1. 2 A Complete Solution We help enterprise and government organizations to enhance their security operations and improve business performance using smart.

Slides:



Advertisements
Similar presentations
Introduction to ViconNet
Advertisements

Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 1 Embedded Computing.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
1 Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster.
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
Submissions November 2007 Stephen McCann, NSNSlide 1 IEEE 802 Emergency Services (ES) Call for Interest (CFI) Date: Stephen McCann
Aviation Security Training Module 4 Design and Conduct Exercise II 1.
1 Introduction to Transportation Systems. 2 PART I: CONTEXT, CONCEPTS AND CHARACTERIZATI ON.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
Multiplying binomials You will have 20 seconds to answer each of the following multiplication problems. If you get hung up, go to the next problem when.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Video Services over Software-Defined Networks
Broadband Wireless Applications for the Mining Industry.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 1.
2007 Gas & Oil Application Presentation © Copyright Netronics Inc.
Chapter 1 Introduction to the Programmable Logic Controllers.
Chapter 1: Introduction to Scaling Networks
Emergency and Overtime Fan-Out. 2 9/4/2012 About Us In business since 1992 Core strength: Integrating event-driven systems with communications networks.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
ABC Technology Project
Netronics Wireless Solutions for Video Surveillance
NetAstra 5000 Product Overview
Chapter 15 Integrated Services Digital Network ISDN Services History Subscriber Access Layers BISDN WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998.
© 2005 AT&T, All Rights Reserved. 11 July 2005 AT&T Enhanced VPN Services Performance Reporting and Web Tools Presenter : Sam Levine x111.
Checking & Corrective Action
© 2012 National Heart Foundation of Australia. Slide 2.
Sets Sets © 2005 Richard A. Medeiros next Patterns.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
NUUO MainConsole.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
25 seconds left…...
Chapter 10: The Traditional Approach to Design
Systems Analysis and Design in a Changing World, Fifth Edition
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
1 Honeywell Security Group Banking & Finance Solutions.
NIMS Resource Management IS-700.A – January 2009 Visual 5.1 NIMS Command and Management Unit 5.
A new Network Concept for transporting and storing digital video…………
April Corporate:  Established in 2002  Acquired ioimage video analytics in 2010  Experts in enterprise-class security systems  Technology innovator.
XProtect® Expert 2013 Product presentation
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
XProtect™ Smart Wall Advanced product option
Axis Intelligent Video Intelligence where you need it.
XProtect® Smart Wall.
Date / references EBMS Solution for Police Agenda EBMS Product Range Emergency Service Sensor Solution Tracking Solution Video Solution Check.
Sales & Marketing Department Surveon Technology Surveon Enterprise VMS 3.1 Product Introduction.
MainConsole V3.4.0 New Feature. What is New on V3.4 New Windows OS support New Windows OS support Window 7 32bit/64bit Window 7 32bit/64bit Server 2008.
Sales & Marketing Department Surveon Technology Surveon Professional NVR3000 Product Introduction.
Surveon Enterprise SMR8300 Product Introduction Sales & Marketing Department Surveon Technology.
IP-based Integrated Security Solutions for Airport Operations and Security AirporTech Asia 2008 Danny Peleg.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
ACTi IVS Server 2 (Intelligent Video Surveillance) Connecting Vision.
© Copyright AD Group Overview Presentation. © Copyright AD Group Introduction  The new Dedicated Micros DV-IP Server is a high performance scalable hybrid.
MAXPROTM VMS Overview.
APV7000 Software. Why IP? Scalability - IP network can extend to different physical locations. Image can be transported and duplicated worldwide, stored,
WHY VIDEO SURVELLIANCE
Intelligent Video Surveillance – The End of CCTV
Station Management System
WHY VIDEO SURVELLIANCE
Designed for powerful live monitoring of larger installations
Presentation transcript:

1

2 A Complete Solution We help enterprise and government organizations to enhance their security operations and improve business performance using smart video solutions Over a Wireless infrastructure.

3 Anything Suspicious? Intrusion from rear fence line Suspicious bag in main hallway Effectivenes s 20 m i n Military tests have demonstrated that after approximately 12 minutes of continuous viewing of 2 or more sequencing monitors, an operator will miss up to 45% of scene activity. After 22 minutes, an operator will miss up to 95% of scene activity. And Now?

