fbpx
23.1 C
Sydney
Thursday, November 28, 2024

Buy now

  • HID SIGNO
  • HIK Vision
  • HIKVISION NVR
Home Blog Page 50

Motorola Partners With VRA Rescue

0
Motorola Partners With VRA Rescue
Motorola partners with VRA Rescue on 2-way radio.

Motorola Partners With VRA Rescue SmartConnect Mission Critical 2-Way Radio.

Motorola partners with VRA Rescue – Volunteer rescue organisation, VRA Rescue NSW, has announced the deployment of SmartConnect from Motorola Solutions to extend the reach and capacity of its mission-critical radio communications.

SmartConnect is a subscription-based application service that maintains reliable communications connectivity by automatically switching channels between land mobile radio (LMR), broadband, Wi-Fi and satellite networks.

“On any given day, VRA Rescue NSW’s 50 specialised squads and search dog teams perform rescue missions in challenging environments and unforeseen circumstances,” VRA Rescue NSW commissioner and vice president, Australasian Rescue Organisation, Brenton Charlton, said.

“Whether conducting cave rescues, ski patrols or responding to road crashes, our teams need uninterrupted communication to stay connected with each other and different public safety agencies, especially when working in the most remote and rugged areas of the state.”

Motorola Partners With VRA Rescue 4 LR
Motorola partners with VRA Rescue on 2-way radio.

With SmartConnect, NSW VRA will gain secure access to New South Wales’ Public Safety Network which is used by more than 50,000 first responders and emergency personnel across the state. It will access the communications service via more than 300 of Motorola Solutions’ APX 8000 series P25 radios and APX NEXT P25 all-band smart radios.

Motorola Partners With VRA Rescue

SmartConnect will also be deployed to a fleet of 100 NSW VRA service vehicles, helping to create a mobile communications hub to support rescue missions in rural and remote areas.

“Our P25 radio technology is designed to help public safety personnel to communicate with clarity in whitewater rapids, on the frontlines of bushfires and in a variety of other extreme conditions,” said Con Balaskas, managing director for Australia and New Zealand, Motorola Solutions.

“With APX NEXT broadband-enabled radios and SmartConnect, responders can take resilient voice communication even further by automatically switching from LMR to broadband networks when users travel outside of radio coverage areas.”

Among other agencies using SmartConnect from Motorola Solutions are Fire & Rescue New South Wales and New South Wales State Emergency Service. You can learn more about Motorola radios here or read more SEN news here.

“Motorola Partners With VRA Rescue SmartConnect Mission Critical 2-Way Radio.”

Motorola Partners With VRA Rescue LR
Motorola partners with VRA Rescue on 2-way radio.

NIDAC PIM Supports Indala FlexPass

0
NIDAC PIM

NIDAC PIM Supports Indala FlexPass Readers.

NIDAC PIM Supports Indala FlexPass – NIDAC PIM is the perfect solution for users of Indala FlexPass readers thanks to its ability to connect to a FlexPass reader’s TTL output.

According to NIDAC’s Paula Nicholls, the HID Indala FlexPass range of 125KHz readers went end of life in June 2023 and were replaced by the HID Signo models with standard credential profiles.

“For customers still using Indala FlexPass readers with serial TTL outputs, commonly used to restrict access to heavy machinery or process line equipment, this phase-out left them with no viable solution – until now that is,” Nicholls said.

“NIDAC’s Melbourne-based engineering team has tweaked the Presco Interface Module (PIM) to output compatible serial RS232. The NIDAC PIM can convert Weigand data from the HID Signo reader to serial RS232 that includes the start and end characters, ensuring customers who have made a significant investment in Indala credentials have a convenient replacement pathway for their card readers.”

NIDAC’s highly flexible PIM is capable of more than 20 different types of data conversion, including Presco, Weigand, Clock & Data, Dallas iButton, USB, and serial RS232.

“PIM can also be used to extend the range of Weigand readers to 1000 metres, and as the NIDAC Presco format is immune to induced electrical noise, the PIM is the ideal solution in electrically noisy environments, such as lift shafts,” Nicholls said.

You can learn more about NIDAC Presco Interface Module and its distributors, including Sprint Intercom & Security in NSW, here. There’s more SEN news here.

“NIDAC PIM Supports Indala FlexPass Readers.”

Senstar MultiSensor AI Multi-Sensing Detector

0
Senstar MultiSensor AI Multi-Sensing Detector
Senstar MultiSensor AI Multi-Sensing Detector Eliminates External False Alarms.

