sales experience with selling B2B and technical solutions. With all my positions I have enjoyed establishing new relationships in new markets and increasing sales.

a&s Adria: Zenitel has many years of experience in research and development of public address and intercom systems. On the road of becoming one of the global leaders in this area, Zenitel has experienced a lot challenges and milestones. Tell us more about your company’s history, its important milestones, its present state in number of employees, sold products, revenue, etc.?
Riha: While Zenitel history dates back to 1901, we were the first company in 2006 to introduce IP-based intercom systems (VoIP). In 2014, we incorporated IP video in our intercom stations. An important additional milestone for Zenitel was in 2021, when we joined forces with ASL (Application Solutions Limited). With more than 30 years of experience, ASL has a strong offering in Public Address, General Alarm and Voice Alarm Solutions (PAGA/PAVA), as well as Control Management products.

Zenitel’s primary solution offering is within intercom and public address. Among others, we actively focus towards building security, public safety, education, healthcare, transportation, manufacturing, and retail markets. Ease of integration is one of the key features of our solution as our solutions are very easy to integrate with most third-party Access Control, Video Surveillance/Video Management Systems, Alarm Systems, Security Management Systems, Radio Integrations, Telephony and DECT, and PA Systems. Our 300-person team of engineers, sales, product managers, customer service, and more are located around the world.

a&s Adria: Could you briefly present your product portfolio? What are your core technologies?

Riha: Zenitel solution are designed to deliver crystral clear communication no matter what the situation might be. Our product portfolio includes IP intercoms, IP speakers and public address solutions. The audio quality for our solution is best in class as in our solutions carry features such as active noise and echo cancellation, automatic volume control, automatic gain control, a 10W speaker, a 10W class D amplifier, and a 100db sound pressure level.

a&s Adria: What product or product group would you stand out as flagship or most sold both in public address and in intercom systems portfolio and why?
Riha: Our Turbine series is the most popular intercom solution. Since its early design and development, the Turbine Intercom has delivered high audio performance in situations where communication is critical. The Turbine IP Intercom achieves this by combining an array of innovative features that push the limits of audio and acoustic technology. For example, a10W speaker, matching 10W class D amplifier, and digital MEMS microphones can provide open, duplex, hands-free communication. And with an audio amplification that powerful, the intercom solution can also be used as a public address speaker.

In addition, the Turbine intercom can adjust a voice that is too loud or too soft to an intelligible signal for the call recipient. The speaker volume automatically adjusts to an audible level to overcome ambient noise levels, even up to 30dB. And while many intercoms impose physical constraints upon its users, where a person must stand close to the station in order to be heard clearly, the Zenitel Turbine intercom solution automatically adjusts the gain on the speaker’s voice, effectively maintaining a constant volume level to the receiver, regardless of the speaker’s distance from the station. This drastically increases the intercom’s usability and improves safety, as not only are the speaker’s hands free, but they are also no longer restricted to a close proximity of the intercom.

Within the public address domain, our Vipedia & Integra system are known for their quality and reliability. The solutions provide exceptional audio performance, with 16bit/48kHz sampling and high-quality audio processing that results in crystal clear, high intelligibility message reproduction. In addition, the solutions are designed for high availability and 10-year operating lifespans, while meeting rigorous safety standards, with EN 54-16, UL, and CSA certifications.

a&s Adria: You have launched a next generation of intelligent IP speaker series, some of which, like ELSII-10HM IP horn speaker and ELSIR-10CM ceiling speaker, you presented at this years’ Intersec and ISC West. What are their key features and benefits?

Riha: IP speakers are essential for mitigating security and safety challenges, especially in demanding environments. The interactivity and integration features of our new IP speakers provide many benefits over traditional public address systems, to include talk back functionality, ambient listening, automatic volume control, and flexible zoning. Even more, each speaker has their own built-in amplifier that eliminates the need for central or localized amplifiers and reduces cabling. Our use of open standards such as SIP, Multicast, and RTP streaming enables easy integration. Our three modes of operation, SIP, IC-EDGE, and ICX-AlphaCom allow users to scale to their needs, from single devices to standalone systems, to enterprise grade solutions. Last, the speakers conform to IEEE802.1x network standards, providing a cybersecure deployment.

There are many uses for our new IP speakers, including around a building and fence line for perimeter protection, anti-theft and vandalism in stores and parking lots, paging for employee and visitor announcements, crowd and queue management in large areas such as sports stadiums, as part of a passenger information solution in transportation hubs, and more.

a&s Adria: All Zenitel TCIV+ stations, kits, and IP speakers are now packed with the ONVIF Profile T features and you also use open-source code. How does that help to seamlessly integrate and map Zenitel solutions with other security systems?
Riha: ONVIF is an open industry forum that provides and promotes standardized interfaces for effective interoperability of IP-based physical security products. ONVIF profiles make it easy to recognize how ONVIF conformant devices and clients are compatible with one another. An ONVIF profile has a fixed set of features that must be supported by a conformant device and client. It ensures that a client that conforms to Profile S, for example, will work with a device that also conforms to Profile S. There are also conditional features, which are features that shall be implemented by an ONVIF device or ONVIF client if it supports that feature in any way, including any proprietary way. Optional functionalities are also defined, they do not need to be implemented but can if it’s chosen. Video and audio from our devices can be recorded, either manually or based on trigged events, or by other hardware and rule-sets in the security management system. As a company, Zenitel is committed to seamless compatibility.

a&s Adria: In 2021, Zenitel was awarded Work Boat Intercom Supplier of the Year by publication Baird Maritime. Since maritime is one of the most important verticals for Zenitel, your company did a lot of updates to its maritime intercom solutions. Update of the Ex Intercom stations as well as updating and adding new features to their range of IP Intercoms was part of this. Most importantly was probably the DNV classification of its new ICX AlphaCom System. Tell us more about these updates and what does DNV classification stands for?

