All posts by tycosecurityproducts

American Dynamics Training Product Voucher Available

American Dynamics offers hands-on learning experience on the installation, deployment and configuration of VideoEdge network video recorders (NVR).  The victor and VideoEdge Installer training classes are held throughout North America. This three-day training class covers the basic configuration of victor Application server and victor unified client.

advictor

Course topics include:

  • VideoEdge software
  • NVR archiving
  • NVR failover
  • Point-of-sale integration on victor
  • Video analytics
  • Third-party integrations
  • victor backup

View the available training classes.

New Product Vouchers Available

Attend an American Dynamics VideoEdge Installer training class from April until June 30, 2016 and receive a voucher to be used when purchasing American Dynamics IP video security solution products. All attendees who pay in excess of $1,000 for the training will be eligible for a voucher. Each voucher will be for $1,000 off VideoEdge, victor and Illustra products. Vouchers will be handed out at the completion of the training class.

Redeeming Vouchers

To redeem a voucher, attendees must include the voucher number on their purchase order at the time of submission. The Tyco Security Products orders department will verify the validity of the voucher. The voucher must be redeemed by September 30, 2016. Vouchers that are not used by September 30 will be forfeited.

If you have questions regarding American Dynamics training, contact our training department at +1.561.912.6552 or annewilson@tycoint.com.

ISC WEST SESSION: THE CONVERGENCE OF PHYSICAL AND CYBER SECURITY

Physical and cyber attackers have more sophisticated tools and understanding of network-based systems than ever before, shining a spotlight in particular on the vulnerabilities of security implementations.

CCU

This ISC West session will provide an overview of the four levels of physical security threats beyond perimeter, perimeter, boundary and volumetric security, and present best practices to ensure cyber security readiness.

ISC West Session
The Convergence of Physical and Cyber Security:
Recognizing the Readiness of IP-based Systems

Wednesday, April 6, 2016
11:15 AM – 12:15 PM PDT
ISC West
Sands Expo Center
Room 302
Session Overview

Presenters

WallaceDavid Wallace
Founder & CEO, Surveillance One

BrownWilliam L. Brown, Jr.
Sr. Engineering Manager, Tyco Security Products

We hope to see you at this important ISC West Session. If you have any questions, please let us know.

Airport security soars on strength of integrated platform

Ever expanding and seemingly always in flux, airports present great opportunities but also major challenges for security integrators and security technology providers.

Airport Security Today

Today’s modern airports are security-centric enterprises that have multi-faceted surveillance and access control systems. Although airport security was heightened after the terrorist attacks in the United States on 9/11, anytime these facilities undergo some degree of modernization or add to their footprint, they are presented with the prospect of taking security to the next level.

However, any changes to an airport security system must take into account the substantial technological investment that has already been made as well as the importance of keeping the systems manageable on 24/7 basis.

About Izmir Airport

At Turkey’s Izmir Adnan Menderes Airport, this blending of old and new occurred as the airport constructed a new domestic terminal with a security system that needed to mesh with the one in the existing terminal installed more than 10 years earlier.

While the airport’s operator TAV-Ege was eager to introduce IP-based products into the new terminal, it also wanted to leverage its existing and still highly functional components from the old terminal such as analog cameras.

Izmir Airport

Solution

To meet the airport’s needs, together with the help of integrator Sensormatic Guvenlik Hizmetleri, Tyco Security Products presented airport officials with an integrated solution that could accommodate the 700 analog cameras from the old terminal, while also handling the 600 new IP cameras from the newly constructed building.

The installation of modern VideoEdge network video recorders (NVR) from American Dynamics and backbone systems like the victor unified security solution and Software House’s C-CURE 9000 security and event management platform ensured that the airport would manage both old and new cameras and access systems seamlessly from a single platform.

Izmir Security Center

The new unified platform also brought a fuller feature set to the airport, offering video analytics within the NVRs so security staff could:

  • Recognize and address threats more easily
  • Save time with real-time alerts of objects abandoned
  • Intelligent, powerful analytics automate security operations
  • Greatly reduce time searching for incident evidence
  • Presents better control of restricted areas through the C-CURE access control system
  •  Brings together CCTV and access so system operators can now view video along with any alarms that occurs

Even as the capabilities of the system have increased, however, the ability to manage it remains intuitive and straightforward, which is critical in a potentially high-risk environment like a major airport.

