All-in-0ne iSTAR Ultra Video

May 2017 Editor's Choice, Surveillance, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

Tyco Security Products, part of Johnson Controls, has launched iSTAR Ultra Video that offers distributed, small site security with enterprise performance.

This small appliance combines the access control features of iSTAR Ultra with embedded video recording and management that is remotely managed by an integrated C•CURE 9000/victor application to meet the security needs of small remote sites. Each iSTAR Ultra Video is factory-imaged with the latest firmware and camera licences.

Each iSTAR Ultra Video appliance supports up to eight readers and eight IP cameras. Used with IP-ACM Ethernet door modules, iSTAR Ultra Video is aimed at large corporations whose footprints include smaller remote networking facilities, fibre huts and other small but critical facilities that need constant monitoring and control. The distributed security architecture can scale to thousands of sites, making it an option for enterprise customers with multiple remote locations.

Each appliance manages up to 500 000 cardholders in a local database and can buffer up to 500 000 transactions locally when offline. It includes the full functionality of a VideoEdge NVR and its built-in intelligence allows users to receive multiple video streams for live, record, alarm, and meta-data collection.

The system provides full configuration and viewing functionality at the remote location while providing bandwidth-managed movement of the data distributed locally from where the video is securely stored. Users can easily back up video to any network location to increase storage capacity and system reliability.

Smart Streaming technology tailors video streams based on viewing conditions, which significantly reduces network bandwidth, CPU resources, and memory usage. VideoEdge dynamically scales and transcodes multiple live streams to all clients, further reducing bandwidth.

For the most critical areas, iSTAR Ultra Video features built-in intrusion zone functionality allowing you to monitor and respond to intrusion alarms quickly, without relying on a third-party intrusion panel. Any door or input wired to the IP-ACM Ethernet door modules can be configured as part of an intrusion zone, either as a 24/7 monitored input such as a glass break detector, or as a controlled input such as a motion sensor or door. Zones can be armed and disarmed using a combination of card and/or PIN, and/or remotely from C•CURE 9000 or victor clients. In response to zone alarms, specific cameras may be configured to present a live view and/or recorded video to the operator.

The onboard analytics transform video into business intelligence to better analyse operations, maximise revenue potential, and increase situational awareness.

For more information contact Tyco Security Products, +27 (0)82 566 5274, [email protected], www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...