Senstar MultiSensor AI Multi-Sensing Detector Eliminates External False Alarms.

Senstar MultiSensor AI Multi-Sensing Detector – Senstar MultiSensor is a compact, AI-powered system that leverages the power of sensor fusion to intelligently detect and characterize intrusions while eliminating nuisance alarms in a 12 x 5-metre detection area.

This new approach to threat detection has an embedded Sensor Fusion Engine that synthesizes data from multiple sensing technologies (short range radar, PIR, accelerometer, high frequency vibration, and video) to understand the full context when an event occurs. This results in the highest probability of detection and situational awareness.

The sensor’s embedded Sensor Fusion Engine intelligently performs a threat analysis based on the data obtained from each sensor, taking into account intrusion training data, pattern analysis, relevance, history and background noise. The result is a system that can reliably detect intrusions under difficult conditions including low light, high wind, rain, snow, fog and stealth attacks.

Senstar MultiSensor connects to a security network over Ethernet and can use the same network as other Senstar devices, including FlexZone, OmniTrax, FiberPatrol, Senstar LM100, UltraLink and UltraWave. Senstar’s Network Manager software conveys alarm and status information to a Senstar or third-party security/video management system (SMS/VMS).

According to Senstar, its MultiSensor is easy to install and requires virtually no maintenance. Its mounting bracket supports a range of installation options, including fence fabric, fence posts, walls, light/camera posts, and tower structures.

When deployed at a site managed by the Senstar Symphony️ Common Operating Platform, Senstar MultiSensor allows an operator to view alarm location on site maps, view on-map thumbnails of the most recent captured image, view live and recorded video captured by Senstar MultiSensor’s 180-degree image sensor, view live and recorded video from linked cameras, view real-time device status and mask or unmask the device as required.

You can find out more about the local release date for this new sensor from local distributor BGW Technologies here, or you can learn more about Senstar here, or read more SEN news here.

Senstar MultiSensor AI Multi-Sensing Detector Features

  • AI-Powered
  • Highest Probability of Detection with lowest NAR
  • Synthesize data with embedded Sensor Fusion Engine
  • Short-range radar, PIR, accelerometer, high frequency vibration, video
  • Easy to Install
  • Install outdoors on any mount surface
  • Mounting bracket can support walls, fence posts, light/camera posts, tower structures, fence fabric
  • Reliable Performance
  • Designed and tested for outdoor use in all weather conditions
  • Eliminates nuisance alarms from wind, shadows, loose signs, overgrown brush, and background activity.

“Senstar MultiSensor AI Multi-Sensing Detector Eliminates External False Alarms.”

MQTT Cyber Security Risks

0
MQTT Cyber Security Risks
MQTT Cyber Security Risks Can’t Be Ignored.

MQTT Cyber Security Risks Can’t Be Ignored.

MQTT cyber security risks must be considered by security installers and integrators – not only because the protocol is used in sub-systems, but because it’s also used by and supported by many security devices.  

There’s a lot of talk in the security industry about the cyber security levels of controllers and devices. Do the same issues apply to some Internet-facing smart home devices and systems? Yes, and it all comes down to the configuration of communications paths and the level of integration applied between network devices and lightweight management controllers.

While there are proprietary comms protocols in the electronic security industry, in the wider world network comms is going to be some form of Message Queueing Telemetry Transport (MQTT) protocol. OpenStack, Open Geospatial Consortium Sensor, DeltaRail IECC Scalable, Adafruit, EVRYTHNG IoT, Amazon IoT, Home Assistant, Pimatic for Raspberry Pi, MS Azure IoT hub and more, all use MQTT for device communications.

MQTT Cyber Security Risks

What is it? Developed by Andy Stanford-Clark of IBM and Arlen Nipper of Cirrus Link on the back of the SCADA protocol back in 1999, Message Queuing Telemetry Transport is an ISO standard publish-subscribe-based messaging protocol which sits on top of the TCP/IP protocol and it designed to facilitate connection with remote locations when bandwidth and power are in very short supply, which is great for wireless-based home automation applications.

MQTT is a flexible protocol. The application layer runs on top of the TCP/IP network and covers BGP, DHCP, DNS, FTP, HTTP, IMAP, LDAP, MGCP, MQTT, NNTP, NTP, POP, ONC/RPC, RTP, RTSP, RIP, SIP, SMTP, SNMP, SSH Telnet, TLS/SSL, XMPP and more, the Transport layer is just as comprehensive and the Internet and Link layers are well catered for. And it’s compact. The smallest control message might only be 2 bytes in length (the header), though such messages can extend to 256MB.