Izmir Security camera

As Turkey’s fourth busiest airport, Tyco Security Products complete solution has poised Izmir Adnan Menderes Airport for growth and scalability to allow for future system upgrades and even camera additions if warranted.

And as more airports undergo this type of expansion, the demand for integrated solutions that bring old and new systems together should only increase.

Read the entire case study.

Learn more about how Tyco Security Products
can help you easily migrate from analog to IP.

American Dynamics Introduces victor and VideoEdge 4.8

The latest version of American Dynamics victor and VideoEdge reduces case investigation time. Version 4.8 includes the following new features:

Download now.

Incident Management Clip Builder

Clip builder allows users to quickly edit video clips and more efficiently manage incident reporting. Users can organize video clips for investigations fasters. With clip builder, users have a single, complete, convenient location to store and view all relevant clips for each investigation.

  • Drag and drop clips into the clip builder
  • Use the intuitive red playhead line and toolbar to crop, cut, split
  • Add the edited video clip to an incident or quickly export for use with an incident report

Watch a video on how to configure the clip builder.

Incident Management Image Editor

The new image editor gives users the ability to better illustrate and call out the actions happening in a particular incident. As part of the incident management tools, users can right click on image clips to open the image and begin adding content to the clip. The toolbar at the top allows users to:

  • Crop the image
  • Add text of any size or color
  • Add shapes such as an ellipse or square
  • Save both the original and enhanced image

victor and VideoEdge 4.8

Surveillance Window Recording

Simultaneously records all streaming video in your selected layout into a single clip file. Easily create a clip Click the red button to begin and select the red button to end. Once the recording has been ended, it can be saved, saved to an incident or exported. The clip will play back exactly as it was in the surveillance window.

Watch a video on how to configure this feature.

victor and VideoEdge 4.8

Schedule Clip Downloads

The new schedule clip download tool enables operators to schedule the automatic retrieval of reoccurring video clips they need to review daily, saving on bandwidth usage and operator time spent manually queuing videos for download. Queuing regular video footage downloads such as locking a cash drawer up at the close of business, automates routine processes and increases operator productivity. Schedule clip download allows users to customize the length of the clip, saving location and clip expiration.

Custom Layouts

Users can create their own custom video layouts tailored to their own needs. By navigating to system values and video layout preferences, you can define your new layout.

  • Name your unique layout
  • Define the number of columns and rows
  • Select aspect ratio: standard, widescreen or portrait
  • Merge multiple cells together
  • Split images further horizontally or vertically
  • Add images to deactivated cells
  • Save layouts, export and easily import into other victor systems within a few clicks

4.8-Custom-Layout

VideoEdge Storage Management

Users will also be able to specify minimum and maximum camera recording rates and receive notifications in the event log on their specified levels through the VideoEdge NVR and VideoEdge Hybrid NVR Client or through victor. The new storage management feature ensures improved health monitoring and optimal storage capacity.

Enhanced exacqVision Support

victor offers enhanced camera management capabilities, including 360 fisheye camera client-side dewarping for exacqVision NVRs in live and recorded mode. Client-side dewarping records one video stream and eliminates the possibility of redundant recording, allowing users to zoom in and navigate within the image for greater detail.

victor-exacqVision-Fisheye-dewarp

Third-Party Integrations

victor is now supported by the following integrations:

  • 3VR video recorders
  • Bosch video recorders
  • Thyssen Krupp Elevators
  • Kone Elevators
  • Otis Elevators
  • Galaxy Intrusion panels

Transcoding Optimizes Video Bandwidth

Whether it’s the casino operator who needs high resolution video from more than 100 cameras or the security director who needs access to a live event from his/her iPhone and requires a real-time high quality image stream from multiple cameras, American Dynamics advanced stream management brings video transcoding to the next level.

Network Bandwidth, CPU Resources and Memory Usage Reduced

While IP video and mobile devices offer greater surveillance capabilities, these come at a price. Increased CPU bandwidth associated with today’s high resolution and full featured cameras adds overhead costs and network resource constraints.

lower bandwidth

During critical situations, users may need to access video remotely from a device that is readily available, oftentimes a smartphone or a tablet. However, when transmitting video from IP cameras to these devices, latency can occur, which delays the time between the alarm and the transmission of a usable image.

