Posts

Video Monitoring Systems for Advanced Surveillance Requirements

One of the most challenging elements of video surveillance is the daily monitoring of several devices over a multi-site system. Large and distributed Video Monitoring Systems can have numerous security cameras, network video recorders and encoders spread over geographically dispersed locations.

Video Monitoring Systems can undoubtedly assist and utilize devices with event status alerts to bring important incident footage to light. However, sometimes there isn’t time to monitor those notifications, and devices may still be vulnerable to connection problems, hard drive failures or different issues that could affect recording.

What is a proper Video Monitoring System?

Video Monitoring Systems involve far more than just streaming from cameras and recording videos with NVRs and DVRs; it’s about both storage and the maintenance and management of the entire Video Monitoring System. In addition, a proper Video Monitoring System solution increases efficiency by ensuring all monitoring devices are running at peak condition, around the clock, to prevent lost data.

If you are evaluating Video Monitoring Systems solutions for a large, geographically dispersed organization, there are some important features that can ease the workload and save money for the long term. Understanding these features can help make an informed choice.

What are the essential features of Video Monitoring Systems?

Centralized Management

Centralized system management is a standard feature of an enterprise Video Monitoring System. If your organization has locations across the world, there’s a need to be able to monitor videos from any site location and manage all of their respective cameras and recorders.
With Centralized management, it’s easy to push device settings and configuration to all cameras and video recorders. This can dramatically increase the speed of system administration, especially during the initial configuration phase. Fast application of firmware updates on multiple devices simultaneously will save a lot of downtime for maintenance.

Smooth Scalability

A critical Video Monitoring System must run efficiently no matter the size of your organization. Fast start-up times and lag-free workflows are essential. In addition, a trustworthy enterprise Video Monitoring System should be able to support large numbers of recording devices. When opening new building sections or new site locations or adding several more IP cameras and recorders, the system should scale to support this.

Event Monitoring and Alerts

During an investigation of an incident, there is nothing worse than finding out that the camera needed wasn’t recording!. A high-quality enterprise Video Monitoring System will offer a robust health-checking feature that can ensure all recorders and cameras are in proper working condition. This immediately alerts issues like failing hard drives or camera disconnections, giving early notification to correct a problem.
Some enterprise Video Monitoring System solutions will also allow control when alerts are triggered and customized health thresholds. For example, the system enables the receipt of alerts about the length or frequency of connection issues.

User Management

The ability to control system access is important. Managers and Administrators of large video systems are responsible for a lot of sensitive information. A good enterprise Video Monitoring System solution enables system managers and administrators to control access to the system, what those users can see and how frequently.
A good enterprise Video Monitoring System solution allows administrators to create custom access based on user permission level, so a security officer can only view video feeds from his station. At the same time, a more senior investigator can have access to all video footage in his assigned territory.
Managers and Administrators can also track user activity with detailed reports on each user’s operations, the resources they accessed and any updates they performed.

Third-party Support

Video Monitoring System will need to evolve over time. This means they might include a mix of IP cameras and analogue cameras from several different manufacturers and control equipment from several companies.

A good enterprise Video Monitoring System solution must be able to support all of these devices and provide a path forward by supporting and integrating the third-party products—this provides flexibility to choose the systems and devices with the best fit.

Bandwidth Management

The use of high-definition IP cameras on a large scale can consume significant bandwidth, and this may slow down systems or incur costly fees. Instead, look for an enterprise Video Monitoring System solution that enables control of the amount of bandwidth used to upload to and from your recorders or servers. This allows you to minimize bandwidth congestion and regulate network traffic.
Additionally, it may help to consider a Video Monitoring System solution that enables flexibility around recording, set maximum retention periods, selectively record on motion, or only record high-definition video on specific alarms to save on storage and bandwidth.

ARCO Video Proxy Server

Controls like these and the other features mentioned can dramatically simplify system administration in an enterprise video deployment. A proper enterprise Video Monitoring System solution will do the heavy lifting for the end-user.

The ARCO Platform features a built-in Video Service API enabling integration to third-party video cameras.

For advanced video surveillance requirements, ARCO Video Proxy Server is a stand-alone software solution designed to install within a closed network. The Video Proxy Server enables the integration with any third-party video system which are ONVIF compliant or support RTSP streaming.
Configurable Dashboard enables the full control of video displays within the ARCO Platform.