Operationally, MQTT uses a hierarchy of topics to communicate and it manages this by firing a control message of data to a connected broker, which distributes the data to clients on the network subscribed to that topic. There’s an elegant simplicity to all this that’s just like an RSS feed. Because it was developed as a SCADA protocol, MQTT was created to manage short telemetry data messaging in off-line environments.

Of note, MQTT has no standard, and it can carry any payload you throw at it, publishing it to all ‘subscribers’ in a network. The publishing of a topic needs no information about subscribers, the subscribers need no information about publishers. Use of a topic to as a filtration system and file path via which to communicate with subscribers means a message gets delivered to the right subscribers. This means MQTT is great at bridging gaps between devices siloed by proprietary comms protocols – it forms a sort of auxiliary machine language – a mechanical Esperanto.

In standard trim, MQTT transmits connection credentials in plain text format – there’s no security or authentication applied – you need to use the TCP transport layer to incorporate end-to-end message protection. Alternatively, you could subscribe your devices to a something like the PubNub Network with MQTT for added security, additional functionality, as well as message storage and playback. There’s also now MQTTS, which adds encryption at the cost of an increase in power demand that can be too onerous in some applications.

MQTT Cyber Security Risks

The security issues come into play with MQTT when it comes to configuration of a home automation system around a PC or a mini computer using server software like Mosquitto. If the server security config, such as access control, is muffed, then servers will be exposed on the Internet to basic searches uses programmes like Shodan, and if a hacker gains access to the system then it’s not going to be complicated to gain access to the system and gather information on the state of the alarm system, the times residents come and go, as well as being able to deactivate or activate devices, such as sensors and door locks.

As mentioned, MQTT is often included in smart home hubs where it assists with the delivery of automation capabilities. The automation side of such systems resides onboard the hub and facilitates unification of devices, as well as providing a dashboard for the management of connected devices.

If MQTT is not included in the hub, it can be set up separately – in either case, it allows hubs to subscribe and publish messages about system state and operation, as well as to allow devices to communicate between each other to drive logic – for instance, if the soil sensor detects low threshold soil moisture, activate irrigation.

This capability represents the power of MQTT but also the fragility. A messaging protocol capable of driving system function needs to be thoughtfully configured if it is not to introduce vulnerability into a home automation solution if the server config is mishandled during the process of setup.

Before we go further, consider that a given instance of MQTT uses # to represent all levels at its location – if a device is subscribed to /home/familyroom/# it will receive any message published to /home/familyroom/lock or /home/familyroom/light. If a ? symbol is included in the string /home/?/familyroom/lock/# then the device will get all messages relating to locks.

MQTT really powers up with smart home hubs, which subscribe and publish MQTT messages and deliver logic. Such hubs also generate a dashboard from which users can manage their system. MQTT allows the hub to put messages together and automate disparate devices that don’t understand each other’s language. For instance, when the ambient temperature reaches 30 degrees on the verandah, the air conditioning in the living room will turn on.

This central communication capability is where issues can arise with MQTT. The MQTT server is the interpreter between devices, while the smart hub manages devices and delivers system logic, and MQTT-enabled devices are installed in the system and connected to the MQTT server. The stumbling block is that the MQTT server probably doesn’t have a secure config or may be misconfigured and if anyone can access that server, they can read all a system’s MQTT messages relating to any devices in any location by simply subscribing to # on the system.

It gets worse because some MQTT servers are internet facing and don’t have a password. Users who deploy Mosquitto to manage a home hub, but have no ACL or don’t actively configure an access control list, leave their system open to being subscribed to by network intruders. They will be able to read all communications and can also publish messages that will control MQTT-enabled devices connected to the MQTT server they have breached. In some cases, misconfigured MQTT servers expose the smart hub dashboard to the internet – there are tens of thousands of MQTT servers exposed on the internet.

MQTT Cyber Security Risks Can’t Be Ignored

Things can get trickier still because a lot of MQTT servers feature owntracks/, which is an iOS and Android application that’s fundamentally a GPS tracker used to manage the system based on geo-location. This is problematic because it allows your location to be tracked by showing the GPS co-ordinates and even the altitude of a connected smart device.

Typically, owntracks/ is configured without encryption or authorisation and to set it up, a smart device needs to be exposed to the internet. Then there’s the fact a message is sent to owntracks/ each time a linked phone changes its location. The level of detail is significant and historical with time and date – it even includes the battery level of the smart phone being tracked and this tracking is going on in real time.