VideoEdge and victor streams are managed to provide users with video tailored to fit their physical viewing conditions. By managing the stream, network bandwidth is greatly reduced with no visible difference to the user, and CPU resources are conserved while using less client memory than possible before.

VideoEdge Transcoding Requires No Additional Server or Configuration

VideoEdge users can achieve greater efficiency and higher definition image quality while using their existing cameras through transcoding — a video stream method that reduces the scale of video, converting it to one best suited for the available network connection, such as MPEG-4 to H.264. While transcoding is not a new tool, what is different is that the optimal results now are even easier to realize with an NVR and a video management system, without the need for an extra server, new workstations or expensive super computers to run the video management system (VMS) software.

no server requiredThe automatic stream management in VideoEdge requires no additional configuration. VMS systems can automatically determine the optimal image quality required to view video from multiple, different resolution megapixel cameras on a 1080-pixel monitor.

And when end users need to access multiple views during an active security event in progress like a building alarm going off or a hostage situation unfolding, the VMS can enable access to up to four live video feeds on a smartphone — up to six on a tablet — in a format that is sufficient for viewing on mobile devices without overcompensating.

iPhone/iPad transcoding

Improves User Experience and Reduces Total Cost of Ownership

Just by leveraging the components already required for a video surveillance setup, end users can get the video quality they want in the format that works best for their requirements, when and where needed. For example, users can respond to alarms and other events on the system without being hindered by a slow client. The overall user experience with American Dynamics stream management improves usability for live and recorded video.

And that’s important these days because video systems are diverse. Users are combining multi-megapixel cameras with different bandwidth needs and viewing all of them on a single monitor.

Together, transcoding and the other aspects of optimal stream management help to balance systems, allowing the most challenging situations regarding image quality and delivery to be handled seamlessly from within the VideoEdge system. This ensures that users only have to be concerned with addressing an event as it unfolds before them.

Download our Resource Management whitepaper to learn more about stream management technology and transcoding.

St. Joseph’s Health Care: The Right Technology at the Right Time

St. Joseph's LogoThere are thousand of moving parts in a health care organization, which operates on a 24/7/365 schedule. A medical facility such as St. Joseph’s Health Care Londonin Ontario, Canada, requires a security system that provides around-the-clock monitoring and immediate access as events unfold, day or night.

The organization also knows that it can certainly benefit from the latest advancements in security technology, but the approach to adopting new systems has to come with a sound strategic plan in mind.

When St. Joseph’s recently underwent an upgrade in its security system to include IP video, among the key areas the security team wanted to address were video clarity, latency and breadth of coverage so it could better monitor and respond to the ongoing and potential incidents taking place inside and outside of the hospital.

IP CamerasTo achieve these goals, St. Joseph’s and its integrator, Integrated Video & Surveillance, added more than 45 IP cameras to supplement the hundreds of analog ones already in place, upgraded its video platform and tapped into the power of analytics.

Aided by the improved video quality of an IP-based system, with a video platform that allows security personnel to view images in real time, without playback interruption, means officers can follow a situation as it occurs, moving seamlessly from one camera view to another and at a resolution level so they can critical information clearly.

The addition of IP cameras with improved resolution and seamless recording and playback performance also provides St. Joseph’s with the ability to address myriad issues that are at the heart of running a successful medical facility — whether it is monitoring hallways and parking lots for potential accidents or checking out who is trying to access a restricted area, such as a pharmacy or psychiatric ward.

Security Center

Deploying analytics added another level of sophisticated functionality to the security system, allowing St. Joseph’s security staff to engage in people counting or set security perimeters in specific areas that will trigger alarms in the system.

Like any organization looking to update its systems, St. Joseph’s approached the project with goals and a budget in mind. There are many new systems available for improving security these days, so it takes careful planning and a strategic partnership with an integrator to settle on those areas that will bring the most benefit. Instead of swapping out everything that was in place, like the hundreds of analog cameras, St. Joseph’s strategically deployed technology that would take it to the next level.

And the organization is now poised to continue its updates, operating from a timetable and with a program that works within the parameters it has carefully set.

To read more on St. Joseph’s Healthcare and their transition to an IP video platform, click here to download the full case study.

Unification = Simplification

There are two things we never seem to have enough of — time and money. Thus, when the opportunity presents itself to save both, wouldn’t we jump at the chance?