AXIS Camera Integration

SPG S1000 Smart Controllers enable integration to all models of Axis cameras that support TCP event notification and VAPIX API. Any Axis Camera can be mapped to an SPG Smart Controller Virtual Input to trigger S1000 events. In addition, the S1000 can send output activations to the Axis camera mapped to the Axis virtual input to trigger local camera actions such as a move to a preset position.


The S1000 Axis integration also supports the Vaxtor ALPR and the Axis People Counter application. These can be purchased and loaded into the Axis cameras supporting these apps and configured to work with the S1000 Smart Controller.

To know more about how SPG’s ARCO Platform and how it can help secure your assets, click here.

What is a Mobile Access Control Credential and Management System?

Mobile access control credentials and systems provide a secure, flexible and convenient way to regulate entry to your buildings or properties. This latest technology permits building groups and management to control entry, guard operations, manage guests and remain secure without inconveniencing staff or tenants with different physical access credentials.

A mobile access credential is a token that is loaded into an Application on a smartphone to provide a digital access key. It replaces the traditional physical access control card or fob. However, it may be presented to an access control reader and used in the same way as a card.
In this blog, we’ll show you mobile access solutions and highlight their value for building and property managers.

Mobile Access Control: What Are the Advantages?

Cost-effective and time-saving

Cloud-based mobile access management systems simply work with smartphones, saving everyone time and money. Often, the installation of mobile access control credentials results in savings of up to 50% over traditional physical cards. In addition, since adding and removing users happens digitally, over the air, you may save additional time not manually distributing keys to your tenants or employees.

Enhanced security

Mobile access control systems permit you to simplify entry into your building. By integrating digital access into people’s mobile devices, you largely avoid the headaches of lost and stolen physical access cards.
Physical credentials such as key fobs or key cards are far more susceptible to theft, damage, and/or getting lost. A lost key card may be a vulnerability to your facility.
Mobile access credentials, conversely, provide higher security and flexibility for each user. People are also much less likely to lose track of their high-priced personal smartphones, so there’s less worry regarding keys falling into the wrong hands or becoming lost. If a phone is lost, they are still protected with authentication passcodes or face recognition software. In the worst case, the credential can be deactivated remotely.

Unparalleled convenience

Security and convenience are two of the most significant benefits of cloud-based mobile access credentials and management systems. Mobile devices are easily integrated into the latest access control systems, and many tenants already carry a mobile phone.

Mobile access control systems are also convenient for property owners and building teams. Seamlessly, they give access to the premises with the push of a button. In addition, any updates or changes to a system can be made with ease, digitally and over the air.

Simple auditing and record-keeping

Cloud-based mobile access control systems provide organized auditing and record-keeping capabilities. This technology allows you to keep track of people’s activities in real-time. In case of an emergency, you have immediate access to records for specific locations in your building.

How Do Mobile Credentials for Access Control Work?

The defining characteristic of mobile access control systems is the use of smartphones, smartwatches, and tablets as entry credentials. Since many of us carry a smartphone today, these systems offer unparalleled connectivity and convenience. Furthermore, almost all mobile access systems are compatible with Android and iOS.

Simply put, mobile devices interact with access readers to give end-users access through doors, locks, gates, turnstiles, and more. There are several ways you can implement access control integrations within a mobile device.

ARCO Access Mobile App

ARCO Access App enables real-time scanning of all nearby doors available for the User, based on their GPS location. Access is granted through system generated QR codes that will automatically expire after a given time frame.

  • Displays Sites and Doors 50 meters from the User’s location.
  • Generated QR codes are valid for 30 minutes.
  • ARCO Platform mapping of location on the Dashboard.
  • GPS location of the User activating the panic alarm.
  • ARCO Platform processing of Access events from the phone.
  • English, Chinese, Spanish and French language support.