MQTT Cyber Security Risks-Applying security to MQTT-governed devices comes with certain challenges. For instance, IoT devices are constantly looking for an opportunity to fall asleep to preserve battery life and manufacturers will minimise processing power and memory to reduce current drain. This means cryptography might ask too much of a device’s expected battery lifespan, so it’s left out.

Further, many IoT devices are self-governing to make setup is easier – that means they are likely to be less secure, not more secure. Then there’s the fact MQTT is meant to be lightweight – it’s not designed for the heavy lifting of secure communications. Does that mean it’s not a useful and flexible automation protocol? Far from it – you just need to be sure security is factored in.

To secure MQTT-enabled systems, you need a physically secure gateway, like a VPN, to carry messages between server and devices. If you don’t want anyone to be able to read your system’s messages, then TLS/SSL will give transport comms encryption that’s relatively easy on processing and quite secure.

At the application level, comms can be encrypted and the identity of parties in the system may be subject to authentication. This may be handled using payload encryption at the application level, which saves the labour of transport encryption. Part of this may be use of whitelists, which only allow connection to trusted applications and URLs rather than attempting to block a list of known threats which must be regularly updated.

You can learn more about MQTT security strategies here or read more SEN news here.

“MQTT Cyber Security Risks Can’t Be Ignored.”

City of Boroondara Needs Access Control & CCTV

0
City of Boroondara Needs Access Control & CCTV Maintenance.
City of Boroondara Needs Access Control & CCTV Maintenance.

City of Boroondara Needs Access Control & CCTV Maintenance.

City of Boroondara Needs Access Control & CCTV – City of Boroondara needs maintenance of its Gallagher, Inner Range, Milestone and Exacqvision solutions across the council area.

Council is seeking suitably qualified and experienced organisations, to form a panel of contractors, to carry out maintenance and installation of electronic access control and CCTV systems for a period of 2 years.

According to the tender, works to be performed by the contractors shall generally include but not be limited to:

  • a) Reactive services to faults and system repairs
  • b) Routine and programmed maintenance
  • c) Duress and building alarm monitoring
  • d) Quotations for new installations.
City of Boroondara Needs Access Control CCTV 1 LR
City of Boroondara Needs Access Control & CCTV 12

City of Boroondara Needs Access Control

Systems included in the tender include Gallagher and Inner Range Integriti access control systems and the Milestone and Exacqvision CCTV systems. The works will be in accordance with the requirements of the tender package panel service specification and the services general conditions.

City of Boroondara is a local government area in Victoria, Australia, located in the Eastern Suburbs of Melbourne. Combining the cities of Kew, Camberwell and Hawthorn, it has an area of 60 square kilometres and a population of around 200,000.

This tender closes May 17 – you can learn more and apply here or read more SEN news here.

“City of Boroondara Needs Access Control & CCTV Maintenance.”

City of Boroondara Needs Access Control CCTV 2 LR
City of Boroondara Needs Access Control & CCTV.

Gallagher Releases New Command Centre v9.10

0
Gallagher Releases Command Centre v9.10
Gallagher Releases Command Centre v9.10.

Gallagher Releases New Command Centre v9.10 Unlocks New Era Of Security Technology.

Gallagher Releases New Command Centre v9.10 – Gallagher Security has announced the latest release of its award-winning security site management software, Command Centre v9.10.

“Customers and Channel Partners of Gallagher who take advantage of this upgrade will benefit from a fast-evolving ecosystem of Gallagher Security technology that sets them up for the future,” said Mark Junge, chief executive at Gallagher Security.

According to Junge, digital wallet solutions further expand Command Centre’s credential capabilities, offering a seamless access experience and leveraging native technologies within smartphones, while automatic configuration for Gallagher’s next generation Controller 7000 offers streamlined upgrades and enhanced cyber protection.

“The beauty of upgrading to Command Centre v9.10 is the total solution benefit that can be realized by our customers,” Junge said.

Gallagher Releases New Command Centre v9.10
Gallagher Releases New Command Centre v9.10.

“It unlocks Command Centre Web subscription-based licenses where Cardholder Administrators can be swiftly and easily updated in the cloud. It also realizes the value of HBUS devices for improved speed, data protection, and automated scalability.”