The move to a unified security platform is designed to address both of those sweet spots for end users and integrators. Rather than relying on separate servers to run access control and video surveillance systems, under unification, a single server handles both operations.

You can see where the cost savings can come in. Rather than investing in dual servers, you can operate with just one. And one server also means fewer licenses, easier licensing management, improved maintenance through a single health monitoring system, reduced installation time…and the list goes on.

unification, victor, american dynamics, software houseBut investing in a security solution isn’t just about saving money. It’s also about product performance and ensuring that you get the critical information as quickly and accurately as possible.

Unification addresses that piece as well. Bringing access control and video together into one server means bypassing the middleware and extensions that typically are relied upon so one system can communicate with the other.

When time is of the essence, and when it comes to security it is, the ability to retrieve video or access data as quickly as possible is critical.

Under a unified server scenario, while video and access control are tied together, you still have the opportunity to leverage the power of integration. Information from other related peripherals such as smoke alarms, intercoms, motion detectors, building systems, etc. can still be brought into the system for monitoring.

This allows security personnel to have the best of both worlds: unified access and video AND the ability to respond to and provide better information when an event is underway through data from integrated systems.

Additionally, when conducting an investigation after an event, you’re able to reduce the number of steps you would have had to take in a two-server environment. Take for example, someone who is experiencing multiple card rejects, who tries to damage a card reader on the wall and cameras in that area capture the incident. In an unified system, the time it would have taken to match the card reader data with the video is reduced by tools available through unification. Using functions such as data visualization, security personnel can find a high number of card rejects and then go to the corresponding video more quickly than if they were still operating in a two server, two client environment.

In a word, unification comes down to simplification — fewer steps, lower costs, more results.

Learn more about how unified solutions helped Rush University Medical Center in Chicago simplify and secure its security operations in this video.

 

Multi-Airport Access Control and Video Security Unification

Travelers worldwide have come to expect top-notch security whether a flight takes them to an airport terminal at Chicago O’Hare International Airport, London Heathrow Airport, or Haneda Airport in Toyko.

Security is an expected part of the airport travel experience, starting from the moment people enter the parking garage with their vehicle, as a person walks up to the ticket counter at the airport, and as they go through the security screening checkpoint for passengers.

Multi Airport Access Control and Video Security UnificationAccording to The International Air Transport Association, airlines project 3.6 billion passengers globally in 2016. The IATA has identified Latin America as an emerging economy that will see the strongest passenger growth.

Despite all airports around the globe being required to meet a minimum set of security requirements, every location has a slightly different take on the type of access control solution deployed to manage the coming and goings of employees, or the video system used to monitor passengers.

At 12 airports across the Pacific Coast in Mexico, the company that manages these airports has recognized the benefits of taking an integrated and standardized approach with its security.

The Pacific Airport Group (PAC), which manages airports in Los Cabos, Tijuana, Mexicali, Guadalajara and other locations in Mexico, reports more than 21.3 million passengers traveled through its terminals in 2012. Needing to upgrade its security technology and move from a standalone security approach, PAC decided it was time to integrate its cameras, recording devices and video management software with its access control system.

While an integrated approach isn’t unique, the standardization at multiple locations is what sets this project apart as many airports had previously installed standalone security solutions. In addition, the integration of cameras, recording devices and video management software with the access control system was a priority at each terminal since the objective was to have sufficient information at a moment’s notice in case an unauthorized individual crossed a critical access point.

In total, the PAC reports 910 cameras installed, all managed by American Dynamics recording systems, including VideoEdge NVRs. In addition, the access control component of the project is built around the C∙CURE 9000 event management system from Software House.

Read the entire case study on the Tyco Security Products website for more details about this successful multi-airport access control and video security unification project.

The scale and the scope of the PAC project alone is a testament to the progress being made relating to security at airports around the world. The next time you take flight to the Pacific Coast of Mexico, you can be assured the access and video surveillance systems here are some of the best in the industry.

 

What road blocks have you encountered when trying to integrate access control and video security integrations across multiple facilities? Please leave me a comment below.

Technology to help go with the flow | preventing card user fraud

In the post-9/11 world, access control has become ubiquitous, especially in the corporate world where thousands of people stream into and out of individual office buildings every day.

