Tag Archives: Data

Milestone Systems ranked Number One global VMS provider by IHS Markit for tenth year in succession

For the tenth year in a row, Milestone Systems has been ranked as the Number One global VMS vendor by company revenue. That’s according to market research conducted by business intelligence provider IHS Markit. In 2017, Milestone Systems enjoyed a global VMS market share of 10.2%, with 9.1% being the corresponding figure in 2016.

“The world market for VMS is estimated to have grown by 8% in 2017,” said Jon Cropley, senior principal analyst for video surveillance at IHS Markit. “Supply to this market is gradually becoming more concentrated. The top largest vendors are estimated to have accounted for 48% of global revenues in 2015. In comparison, this figure was 57% in 2017.”

MilestoneDevelopment2

Lars Thinggaard, president and CEO at Milestone Systems, stated: “Milestone Systems experienced a solid VMS revenue growth of 21% over 2016, which was almost triple that of the market. There is no doubt that our open platform community and partnership business model is the reason for this positive development, and we’re proud to be a trusted and reliable partner in the community.”

Thinggaard concluded: “We will keep investing in our partner community, focusing on new technologies within cameras, access control and video analytics. We believe in a future where video will play an even more significant role in understanding data sources from the increasing numbers of devices that connect people and assets.”

Milestone Systems not only retained the Number One position globally, but also holds the top spot in Europe, the Middle East and Africa thanks to a market share that increased to 17.1% from 14.8% in 2016.

The company maintains its top position in the APAC region, with a market share of 12.4% compared to 11.7% the year before.

Finally, Milestone Systems jumped one spot in the Americas and is now ranked as second overall in the region (with an 11.3% market share compared to 9.6% in 2016).

Advertisements

Leave a comment

Filed under Risk Xtra

CSL announces Dahua Technology as latest Connected Partner

Dahua Technology is the latest Connected Partner of CSL. Dahua is a leading solution provider in the global video surveillance industry. The CSL Router is now compatible with Dahua’s range of CCTV systems, providing an upgrade for any existing broadband service to an Instant Private Network, reliable 4G connectivity when wired broadband is unavailable or a combination of both.

CSL’s sales director Rob Evans commented: “We’re delighted to announce Dahua as our latest Connected Partner, supporting us in delivering reliable instant connectivity for CCTV installations. Our expertise in the alarm signalling market puts us in a great position to provide the secure delivery of data for the CCTV sector.”

DahuaTechnologyLogoWeb

Dahua’s head of marketing Ben Perkins responded: “Dahua Technology is committed to being a market leader in collaborative systems by working with the best manufacturers and solution partners in the industry. We’re excited to be able to add the benefit of CSL’s 4G connectivity for our customers, further increasing the flexibility of our systems.”

Since its launch, the CSL Router has already provided hundreds of installers and their end users with a rapidly deployable connectivity solution for CCTV. The CSL Router is GDPR ready and fully encrypted at every point via the CSL Gemini Global Platform, which removes the vulnerabilities of hacking and guarantees that data is kept safe.

Leave a comment

Filed under Risk UK News

Biometric recognition solutions specialist ievo produces new set of product videos

ievo Ltd, the Newcastle-based manufacturer of biometric recognition systems, has just launched a new set of product videos aimed primarily at installation partners to help explain to customers the unique benefits and functionality of its readers.

Ash Westgate, ievo’s marketing manager, commented: “In essence, they’re a set of marketing and sale aids for our installers to help showcase specific aspects of our readers and systems. We wanted to show clients and customers the readers performing and functioning with some of the hazards that our solutions can overcome.”

ievoProductVideos

The readers can be installed to work with a variety of access points such as turnstiles, barriers and doors, etc. They integrate with existing access control systems from well-known manufacturers such as Paxton, Stanley, Honeywell and Nortech.

The access system can be customised with a variety of options depending on requirements to provide a deeper level of security using non-infringed biometric data.

*The ievo product videos are available to view at https://www.youtube.com/user/ievoreader

Leave a comment

Filed under Risk UK News

‘Technology at the Edge’: Axis Communications unveils Top Five Trends to shape 2018

Surveillance specialist Axis Communications’ CTO Johan Paulsson has outlined the Top Five Trends that the company feels will shape the New Year. 

Paulsson stated: “As the Greek philosopher Heraclitus said: ‘The only one constant in life is change’. There’s perhaps no better example of this than the technology industry, where innovation is so rapid that even the most fantastic of imagined futures seem like they could become a reality in the not too distant future.”

Axis Communications has put together five top technology trends that the Lund-based business feels will have a great impact on the security and surveillance industry now and in the years to come, helping to facilitate a smarter and, of course, safer world.