Gallagher Releases New Command Centre v9.10

Enhancements to the customer experience are also delivered via digital wallet solutions. Command Centre v9.10 supports employee badges in Apple Wallet for a quick, intuitive, and simple access experience at Gallagher readers for users of iPhones and Apple Watches. Businesses can also easily issue access credentials to employees with in-app provisioning via Gallagher’s Mobile Connect App.

An integration with Transact delivers university campuses a mobile-centric student experience that streamlines access and administration with integrated payments, campus ID, and commerce solutions.

“With our firm focus on the best quality hardware today that provides a pathway to the best tech developments of tomorrow, our customers can be sure their investment in Gallagher Security is safe,” Junge said.

You can learn more about Gallagher Command Centre here or find more SEN news here.

“Gallagher Releases Command Centre v9.10 Unlocks New Era Of Security Technology.”

Gallagher Releases New Command Centre v9.10
Gallagher Releases New Command Centre v9.10.

SecTech Roadshow Trucks Get Motors Running

0
SecTech Roadshow Trucks Get Motors Running
SecTech Roadshow trucks get motors running.

SecTech Roadshow Trucks Get Motors Running En Route To Perth!

SecTech Roadshow Trucks Get Motors Running – SecTech Roadshow’s 3 semi-trailers are fired up and on the road to Western Australia with an arrival time a day or so before SecTech opens at Crown Perth this Thursday, May 9 (pre-register here).

After Perth, SecTech trucks over to Adelaide Showgrounds on Tuesday, May 14, heads to Melbourne’s MCC on Thursday, May 16, with Sydney opening in Sydney’s West for the first time at Rosehill Gardens Exhibition Centre on Tuesday, May 21. SecTech finishes up with a bang in Brisbane on Thursday, May 23, at RNA.

Scenes From SecTech Loading 17 2
SecTech Roadshow Trucks Get Motors Running 35
Scenes From SecTech Loading 16
SecTech Roadshow Trucks Get Motors Running 36
Scenes From SecTech Loading 14
SecTech Roadshow Trucks Get Motors Running 37
Scenes From SecTech Loading 15
SecTech Roadshow Trucks Get Motors Running 38
Scenes From SecTech Loading 1
SecTech Roadshow Trucks Get Motors Running 39
Scenes From SecTech Loading 2
SecTech Roadshow Trucks Get Motors Running 40
Scenes From SecTech Loading 3
SecTech Roadshow Trucks Get Motors Running 41
Scenes From SecTech Loading 4
SecTech Roadshow Trucks Get Motors Running 42
Scenes From SecTech Loading 5
SecTech Roadshow Trucks Get Motors Running 43
Scenes From SecTech Loading 6
SecTech Roadshow Trucks Get Motors Running 44
Scenes From SecTech Loading 7
SecTech Roadshow Trucks Get Motors Running 45
Scenes From SecTech Loading 8
SecTech Roadshow Trucks Get Motors Running 46
Scenes From SecTech Loading 9
SecTech Roadshow Trucks Get Motors Running 47
Scenes From SecTech Loading 10
SecTech Roadshow Trucks Get Motors Running 48
Scenes From SecTech Loading 11
SecTech Roadshow Trucks Get Motors Running 49
Scenes From SecTech Loading 13
SecTech Roadshow Trucks Get Motors Running 50
IMG 1423
SecTech Roadshow Trucks Get Motors Running 51
IMG 1430
SecTech Roadshow Trucks Get Motors Running 52
IMG 1429
SecTech Roadshow Trucks Get Motors Running 53

Don’t miss the latest in alarms, access control, video surveillance, analytics, security management solutions, intercom, security networking, cloud security solutions and plenty more – all in your hometown with no travel expenses and no travel downtime!

SecTech 2024 roadies include Verkada, Permaconn, Dahua Technologies, SecuSafe, Art Of Logic, Motorola Solutions, OpenEye, BGW Technologies, DAS, CRK Security, Stentofon, ASSA ABLOY, Allegion, EKA/EVVA, LSC, Gallagher, VSP, Bluechip, U-PROX, PowerStack, Hikvision, Video Alarm Technologies, Inner Range, ICT, TP-Link, Integrated Products and Security Alliance Australia.

You can learn more about SecTech Roadshow here, pre-register for your city here or read more SEN news here.

“SecTech Roadshow Trucks Get Motors Running En Route To Perth!”

Perth Road Sign
SecTech Roadshow trucks get motors running…

Exclusive Deal Alert with SecuSafe at SecTech

0
Exclusive Deal Alert with SecuSafe at SecTech
Exclusive Deal Alert with SecuSafe at SecTech Roadshow.

Exclusive Deal Alert with SecuSafe at SecTech 2024!