Workers equipped with access cards enter through turnstiles, actual and virtual, or gain entry into buildings through card-controlled doorways. A swipe of a card allows the cardholder access. But what is there to prevent the wrong person from using someone else’s card to gain admission to the site?

A form of identity theft, if you will, card user fraud takes place when a person who isn’t the actual cardholder enters a building under false pretenses. Security personnel may react when an unfamiliar face comes through the entryway, even if the card still works. But in a setting such as a corporate headquarters, where hundreds of people are converging on the entrance at one time, security may not be able to visually identify illegal card users. And even if they can, they want to ensure that the flow of people continues unimpeded.

Fortunately, technology has advanced to the point where, through the unification of video management and access control systems, security personnel can stay on top of potential identity fraud at the point of access. Unification means that personnel can avoid operating multiple programs, having to toggle between various screens or stopping everyone to determine whose access is being denied.

Consider the example of the corporate office building. At the height of the morning rush, dozens of people may be passing through the access point each minute. Under the unified “swipe and show” technology, a security officer will see an image of each individual card user from the database as they pass through the access point, and can use that to visually compare it with what they are seeing live. If there is an anomaly, they can pull the person aside and verify their identity without stopping the flow of other entrants.

card user fraudAdditionally, policies programmed into each cardholders’ access information may trigger alerts for security personnel. For example, if someone is entering at the correct time with an active credential, the officer will see an image in the software with a green border. But if the person has broken a policy, such as trying to gain access after hours or through the wrong door, the border may appear as yellow for a minor violation that still allows them access, but needs to be addressed in person; or red, which means access is denied.

Remote access is another application for the “swipe and show” technology. The security officer in the control center sees both the image on file as well as live video as a person seeks entry at the remote location and has the ability to react quickly to allow or deny admission.

While the focus is on proper identification, the side benefits of “swipe and show” are that access continues seamlessly for those who should be allowed entry and security personnel have yet another tool for quick and easy card fraud prevention.

 

Are you using “swipe and show” security technology? If so, how has it impacted your business? Please leave me a comment below.

Making POS data work for you

One clear benefit of living in our electronic age is the amount of information businesses are privy to on a daily basis. For those looking to determine the whos, whens, whys and wherefores of what is occurring in their retail space, they have only to look to their POS (Point of Sale) systems to come up with a huge array of information.

But the flipside of having all this information, of course, is making it into something that is usable and actionable. A retailer can run dozens of reports, but even a reduction of thousands of transactions to hundreds in a single report are not actionable and may be of little use.

POS dataThe integration of POS data and systems with surveillance and video recording has moved retailers one step closer to putting the data to work for them. Now, when there is an incident that raises a red flag, the retailer can go to the video and check out that specific transaction.

But that still requires the retailer to determine that something is amiss and search through the appropriate video files until he finds that particular transaction.

However, by employing analytics to the long list of transactions, the business owner or his loss prevention person is freed from doing a lot of the investigative work on his own. Analytics allows him to drill down, making both the POS data and the video more usable.

By telling the system what he is looking for — for example, filtering the reports with hundreds of exceptions to show only the one with no customer present — he is able to narrow the information to an actionable list of transactions and collect video with each transaction. Among the 100 merchandise returns on that given day, ten are highlighted as having no customer present; now the retailer can focus on those cashiers and see why this is occurring.

And what about all those reports he is able to run? Is there a way to link video to them so the information is more manageable?

Exception reporting is a tool used by loss prevention specialists to compare current POS data with historical standards, looking for anomalies along the way that could be the indicators of fraud or loss.

While the data from these reports is certainly important, when tied in with video, it becomes even more valuable. Now as each item on the exception report comes up, so does the video that adds visual evidence to that specific exception. And the viewer can easily discard incidents that don’t show suspicious or illegal behavior from his list, and focus instead on those few exceptions that may be linked with actionable activities.

For the loss prevention professional charged with creating and acting on exception reports, this makes the job easier, faster and more effective.

The data in the reports can also be presented as a graph, making the information more understandable and easily consumable to a store operator looking for anomalies that he can tie to video for further explanation. Beyond security, the user can also overlay these graphs with historical performance data or with data from other stores so he can observe trends in his business operations.

The goal with all of this data is to make information that was once static and complex, pertinent and easily discernable through the use of analytics and video.

 

Does your organization already use analytics as part of your loss prevention program? If so, please leave us a comment below.