Riha: Since we are a Norwegian company, we always seek DNV approval first for our range of maritime & energy products where this is required. Meeting DNV standards are important when there is requirement that needs this assessment. DNV is by far the leading classification society in our markets, and also when receiving a DNV approval it is easier when seeking other approvals for markets where this is required – such as ABS (American Bureau of Shipping), CCS (China Classification Society), LR (Loydss Register) and other. Meeting stringent requirement is a necessity in our markets, but at the same time the requirement are quite specific and doesnt necessarily cover all configuration and product groups. What is important is to meet the key requirements – usually related to central equipment and central functionality. When it comes to the ICX AlphaCom System this is then in compliance with:

  • DNV rules for classification – Ships
  • IMO Res. A.694(17) General requirements for shipborne radio equipment forming part of the global maritime distress and safety system (GMDSS) and for electronic navigational aids
  • IMO A.1021(26) Code on alerts and indicators (2009)
  • LSA Code VII 7.2
  • IMO MSC Circ 808

a&s Adria: Thanks to Zenitel, digital technology is going to play an even bigger role in the future of maritime, with more interfaces between systems and preferences for a “smarter” way of processing and distributing information. What will become possible in near future?

Riha: The maritime industry, although a traditional and long lasting industry segment is undergoing a global change to become smarter, safer and greener. Part of this is also the critical onboard communication systems. We see a change in RFQ’s towards more digital systems, based in IP technology and with interface between systems such as PAGA, Intercom, CCTV, Wireless communication and information & entertainment systems. However systems still need to be redundant and there is also a requirement in IMO regulations to have a secondary system onboard that is outside the main power of the vessel, so although we see core systems requiring more digital setup, there is still a huge market on analog systems as they are “safer” for pure onboard communication. Things we will see in the near future is more use of touch screens on the bridge and engine room control systems, where the onboard communication will be accessed via application interface on the main monitor. We also see that CCTV combined with audio is getting a stronger position, something that creates great opportunities for us as we have gained great experience interfacing CCTV systems with our own developed audio systems both in PAGA and Intercom segment. Lastly crew welfare is becoming increasingly important, and an onboard info & entertainment systems is not just a stand alone TV system anymore, but interfaced with other critical communication systems to make sure crew and passengers are notified early in case of emergency.

a&s Adria: As one of few organizations that have contributed to creating industry standards for safety and security, what is Zenitel’s approach to cybersecurity and can you highlight some of your strengths when it comes to preventing cyber attacks?
Riha: Zenitel is committed to keeping critical communication systems secure. We have kept IP security at the forefront for many years. In 2010, we were the first IP intercom vendor to implement IEEE 802.1X network access control. Zenitel is a member of the Center for Internet Security (CIS), a forward-thinking nonprofit entity that harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. The CIS Controls and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continually refined and verified by a volunteer global community of experienced IT professionals. CIS is home to the Multi-State Information Sharing & Analysis Center (MS-ISAC), the go-to resource for cyber threat prevention, protection, response, and recovery for state, local, tribal, and territorial governments.

Learn more from our Cybersecurity Hardening Guide here.

a&s Adria: By Market and Market’s estimates, the digital twin market is valued at $3.1 billion today and is projected to reach $48.2 billion by 2026. As a technology or a model that connects the dots between IoT, AI and big data, digital twin will help companies to increase situational awareness, reduce and mitigate security and safety threats, optimize operations, etc. Where does Zenitel see its role as digital twin technology adaption increases?

Riha: Zenitel sees its participation in a digital twin ecosystem through some of its solutions, such as IP speakers, intercoms, and public address/voice alarm systems. We believe our solutions will support digital twin by providing data/events that will allow businesses to further enhance their safety and security capabilities in different use cases such as access control, parameter management, emergency response, and more. We are ensuring that our solutions and systems have the necessary connectors that feed digital twin with events and data. For example, our range of IP devices has built-in hardware acceleration for edge AI, allowing better control of data to be kept private or to be shared with the digital twin.

Learn more here.

a&s Adria: Zenitel will be exhibiting at the Adria Security Summit next month in Zagreb. What do you expect from Adriatic region’s largest conference and exhibition, are you looking for new partners and distributors, and what is your opinion about Adriatic region’s security market in general?

Riha: First and foremost, we look forward to this event as an opportunity to meet many of our partners and customers. While we will be sharing our solutions, we are excited to have conversations with our partners and customers around emerging trends and how they are shaping up their expectations from a global player like Zenitel.

Iloq appoints new Chief Marketing Officer

Johanna Wretdal has been appointed as Iloq’s CMO, and she will also become a member of the company’s management team. Prior to joining Iloq, Johanna was the CMO for Silo AI.

Johanna is equipped with two decades of global experience, ranging from local startups to internationally listed, leading organisations. She will take overall responsibility of the company’s marketing and communications agenda, along with playing a key role in ensuring an end-to-end brand development that ultimately supports the organisation’s strategy. Johanna holds a Master’s Degree in Economics (Management & Organizations) from the Swedish School of Economics and Business Administration (Hanken).

“I am excited to become a member of the Iloq family, and together with the team and customers boost further impactful growth!” says Johanna Wretdal.