Exclusive Deal Alert with SecuSafe at SecTech – SecuSafe is offering exclusive deals* as part of SecTech Roadshow, which opens in Perth next Thursday, May 9, pre-register here.

“SecuSafe, the leading distributor in the security industry, is teaming up with our top partners for an extraordinary showcase this year at SecTech 2024, including AJAX, Akuvox, UNV, Uniarch, VIVOTEK, Wi-Tek, ZKTeco,” said SecuSafe’s Andy Lee.

Exclusive Deal Alert with SecuSafe at SecTech 1 LR
Exclusive Deal Alert with SecuSafe at SecTech.

“But that’s not all – we’ll also be giving away a limited 10 per cent discount coupon, reserved solely for our valued customers who visit our booth.

“This deal is only available at our booth and nowhere else. So mark your calendars and visit the SecuSafe booth at SecTech Roadshow to grab your coupon!”

Don’t miss out – register here and let’s meet in your city at SecTech – Perth May 9, Adelaide May 14, Melbourne May 16, Sydney May 21 and Brisbane May 23. There’s more SEN news here.

*Terms and conditions apply, and can be found on the coupons.

“Exclusive Deal Alert with SecuSafe at SecTech 2024!

Exclusive Deal Alert with SecuSafe at SecTech 2 LR
Exclusive Deal Alert with SecuSafe at SecTech 56

Charles Darwin University Seeks Security

0
Charles Darwin University Seeks Security
Charles Darwin University Seeks Security Services.

Charles Darwin University Seeks Security Services.

Charles Darwin University Seeks Security – Charles Darwin University seeks security services to meet its evolving needs.

Charles Darwin University (CDU) is an Australian public university with a main campus in Darwin and 8 satellite campuses in some metropolitan and regional areas.

Charles Darwin University Seeks Security 2 LR
Charles Darwin University Seeks Security 59

Charles Darwin University Seeks Security

It was established in 2003 after the merger of Northern Territory University, the Menzies School of Health Research, and Centralian College, and has a staffing body of 1300 and a student body of 21,500.

The security services required cover the university’s Darwin (ECP), Casuarina, Palmerston and Waterfront Campuses.

This Charles Darwin University Seeks Security Services tender closes on May 30 – you can learn more about the scope of works here or read more SEN news here.

“Charles Darwin University Seeks Security Services.”

Charles Darwin University Seeks Security 1 LR
Charles Darwin University seeks security.

Secom VMS Launched In Japan

0
Secom VMS Launched In Japan
Secom VMS Launched In Japan.

SECOM VMS Launched In Japanese Market Supports 600 Camera Models.

Secom VMS Launched In Japan – Newly launched Secom VMS is compatible with over 600 models of surveillance cameras from 25 manufacturers worldwide. This system can collectively manage hundreds of surveillance cameras or more installed in large facilities.

Secom VMS allows users to check live video and recorded video from surveillance cameras from computer, tablet, or smartphone, and easily switch between split displays and select recorded data.

Furthermore, by linking with the AI and notification functions of surveillance cameras, notifications can be sent to the management screen when events such as “area intrusion” or “congestion” are detected, and SECOM’s “AZ-Access”.

Secom VMS Launched In Japan

The system offers expandability, such as linking with entry/exit control systems such as , allowing you to check card operations and camera images when entering and exiting the room.

This system utilizes the platform of Arova Co., Ltd., which joined the Secom Group in 2019 and develops and sells surveillance camera software for integrated management of network cameras.

SECOM VMS Launched In Japan 4 LR
Secom VMS Launched In Japan.

Video from surveillance cameras can be viewed on computers, tablets, and smartphones, and live and recorded video can be set to display up to 36 split screens. When selecting a recorded video, you can easily check the recording date and time and content from the management screen that combines a calendar and thumbnail images. In addition, recording schedules can be easily set using intuitive operations.

Secom VMS Launched In Japan

In conjunction with the AI function and notification function of surveillance cameras, when an event such as area intrusion'' orcongestion” is detected, it will notify you on the management screen with audio and pop-up, and you can also check the video when the event occurs.

In addition, by linking with an access control system such as AZ-Access, it is possible to check the video of the timing of card operations and entry/exit, and it is also expandable so that it can be linked with other systems.

You can learn more about Secom here or read more SEN news here.

“SECOM VMS Launched In Japanese Market Supports 600 Camera Models.”

SECOM VMS Launched In Japan 2 LR
Secom VMS Launched In Japan.