Sensor Detection as a part of IoT and IIoT

Sensors are everywhere. They’re in our homes and workplaces, our shopping centres and hospitals. They’re embedded in smart telephones and a vital part of the Internet of Things (IoT). Sensors have been around for a long time. The first thermostat was introduced in the late Eighties, and infrared sensors have been around since the late 1940s. However, the IoT and its counterpart, the Industrial Internet of Things (IIoT), bring sensor utilisation to a brand new level.
Broadly speaking, sensors are devices that detect and respond to changes in an environment. Inputs can come from numerous assets, which include light, temperature, movement and pressure. Sensor outputs provide valuable statistics, and if sensors are linked to a network, they are able to share information with other devices and control systems.
Sensors are critical to the operation of many of today’s organisations. They can alert potential troubles before they grow to be massive problems, for instance, allowing organisations to carry out predictive maintenance and avoid expensive downtime. The information from sensors can also be analysed for trends, allowing business proprietors to gain insight into critical trends and make informed evidence-based decisions.
Sensors come in many shapes and sizes. Some are purpose-built containing many integrated individual sensors, permitting monitoring and measurement of many assets.
There are many varieties of IoT sensors and an even greater range of packages and use cases.

SPG Sensor Remote Device

The SPG Sensor Remote Device (SD1-2ADI-PCB) provides an easy expansion for an S1000 Smart Controller to provide analogue sensing information. It may be linked through the S1000 rules engine and then used to enable automated local decisions and provide an audit trail that can also be passed to ARCO Platform for logging.
The Sensor device runs on an OSDP communication, and up to 16 devices can be connected to an S1000. In addition, each sensor device supports onboard temperature and humidity, light detection and an accelerometer for movement detection.
There are also 2 additional digital/analogue inputs, with the analogue inputs supporting both voltage and current monitoring of third-party sensor devices. In addition, there is also 1 analogue/digital output.

Light Sensor

The Sensor Device enables you to measure the intensity of visible light. The sensor’s spectral response tightly matches the human eye’s photopic response and includes significant infrared rejection.

Features

  • Precision Optical Filtering to Match Human Eye
  • Rejects > 99% (typ) of IR
  • 23-bit effective dynamic range with automatic gain ranging
  • Binary-Weighted Full-Scale Range Settings
  •  0.2% (typ) Matching Between Ranges
  • Flexible Interrupt System

Temperature and Humidity Sensor

The Sensor Device enables the measurement of the surrounding air’s absolute temperature and relative humidity.

Features

  • Fully calibrated, linearised, and temperature compensated data output
  • Parallel measurement of temperature and humidity on separate pins
  • Typical accuracy of 1.5 %RH and 0.2 °C

 

Motion Sensor

The Sensor Device enables inertial measurement using a 6-axis MotionTracking that combines a 3-axis gyroscope and a 3-axis accelerometer.

Features

  • Digital-output X-, Y-, and Z-axis angular rate sensors (gyroscopes) with a full-scale range of ±250, ±500, ±1000, and ±2000°/sec and integrated 16-bit ADCs
  • Digital-output X-, Y-, and Z-axis accelerometer with a full-scale range of ±2g, ±4g, ±8g and ±16g and integrated 16-bit ADCs
  • Factory calibrated sensitivity scale factor
  • Wake-on-motion interrupt for low power operation of applications processor
  • Minimal cross-axis sensitivity between the accelerometer and gyroscope axes

Hazardous Gas Detection

The Sensor Device enables measurement of gas leakage by detecting LPG, isobutane, propane, methane, alcohol, Hydrogen or smoke gasses.

Features

  • Wide detecting scope
  • Fast response and High sensitivity
  • Stable and long life
  • Simple drive circuit

Pressure Sensor

The Sensor Device enables measurement of barometric pressure based on piezo-resistive technology featuring high accuracy and linearity as well as long-term stability and high EMC robustness.

Features

  • Detects pressure from 300 to 1100 hPa
  • Relative Accuracy at ±0.12 hPa, equiv. to ±1 m (950 to 1050hPa @25°C)
  • Absolute Accuracy at typ. ±1 hPa (950 to 1050 hPa, 0 to +40°C)

Indoor Air Quality Sensor

The Sensor Device enables measurement of contaminating gases present in real-world applications enabling a unique long-term stability and low drift.

Features

  • Multi-pixel gas sensor for indoor air quality applications
  • Outstanding long-term stability
  • Two pre-processed indoor air quality signals

 

 

 

 

 

 

What is GDPR and how does it affect you?

The General Data Protection Regulation (GDPR) is often considered the strictest regulation in the world for securing users’ private data. It applies to all organizations that process the personal data of European Union citizens and residents, and the fines for non-compliance can reach up to €20 million.

