ISS releases SecurOS 9.0

February 2017 Editor's Choice, Surveillance, Integrated Solutions

Intelligent Security Systems (ISS) has announced the release of its new video management system (VMS), SecurOS 9.0. The system has been updated with a host of new features, including various add-ons for video analytics.

According to Eugene Kayat, MD of ISS Africa, SecurOS has been designed to support surveillance systems from small shops and businesses through to the largest enterprises and even city surveillance projects.

As a software company, ISS ensures that its VMS can easily integrate with almost any third-party solutions. The company has a team of developers constantly developing new integration software for products, and third parties are able to access the SecurOS software development kit (SDK) to develop their own integrations.

In addition to the core VMS, add-ons such as facial recognition, automatic number plate recognition, traffic monitoring, container recognition and more can be added to the system, depending on the customer’s needs. One of the benefits of purchasing SecurOS, according to Kayat, is that ISS only charges a once-off licence fee.

New features

Of the various new features in SecurOS 9.0, Kayat highlighted a few that are worth noting.

First, the new Computer Vision subsystem supports a variety of video analytics modules, including the ones designed to increase the situational awareness of SecurOS operators. This currently includes the Tracking Kit III plug-in, which offers:

• Crowd Detector – designed to detect potentially dangerous groups of people.

• Object Left Behind Detector – designed to detect abandoned objects.

• Intrusion Detector – designed to detect objects entering a forbidden area (crossing forbidden zone border).

• Loitering Detector – designed to detect people loitering and moving in the same area for some time.

• Running Detector – designed to detect people who move faster than is considered normal.

• Object Counter – designed to count objects (people, vehicles) crossing a line in each direction.

The new Emergency Service module reports incidents detected by SecurOS to external emergency service centres. When an incident occurs, the operator creates a report by completing the Emergency Ticket form. This includes the address, time and type of incident, and the operator can add comments if necessary. The ticket is then transferred as a package of metadata, which includes URLs to access the SecurOS video archive from an external monitoring centre.

The SecurOS media client also allows operators to save bookmarks to the video archive when an incident or even a suspicious activity occurs. Bookmarks can be added to a single frame or to an archive interval. Users can also search for bookmarks and alarms in the archive, filtering by time range, camera ID etc.

To improve the quality of live monitoring in situations where the network is poor or congested, the viewing frames per second (fps) can be set to a maximum. In addition, the native Dewarper has been updated and is now calibrated for most major fisheye/360-degree cameras. The following camera models have been added in this release: OnCam EVO-05-xxx, OnCam EVO-12-xxx, Hikvision DS-2CD6362F-xxx4, and Mobotix Q24M-Secure. Kayat says more cameras will be added in future updates – ISS sends out updates every four months.

The Event Viewer GUI has also been updated and now allows operators to switch between two operation modes: Monitoring mode (which shows live events) or Event Search mode (which allows users to search for events in a log). The Event Viewer is more interactive, with existing right-click controls to view event video in the media client, send a ticket to emergency services, and an upcoming feature to acknowledge alarms.

In addition, ISS is empowering Android smartphones or tablets to support the security operation, not only with the ability to view video, but as an additional sensor. For automatic number plate recognition, for example, the app allows users to take a picture of a number plate via their Android device, from where it can be compared to a database of suspicious vehicles. In future, this will be expanded to include facial recognition.

ISS has over 100 000 deployments of its technology in 53 countries. The products are implemented in banks, office, industrial and manufacturing sites, retail locations, petrochemical processing facilities, casinos, hospitals, schools etc. ISS Africa is responsible for sales and support to the African continent.

For more information contact ISS Africa, +27 (0)83 330 8767, eugene.kayat@isscctv.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.