JohanPaulssonCTOAxisCommunicationsWeb

Johan Paulsson: CTO at Axis Communications

(1) A move towards the edge

“Two of the greatest trends that have propelled our industry forward in recent years,” observed Paulsson, “are cloud computing and the Internet of Things (IoT), both of which are delivering undeniable benefits to businesses and consumers alike. That said, they also come with implications, namely the rise in the amount of data being transferred, processed and stored. Going forward, we anticipate that ‘edge’ computing will become ever popular, alleviating this issue by performing data processing at the ‘edge’ of the network, closer to the source of the data. Doing so significantly reduces the bandwidth needed between sensors, devices and the Data Centre.”

(2) Cloud-to-Cloud

Paulsson observed: “Despite the move towards edge computing, the cloud will continue to play a significant role in IT infrastructures. As an increasing number of companies offer cloud-based services, the cloud ecosystem is increasingly becoming the preferred point of integration, rather than the traditional on-premise system. One benefit of integration between clouds is the significant potential reduction of in-house IT services required, in turn creating great cost benefits.”

(3) Deep and machine learning

According to Paulsson: “We’ve now reached a stage where the full benefits of deep learning architectures and machine learning can begin to be realised. The explosion of data available to analyse is helping businesses become increasingly intelligent. As applications develop, there are significant opportunities for predictive analytics which could facilitate incident prevention: from terrorist incidents to slip and fall accidents; from traffic issues to shoplifting and even the tragedy of rail suicides.”

(4) Cyber security

“Once again,” outlined Paulsson, “cyber security must appear on the list of trends for the next 12 months and beyond. The constant enhancement of cyber security will be a never-ending task. This is because well-resourced cyber criminals will never stop looking to exploit vulnerabilities in any new technology. As the number of connected devices grows, so too do the potential flaws that, if left unaddressed, could provide the opportunity for networks to be breached.”

Embellishing this theme, Paulsson said: “Legislation is being created to address these concerns. In the European Union, the forthcoming General Data Protection Regulation – the deadline for compliance for this being 25 May – will unify the protection of data for individuals within the EU, wherever that data is held or used.”

(5) Platforms to realise the full benefits of the IoT

In conclusion, Paulsson informed Risk UK: “The IoT has reached a point where it’s crucial to use scalable architecture to successfully collect and analyse data and manage the network of connected devices. Such an IoT platform allows equipment from different node vendors to co-exist and easily exchange information to form smart systems using existing network infrastructure. There are numerous companies, both well-established providers of technology and new market entrants, that are enabling platforms to support IoT devices. The next 12 months will see further maturation of this process.”

*Read more: https://www.axis.com/blog/secure-insights/technology-trends/

Leave a comment

Filed under Risk UK News

IDIS strengthens integrity of video surveillance with critical failover

IDIS has debuted a powerful suite of features designed to bring critical failover capabilities and peace of mind to users of the company’s innovative technology offerings. Bringing together existing, improved and new failover features, IDIS addresses multiple threats to crucial video surveillance operations with IDIS Critical Failover, a collection of five capabilities that strengthen the fault tolerance of end users’ CCTV infrastructure.

“If any part of video surveillance infrastructure fails, it’s critical to first recognise the failure and then initiate appropriate alternative or redundant technologies to minimise loss of data,” noted James Min, managing director of IDIS Europe. “Full redundancy of every component in your infrastructure is prohibitively expensive and adds unnecessary complication in most cases, while manual recognition and resolution costs precious time and risks gaps in footage. IDIS Critical Failover reduces both issues through a multi-layered collection of capabilities spread across the devices in your infrastructure.”

IDISCriticalFailover

IDIS Critical Failover consists of five parts: Temporary Smart Failover, Smart Failover, Storage Redundancy, NVR Failover and Dual Power Supply.

If you experience a problem with network instability, Temporary Smart Failover starts recording to an internal recording session buffer (of at least 60 MB), ensuring there’s no break in the data being sent to the NVR. For longer network issues, such as a complete failure of the link between the camera and the NVR, Smart Failover takes over. When the IP camera and NVR become disconnected, the camera instantly begins recording to an internal SD card. It records at the original quality until half of the SD card is filled up and then adjusts the quality to ensure a full 24 hours of footage is captured on just a 32 GB card. H.265 cameras add support for SDXC cards, with a theoretical limit of 2 TB. Once the network link is restored, all of the data is automatically transferred to the NVR, leaving no incident unrecorded.

Storage Redundancy exists inside the NVR (DR-8364D) in the form of native RAID 1 or RAID 5 support. With RAID 1 support, the NVR stores two identical copies of the data: if one disk fails, the data is then retrieved from the second one. RAID 5 stores the data and additional parity data in separate locations, providing the same redundancy, but more efficiently than RAID 1.