This article explores the nature of this regulation, lists its fundamental principles, and offers a checklist for meeting GDPR compliance requirements. This article will be helpful for companies that already follow the GDPR and for those who are going to enter the European Union market.

What is the GDPR?

The GDPR is a data privacy and security regulation adopted by the European Union (EU). It imposes obligations on all organizations that collect and process the personal data of EU residents, even if these organizations operate outside the EU.

The GDPR provides EU residents with control over their personal data and obliges organizations to:

  • Gather, collect, and manage personal data legally and according to strict rules
  • Protect data from misuse and exploitation
  • Respect the rights of data owners

What is personal data?
Under GDPR, this means any information relating to an identified or identifiable natural person (Data Subject), an identifiable natural person can be identified, directly or indirectly, in particular by reference to an identifier such as:

It’s also important to be familiar with specific terms the GDPR introduces to define roles associated with data handling: data controllers, data subjects, and data processors.

Who must comply with the GDPR?

Any organization that stores or processes personal information about EU residents is obliged to comply with the GDPR, even if the organization is located outside the EU.

Yet, there are some nuances. For instance, organizations that have fewer than 250 employees are free from the majority of record-keeping obligations (see Article 30.5), though they still have to meet other GDPR requirements.

However, even if your organization employs fewer than 250 people, you might be obliged to keep records according to strict GDPR rules in case of your processing of personal data:

  • is likely to result in a risk to the rights and freedoms of data subjects
  • is not occasional
  • includes special categories of data as referred to in Article 9
  • includes personal data relating to criminal convictions and offences described in Article 10

Why should you comply with the GDPR?

Meeting GDPR compliance regulations isn’t only about complying with mandatory requirements. It can also help your organization do the following:

Protect personal data

GDPR articles implement high standards for personal data security, obliging data controllers and processors to secure “any information relating to an identified or identifiable natural person.”

Maintain your reputation

Neglecting data privacy regulations may affect your reputation. It could be that a data breach will lead to investigations, fines, and potential lawsuits. Staying compliant with GDPR requirements helps you maintain a reputation as a trustworthy and professional organization. And ensuring secure data processing is a reliable way to minimize the risk of security incidents.

Increase customer loyalty

People want to know that their data is safe and control it, mainly since the GDPR has ensured their rights. Therefore, customers and businesses are more likely to choose a trustworthy and GDPR compliant service provider or subcontractor than a non-compliant one.

Avoid fines and penalties

Article 83 of the GDPR states that the maximum fine for non-compliance is up to 4% of annual global turnover or €20 million (whichever is greater). Fines for GDPR non-compliance depend on multiple factors, including:

  • the duration and severity of the violation
  • the degree of cooperation with the supervisory authority
  • the categories of personal data affected

Ensuring GDPR compliance requires a deep understanding of the regulation. So before proceeding to the checklist on GDPR compliance, let’s take a quick look at the key principles behind the GDPR.

Key principles of the GDPR

GDPR requirements are based on the seven principles laid out in Chapter 2. They embody the main ideas of the regulation and explain the key reasons for implementing all requirements.
Compliance with these principles is essential for good data protection in general and compliance with the detailed provisions of the GDPR in particular.

Contact us to learn more about how SPG Controls can help your business in GDPR compliance.

Facing Up to Contactless Biometric Access Control

Thermal imaging and contact tracing technologies have garnered increased attention in recent days with the gradual reopening of some countries’ economy. These solutions are but one part of what portends to be a fundamental shift in how companies consider and use security systems. Access control, which has always been the first and foremost consideration in any security environment, will also be significantly impacted by the lasting effects of the pandemic. The adoption of biometric entry devices could be simultaneously improved and impeded over coronavirus concerns.

SPG Controls is pleased to announce the completion of its latest integration to biometric facial recognition technology. Growing customer demands to help verify the safe return to work for employees, contractors and visitors have accelerated SPG’s plans to include facial recognition, mask-wearing and thermal detection. The keys to the new integrations are high-speed performance, a flexible rules engine and an entirely contactless user experience.

For instance, an employee approaching their building’s main entrance access control doors will present themselves to the camera, the recognition algorithms verify the person, thermal sensors check the temperature, and AI verifies mask-wearing.