4 Government & City Centers Watch

5 Abuja Complete Security Solution

6 Site 2 Main Center BackHaul 30 Mbps Link Site 4 Site 3 Site 1 Site 5 Site 6 Site Configuration Concept

7 CMM To Network Link to Site Link to Sites Site 1 CMM Access Points Site 2 5.7Ghz 30Mbps Link 5.7Ghz 30Mbps Link Camera Control Central Site Main Site Link to Sites 5.7Ghz 30Mbps Link Site 2 2.4Ghz 10/20Mbps AP Central Site Concept

8 6 x AP Advantage To Network Link to Main Site 30Mbps BH CMM GPS I NVSAT C A N O P Y SM C A N O P Y SM IP/Analog Cameras Outdoor Cameras Subscriber Module (SM) 2.4Ghz 10/20Mbps Site Concept

9 ENTERPRISE HQ Building Advantage 20Mb PTMP Multipoint LoS Applications nLoS & NLoS Applications Radius Server L3 Switch VoIP Parking Lot Video Surveillance Connect to Remote Campus 30/60/300 Mb Backhaul LoS Applications 10/20 Mb Backhaul Deployment Example

10 Abuja Complete Security Solution HQ Building Radius Server

11 Abuja Palace Complete Security Solution

12 What is it? –The systematic approach to managing security and improving performance in organizations, using digital video providing a complete solution, enabling: Proactive Threat Detection Automatic Instant Verification Real-time event Resolution Rapid Post event Investigation Improve security & operation efficiency Intelligent Security Methodology

13 Integrated Solution IP backbone Open integration platform Site B Site A Site N MUX Transmission/networking Getting video from cameras to monitors and recorders over IP infrastructure Processing video to detect, warn and respond to events and threats Analysis Cross-scale digital and networked video recording and storage Recording Management Seamless unified management and inter-operation of multiple sites, recorders/encoders, monitoring and control elements Scenario reconstruction (context-based investigation) Level of Service Unified System view Distributed analytics (smart CODEC)

14 Where We Fit In Video Security Transmission/networking AnalysisRecording Management Open integration platform Site B Site A Site N MUX IP backbone

15 Large-scale, unified video management platform IP Backbone Viewing Network/ Control room End-to-End Solution Architecture Collection Network Storage Network Pro Alto Harmony NVSAT AOS High frame rate per camera Up to 96 channels Massive storage DSP-based video analysis channels Multiplexed frame-rate Built-in analog matrix Stand-alone and networked channels High frame-rate (RT on alarm) DSP-based video analysis Stand-alone and networked 2-8 channels smart encoder DSP-based video analysis High resolution video Local storage Digital /networked video matrixing High resolution and frame-rate NVIP 8-64 channels 3 rd party IP cameras Local storage CSS Central storage server

16 Transforming Video to Security Insight Smart monitoring for early detection of threats - terror, theft and vandalism Automated event detection, enabling informed decision making with content-based investigation Instant real-time investigation of suspicious incidents, helping operators make the right decision, on time Detection: An unattended bag! But is it suspicious? Decision: Not suspicious. No need to inspect. No false alarm. Terminal baggage detection Perimeter intrusion detection Scenario Reconstruction

17 Seamless Integration between video analysis and recording ensures instant verification and scenario reconstruction Detection: An unattended bag! But is it suspicious? Decision: Not suspicious. No need to inspect. No false alarm. Scenario Reconstruction Synchronized Analytics and Recording

18 Transforming Video to Operational Insight Uncover operational patterns (traffic, congestion, etc), tracking people, vehicles and objects Enable efficient resource allocation, service point optimization and capacity planning based on actual activity Allow remote supervision and management for dispersed organizations Improving mobility in toll-roadsCapacity planning in transits Trend-analysis

19 IP Backbone Viewing Network/ Control room End-to-end video transmission over IP – from the camera all the way to the control center Network-centric solution architecture – ALL components can be networked Collection Network Storage Network Video Analytics Full-fledged IP Platform

20 Video Analytics Baggage Detection –Identifying unattended luggage in airports and transportation terminals Vehicle Detection –Detecting vehicles parked in restricted areas, or posing a perimeter threat Intrusion Detection –Detecting unauthorized entry into secured areas People Counting –Counting the number of people across multiple entries/exits, with trends analysis Line Control –Indicating queue build-up in terminals, check-in and service lines Tail-gating –Alerting if two or more people pass through a secured door using the same security pass License plate / container plate recognition –Through 3 rd party integrations DSP-Based real-time video object tracking and analysis platform, with industrial grade capacity and performance, operational under actual field conditions Crowding Detection Identifying crowding of people in sensitive areas

21 Scenario Reconstruction – Baggage Detection

22 Enhanced GUI For Effective Monitoring

23 Enhanced GUI For Effective Monitoring-Map

24 Enhanced GUI For Effective Monitoring

25 User friendly and intuitive Emphasis on video playback experience Highlights –Flexible video layouts, groups and automated tours –Alarm management (prioritization, queuing, display) –Mapping –Enhanced scheduling Enhanced GUI For Effective Monitoring

26 Inroads for integration into the security process –Notification and response workflow streamlining –Site-level scenario reconstruction (instant event view, multiple cameras span) –Performance audit (reports, acknowledge and response times) Alarm priorities Alarm notification Alarm instructions and user-forms Alarm workflow Alarm logic (rule-based) PTZ presets and user priorities Alarm Management

27