NVR Failover protects against the failure of the entire NVR. Both the primary and standby NVR continuously monitor one another to quickly switch to the functioning NVR during a failure, reducing the risk of data loss and decreasing failover response times.

Finally, native Dual Power Supplies (DR-8364D) provide a redundant power supply in case the first one fails, increasing uptime and reducing the risk of data loss.

*View Critical Failover in action: https://youtu.be/FvAgyOSuhTM

Leave a comment

Filed under Risk UK News

Hanwha Techwin Europe awarded Government’s prestigious Cyber Essentials certification

Hanwha Techwin Europe has been certified as being compliant with the UK Government-backed Cyber Essentials scheme. Administered by the Department for Business, Energy and Industrial Strategy, the industry-supported scheme is designed to help organisations protect themselves against common cyber attacks.

The certificate awarded to Hanwha Techwin Europe verifies that the business has procedures in place specifically designed to minimise the threat of an attack on the IT infrastructure at the company’s headquarters in Chertsey, Surrey and extends to cover laptops used by field-based employees.

HanwhaTechwinEuropeHQ

“We’re constantly evaluating and updating our IT security in order to negate the risk of any disruption to our business or our business partners,” said Bob Hwang, managing director of Hanwha Techwin Europe. “Our cyber security programme is a key element of our ‘We Move With Trust’ philosophy and reflects the proactive stance we’re taking to protect confidential data.”

CyberEssentialsLogo

Hwang continued: “Beyond the scope of the Cyber Essentials scheme, we remain vigilant to ensure that our Wisenet cameras, recording devices and software entrusted to protect property, people and assets are equipped to minimise the threat from cyber attacks. We have a sustained testing and monitoring programme in place designed to identify evolving new threats to the integrity of our solutions. We’re determined to be open and honest with our customers when new cyber security threats are identified and will move quickly to develop further advanced versions of our firmware to combat them.”

Leave a comment

Filed under Risk UK News

Euralarm outlines content of upcoming new study on false fire alarms in Europe

Fire and Rescue Services collect facts and figures during responses to alarms from fire detection and alarm systems. Now, Euralarm has reviewed the different approaches for data collection and analysis in England, Germany, Switzerland, Sweden and Austria.

A key observation is the differences noted between the examined countries. These differences hamper comparisons, although a view of the European norms would suggest the opposite. Euralarm is therefore calling for more co-operation between the stakeholders involved which would enable new insights into fire alarms in general.

Buildings are safer today because of the fire detection and alarm systems installed within. Indeed, without these systems, fires would go undetected and spread. Exit routes would be impassable due to smoke and fire, resulting in injuries and even fatalities, aside from damage caused to the building(s).

EuralarmFireAlarmReport

As is the case with any system, though, there are conditions that can lead to false alarms binding public and private resources as well as hurting the reputation of fire alarm and detection systems. False alarms can be reduced, for example, through the use of modern multi-sensor fire detectors as well as the regular application of correct maintenance requirements, making the systems reliable and dependable for building occupants.

In spite of such existing solutions, the market is lacking sufficient data that would outline the potential to reduce false alarms even more. An initial study by Euralarm in 2012 showed that data sources were missing and existing sources not comparable. Reliable details (eg data pools) on the range of false alarm difficulties and their causes are needed. At the moment, lack of such detail is hindering the development of a suitable basis upon which to define and deploy effective countermeasures.

The new study focuses on investigating data collection and analysis processes in order to achieve a better understanding of what needs to be done and, hopefully, will provide momentum for changes to be made.

Key observations

The review of the data collection process of transmitted alarms from fire detection and Alarm systems has been carried out by the Euralarm Task Group for False Alarms.

The project’s objective has been to analyse the specific methodologies by taking an empirical approach, with the aim of deriving a common understanding of the facts and figures collected during Fire and Rescue Services’ responses to fire alarms.

From the existing data pools, members of the Task Group then attempted to calculate the false alarm ratios based on four different models. In doing so, they then took the step of attempting a comparison between the investigated countries.

One of the observations of the review is that comparison of fire alarm figures in the respective countries is hampered by “missing alignment” in terms of common terminology and processes. A view towards the European norms would suggest the opposite, but the fact is that the application guidelines are national and these are the basis for any data collection. The analysed material recorded and collected by experts during responses to fire alarms is handled quite differently from country to country.

Lack of proper information leads to narrow or wrong measures being implemented, which is clearly detrimental to society and must be changed.

A fundamental understanding of fire alarms – and specifically false alarms – is a requirement for any attempts towards betterment. Since a common approach would (in principle) be possible, Euralarm proposes that the fire safety industry, Fire and Rescue Services and building owners work far more closely together on this matter.

*The full report will be published in Q4 2017

Leave a comment

Filed under Risk UK News