Any exceptional readings outside of the parameters implemented are notified to the user, and access may be denied depending on rules agreed by the employer. Recognition may take place either with or without a mask, but building entry may only be possible wearing a mask. In the case of an individual having a high temperature, physical access may be denied, and the employee will be directed to contact their manager or Human Resources department or follow other agreed protocols.

The underlying principle of no physical contact ensures a safe return to the workplace. Access may also be linked to digital health applications or “passports,” used to manage the status of vaccinations, COVID test results, whether through the uploading of results via an API or by uploading copies of documents for third party verification. Employees retain their health credential on their own device and log in on building entry using a dynamic QR code. An audit trail is held in all cases should track and trace for any incident be required.

SPG Thermal Biometric Reader uses next-generation AI facial recognition and body temperature detection technology. This ensures absolutely no surface contact access using high-precision temperature detection on mask-wearing users.

It integrates high-speed image acquisition, face detection, face tracking and face contrast, and human body temperature detection.

Contact us to learn more about how SPG Controls applies the science of biometric access control to help your business.

Monitoring Your System Anytime Anywhere

24/7 Monitoring for Security Systems

Your Corporation’s security system should be something that can be easily monitored anytime and anywhere. Thanks to a lot of improvements in technology, it finally can!

What Are Security Systems?

Security systems help protect your place of business. They permit access, preserving privacy and establishing audit trails, they provide video recording and transmission of events, provide out of hours intruder detection and can be extended to include any number of environmental sensors enabled to control light, heat, humidity, flood, fire, power consumption and lone working. Depending on budget or demand for security, the system can be configured to suit all business types, from a single premise to a multi-location, multinational business.

Deciding what security system and security devices to purchase can be an intimidating responsibility. However, there are several sources of information from third party consultants, local expert providers and recommendations from Police Crime Prevention Units. SPG Controls would advocate the appointment of experienced and accredited companies as an installation and support partner, In addition, the enablement of remote control of your security solution is essential in today’s unique environment, where individual and remote working is an everyday occurrence.

There are some factors to consider when selecting a security system. For instance, what would best serve your Company, controlling access through the use of locking devices and readers, providing intruder detection during overnight and weekend closures, protecting remote and lone workers, protecting valuable assets from flood, fire, heat and humidity or misuse? Monitoring and recording CCTV or audio to enable verification of any event? Typically, an intruder alarm is connected to a third-party monitoring company who follow your instructions depending on the type and time of an alarm event. In today’s market, SPG Controls would recommend taking a further step forwards by enabling the control of your Company’s security systems through a mobile application, providing immediate data on your premise’s security system. Having the ability to check, verify and manage all aspects of your security solution as an authenticated user from your mobile device is essential.

Advantages of Security Systems

Security systems today have many benefits, thanks to advancements in technology. Many are now connected to IoT devices (Internet of Things) which makes them ideal for automating aspects of your Company’s security. For instance, by permitting both local and remote locking and unlocking of doors and gates.

Permitting the monitoring of your Company’s security system anytime and from anywhere. Additionally providing CCTV and audio content to enable remote verification. It’s much easier to decide on a course of action if management can see and hear what’s happening.

SPG Controls’ ARCO Enterprise Platform allows users to monitor data from thousands of remote sites. It is built with the latest web technologies for a faster and more secure experience. Support for unlimited connections also means that there is a huge potential for horizontal scalability. Every function supported is also accessible thanks to an open API. A dynamic server environment also ensures that there are unlimited redundancy and scalability

Product Specifics

SPG Controls’ S1000 Smart Controller manages access control, intruder alarms and any other applicable building management functions that can be remotely accessed by authorized users. It allows the monitoring and access of your security system whilst maintaining a secure remote connection. As an option, it can be equipped with a 4G connection as well as with Bluetooth Low Energy for setup and control. Other S1000 controllers can also be connected as slaves to expand the network in a building, compound, campus or over globally dispersed locations.

The SPG Sensor Remote Expansion Device provides analogue sensing information. These can be connected to the  S1000 controller, which processes information in real-time in order to decide the course of action based on the pre-programmed rules. The interface also has sensors for humidity and temperature, which can also be useful for facilities that have intensive cooling or warming systems.

SPG Sensor Remote Expansion Device

Contact us today to find out how an SPG Controls security system can help you protect your assets.