classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


There’s more than one approach to video verification
October 2018, Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring

It is no secret that false alarms are one of the biggest headaches presented by electronic security systems. At the very least, they are an annoyance to business and homeowners, not to mention a drain on reaction companies’ time and manpower. Video verification is emerging as one of the most potent weapons in the fight to eliminate (or at least reduce) false alarms.

“Video verification allows a customer or a security company to verify an event or intrusion that took place at a home or business,” explains Wynand Beneke, managing director at Videofied SA. “99.9% of all alarms generated by intrusion detection systems on the market today are false/nuisance alarms. Security companies do not have to respond to these if they have a way of verifying that it was only a dog or a bird that caused the event. This allows them to focus on the positive activations and prioritise their response to verified alarms.

“Human nature is a powerful thing, and when security officers respond to false alarms at the same site over and over every day, they become complacent. This carries over to all the other 99.9% of false alarms and the poor officer never knows when he is faced with a real threat. Video verification eliminates all of this, by giving priority to positive events and sharing the correct information to the armed response officer. Video verification is definitely growing and more people see the value of priority response over the normal blind reactions.”

Video verification comes in many forms and sizes, ranging from large to small CCTV systems or conventional alarm systems with built-in video verification. Most systems on the market have their own proprietary software, but local alarm monitoring software packages are starting to cater for different brands and software packages to be integrated onto their own platform.

“This makes it ideal as all communication to the control room operator takes places at one single station,” says Beneke. “Standalone video verification systems make it easier for the control room to do video verification. The current infrastructure of the control room is equipped to change all of its existing customer base to video verification, whereas CCTV-like systems would rely on more and more staff with bigger fibre pipelines as the client base switches to video.”

While the industry is moving toward adopting video verification solutions, it is a big ship to turn and will still take some time to change, in Beneke’s view. “The market is seeing new options with lots of innovative ways of applying old and new equipment to do video verification,” he says. “Most security companies are attempting some form of video verification, but not all of them are able to scale the solution to customers.

“CCTV-type video verification needs larger infrastructure and manpower to monitor, and is not easy to scale with the current state of online communication in South Africa. It is very challenging to implement some sort of video verification in every home and business in this country.”

It is, however, possible to take advantage of existing kit to add video verification in some form at any customer, he continues. “If he has an alarm then he can add a CCTV system with remote access for the armed response to view the site. We at Videofied have launched our new priority response add-on kit which can be connected to any existing alarm system. This allows the user to still use his current system with remotes and keypads, but with the added benefit of video verification without having to replace his system or add expensive CCTV equipment.”

What you want and what you need

“Home users are all following the masses and think that what they want for security is to get footage on their phone so they can do self-monitoring with this footage. We are completely against self-monitoring solutions,” states Beneke. “What good is a video on your phone when you are in a meeting, sleeping or in the shower? Will you be acting as your own armed response; how fast is your car, are you carrying a firearm and is it worth it?

“What users need is for the footage to go to an armed response company that can act efficiently on the information provided. This is real security with priority response – no longer do they have to go out to false events but only react with multiple vehicles to positive incidents, saving time and lives.”

Video verification relies on a couple of factors to be effective and to add value to a security solution. The first is electrical power, as without it video verification will not work. “How many homeowners can run generators and UPS systems at home to provide additional power for the security system?” Beneke poses. “Your video verification system can be disabled with a flick of a switch on the outside at your power meter box. Most of these boxes are not even locked, providing easy access to the power supply to your property.

“The second challenge is the communication network. It is suggested that you have a good copper or fibre line to have the most effective video verification solution. Well, I have no doubt that the network infrastructure in this country will improve, but at the current state it is not ideal. Many homes do not have high-speed copper or fibre lines – this could be due to lack of infrastructure, theft of cables or any other reason. The network at the control room is also crucial: the more customers you have the bigger the network pipeline has to be, making it more difficult to scale the solution to all customers.”

Videofied SA has looked at the challenges and has developed an advanced system that can run for up to a year on its own battery backup without the need to charge the batteries. “This is ideal for those problematic power cuts. Our system also does not rely on any hardware infrastructure but can be used for a backup solution and have two mediums of communication. Videofied is also ideal for the control room infrastructure as the current control room can change all of its sites to video verification without adding any additional staff or network capabilities.”

Value through integration

Sentian, a Cape Town-based developer, takes a different approach, one that is more hands-on and offers a different value proposition. “There are lots of remote monitoring sites in Cape Town as well as in Johannesburg (the two areas Sentian is currently concentrating on), which essentially entails manual video verification,” explains co-founder, Tigue Little. “It’s all well and good for those who can afford to spend a couple of grand a month on a video verification service, but there are many who simply want to receive an alarm signal and access their cameras to verify what’s happening on site, and aren’t willing to spend that much for it. That’s essentially where we come in.”

Little believes Sentian’s solution offers a lower barrier to entry as well as features not available in some of the closed systems that are available. “You’ve got some systems where you get sensors that have a camera built into them. That hardware approach works to a degree, but generally it’s got a lot of limitations and is quite pricey because every single sensor has to have a camera on it. Also, it’s not a normal CCTV camera, so it might only send through ten snapshots of what triggered the sensor. Those sensors are traditionally internal only, so that’s fine for indoor sensors but you don’t have the functionality that is standard with CCTV,” he states.

Sentian’s biggest differentiator is the fact it’s built from the ground up to integrate with commercial hardware available on the open market, and supports features like local archived footage, event based video search, high-definition video and cloud storage. Instead of being limited to only the baked-in functionality of a particular piece of hardware, it can take advantage of the feature set of each piece of equipment, such as infrared cameras and the likes.

The Sentian system captures a 12-second clip of each incident – six seconds before and six seconds after an alarm is triggered – and pushes the clip to the user so they can view it through an app on their smart connected device. They can then access the video feed and stream it in real-time as well as have it stored in the cloud.

The plummeting prices of entry-level CCTV cameras makes this solution attractive not only in the home security market, but also in commercial applications like farms and warehouses, where Little says it is gaining traction. “When we started this five years ago it was typical to spend R1000 on a camera, now you can sell an HD 720p camera for R300 and still be making a 100% margin on it.

“What we’ve banked on and what we find is not only cheaper for the client but gives them a lot more functionality, is having CCTV but linking to as many sensors as possible. Our typical install will have six to eight cameras that cover the perimeter and you can have as many sensors as you want linked to one camera, which represents a big saving,” he says.

On a case-by-case basis, Sentian can also integrate its system with an armed response company’s control room, in order to give them access to the same captured video clip as the client receives.

For more information contact:

Sentian, +27 21 492 0777, info@sentian.co.za, www.sentian.co.za

Videofied SA, +27 87 820 7010, sales@videofied.co.za, www.videofied.co.za


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • From the editor’s desk: Converging access control
    November 2018, Technews Publishing, News
    Welcome to the Access & Identity Management Handbook 2019. We’re publishing this in January as opposed to our traditional end-of-year publishing schedule to make sure you have some bed-time reading for ...
  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • A scan of fingerprint biometrics
    November 2018, Technews Publishing, Access Control & Identity Management
    Given the increase in the use of fingerprint technology in public and private organisations, as well as some recent announcements on the reliability or lack or reliability of certain types of sensors and algorithms in the fingerprint biometric market, Hi-Tech Security Solutions spoke to some of the leading fingerprint biometric vendors in the market to find out more about the state of this market.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
  • Your face tells a story
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
    Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.
  • The right access decisions
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management
    Making the right access control decision depends on what you want secured and how secure it should be.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.