cloud storage

Eagle Eye Networks introduces analytics to the Eagle Eye Cloud Security Camera VMS

cloud surveillance Eagle Eye Networks has released the first phase of its video analytics platform, which offers users line crossing, intrusion detection and object counting functions within the Eagle Eye Cloud Security Camera VMS. Businesses needn t necessarily replace existing cameras to install Eagle Eye Analytics, because it will function on any camera including analogue variants that is supported by the Eagle Eye Cloud Security Camera VMS. Here are some advantages that the platform offers by dint of being cloud-based, according to Eagle Eye Networks: Cloud benefits Rapid deployment Users needn t install additional hardware or software to access the analytics, which are activated from the web dashboard or mobile app No requirement for on-site technicians, remote project management or system replacement Available to customers for as little as $4-5 per camera, per month Analytics functions Line crossing.

Detects when an object crosses a virtual line. Users can specify direction and can receive notifications. Useful for receiving notifications when a security boundary (eg a fence, restricted area or one-way road) is crossed. Also well suited to monitoring building entrances, loading docks and parking lots. Intrusion detection. Detects when an object encroaches into an area defined by the customer, generating an instant notification. Object counting. Counting how many objects cross a line in both directions, object counting is useful for counting cars as well as people. Total daily count and current count delta are displayed.

Offering benefits beyond just security, the analytics generates meaningful insights from which businesses especially retailers can optimise processes and enhance customer experience. Eagle Eye Networks says The Eagle Eye Cloud Security Camera VMS Analytics are a true cloud solution that are available on demand, per camera, instantly activated, and customers are only charged for what they use, says Eagle Eye Network s founder and CEO, Dean Drako. Over the next few years, customers will have the option to turn on more sophisticated analytics as Eagle Eye Networks cloud-based model leads the physical security industry in making analytics more functional and more accessible. A customer says If cloud-based solutions appeal to large enterprises on account of their rapid scalability, then smaller businesses that choose them often do so because they unburden them of so many system management and maintenance tasks. Aaron Diaz, owner of Gulf Coast Hardware stores in Southwest Florida, explains how he intends to deploy the new analytics platform: Our store is nearly 6,000 square feet with additional outside retail areas and I m really excited about the ability to receive alerts based on activity in areas I specify. The counting will come in handy for me to gain a better understanding of the number of visitors (daily), who may or may not make a purchase. About Eagle Eye Networks Founded in Austin, Texas in 2012, Eagle Eye Networks has in a short space of time become the undisputed leader of cloud-based video surveillance solutions in North America. Having acquired Panasonic Cloud Management Services Europe BV in June 2017, it can now claim dominance of the European market too. Eagle Eye Networks, which also has offices in Asia, supports cloud and on-premise recording as well as both digital and analogue cameras all accessed via the web or mobile applications.

The company says it offers bank-level security and encryption. Eagle Eye s RESTful API platform and Big Data Video Framework accommodates indexing, search, retrieval, and analysis of live and archived video. Eagle Eye s open Video API has facilitated integrations with alarm monitoring, third party analytics, security dashboards, and point of sale system integrations.

Eagle Eye sells its products through authorised global resellers and installation partners. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Turn your employees into human security sensors: Qognify launches Qognify Extend

situational awareness Qognify has launched a range of integrated mobile solutions with which organisations can enhance situational awareness by harnessing field resources and responders. Cloud-based and powered by CloudScann, Qognify Extend effectively extends the reach, coverage and effectiveness of the control room by turning personnel and their smartphones into human sensors. Qognify Extend integrates with Qognify Situator, an open platform, situation management solution, and VisionHub, Qognify s video management system.

It also works as a standalone solution. Qognify Extend triggers incidents automatically in Situator, including textual, visual and geographic information captured by a smartphone. Features Advanced GIS capabilities display map location Video feed from surveillance cameras in area will pop-up and an adaptive response plan , based on organisation s best practices, guides operator actions Connectivity to VisionHub and Qognify s video analytics suite enhances automatic information analysis and takes effective action eg through apprehension of a suspect through Suspect Search. Qognify Extend modules SeeItSendIt: Field personnel can report into control room with their smartphones Live Video Broadcast: Personnel can broadcast live video directly to control room Dispatch : provides operators with simple Computer Aided Dispatch (CAD) functionality, including locating closest guard, suggesting best route to the incident, sending notifications and comments to guards mobile phones. Personal Safety: Personal security features include monitoring an individual s progress along a route, immediate report of distress situations via a panic button, and raising an alert for any failure to arrive safely Qognify VICC (Visual Intelligence Command Center) a desktop application that collects and aggregates information from various mobile applications, presenting it on a map Qognify and CloudScann say We re proud to partner with Qognify, the leader in Situation Management, said Dan Kerning, CEO of CloudScann, a specialist in crowdsourcing, human intelligence and data mining for the enterprise market. . extending to the field is firstly about collecting invaluable information, yet the trick is establishing the link to the control room, and providing a new layer of data and intelligence, allowing operators to act faster to resolve them. Says Moti Shabtai, CEO and president of Qognify: The ubiquitous nature of smartphones together with their range of capabilities, makes them an ideal tool to leverage for improving security, safety and operations. Bringing these into Situator and VisionHub is a no-brainer, as it s the Qognify vision is to provide as many sources of information as possible- smartly. With Qognify Extend, organisations can literally extend coverage, turning personnel and their mobile phones into smart sensors.

Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

Dell EMC Q&A: open platforms, body-worn cameras and end-to-end security solutions

Part of the group most famous for manufacturing desktop PCs, Dell EMC specialises in hybrid cloud and big-data solutions, built on converged infrastructure, servers, storage and cybersecurity technologies for enterprise customers. SecuritySolutionsWatch.com spoke to the brand s recently appointed general manager for surveillance and security, Ken Mills. We are delighted to provide an excerpt below.

Ken Mills, Dell EMC SecuritySolutionsWatch.com: Thank you for joining us again today Ken at this momentous time in the history of Dell EMC. Before drilling down a bit into all that s new: congratulations on your appointment as general manager for surveillance and security! Please give us an overview of the Dell EMC surveillance solutions portfolio. Ken Mills: Dell EMC is focused on delivering the best-in-class solutions for the surveillance market in networking, compute, storage, virtualisation, security, client and cloud. We are also focused on building joint solutions with our OEM customers/partners to bring even more value to our end users. Our customers are truly the future-makers, and we are enabling them to innovate faster, build stronger and scale smarter. Stay tuned for a number of announcements for the surveillance market from Dell EMC and our customers. SSW: Are there product announcements on the horizon from Dell EMC too? KM: It is an exciting time to be at Dell EMC right now.

Dell Technologies is now number one in everything, all in one place, and we are bringing this world-class portfolio to the surveillance market. Never before, have our customers and partners been able to modernise their surveillance infrastructure with an end-to-end portfolio like we have at Dell EMC. We are leveraging the same industry-recognised surveillance lab to expand our validated solutions to include the entire Dell EMC portfolio. This is a huge step forward for the industry where for the first time, our customers and partners can purchase with confidence all of their surveillance infrastructure needs from one place: Dell EMC. Read the full interview on SecuritySolutionsWatch.com Check out the latest solutions from Dell Video Surveillance Solutions by Dell EMC OEM at IFSEC International, 20-22 June 2017, London ExCeL. You can find them on stand G250. Get your free badge now. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more.

It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Cloud-based disaster recovery: the benefits, catastrophic costs of downtime and questions to ask providers infographic

Cloud-based Disaster Recovery: The Benefits, Catastrophic Costs Of Downtime And Questions To Ask Providers Infographic

Enhancing resilience defined in the security world as the ability to withstand and recover quickly from disruptive or disastrous events is growing more important for businesses and cities alike. And in our increasingly connected, digitised economy a big part of achieving this is preparing for disruption to computer systems and the corruption or loss of data. The dramatic growth in cloud-based services has triggered a corresponding rise in demand for cloud-based disaster-recovery plans.

Courtesy of Ireland-based IT solutions company ERS Computer Solutions Ltd, which provides cloud-based disaster-recovery services, the infographic below outlines why businesses use such services, how long it takes to recover from site disasters, the average cost of downtime, issues to consider before adopting this model and questions to ask providers of cloud-based disaster services.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

“60% of US enterprise-level organisations lack encryption strategies”: Q&A with Extenua CEO Steve Visconti

“60% Of US Enterprise-level Organisations Lack Encryption Strategies”: Q&A With Extenua CEO Steve Visconti

Steve Visconti, president and CEO at US-based cloud security provider Extenua, talks cyber security in our latest Q&A snapshot from the US market. Originally published on SecuritySolutionsWatch.com, this interview covers the company s Cloud2Drive and SilverSHield solutions, as well as its role in IoT, mobile access and BYOD. SecuritySolutionsWatch.com: Yahoo, DropBox, LinkedIn the daily headlines unfortunately remind us just how vulnerable we are in today constant threat environment and the bad guys come in many forms: foreign governments, sophisticated hacker groups, and insiders among others.

What is your perspective, Steve, regarding the unique value proposition that Extenua brings to the table in today s IoT, mobility and BYOD environment? Steve Visconti: Cyber attacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organization s overall data strategy. It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization. Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed. This is precisely why an organization or enterprise must have the most secure and hardened environments possible. Hackers and bad actors will eventually probe and eventually move on to the easier targets. Don t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive. Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy.

It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization. Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed. This is precisely why an organization or enterprise must have the most secure and hardened environments possible. Hackers and bad actors will eventually probe and eventually move on to the easier targets. Don t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive. Click here for the complete interview with Steve Visconti on SecuritySolutionsWatch.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.