Www.axis.com Video analytics and security Philip Siow Senior Consultant South Asia Pacific.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Ten Reasons to Buy a Network Camera or what your analog camera vendor wont tell you.
Network Security.
Strong currency effects on sales January- March 2009 Ray Mauritsson, CEO & President Fredrik Sjöstrand, CFO.
Interim report January – June 2010 Ray Mauritsson, CEO & President Fredrik Sjöstrand, CFO.
M A K E Y O U R N E T W O R K S M A R T E R Video growth despite negative currency effects Year-end summary 2003 Ray Mauritsson, CEO.
AXIS New Innovations October AXIS Product Naming Structure.
Tech Data’s 2010 Physical Security Playbook Enablement for Networking Resellers.
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
Continued strong sales and earnings trend January-June 2007 Ray Mauritsson, CEO Fredrik Sjöstrand, CFO.
Verizon Digital Media Services Michael Weintraub Executive Director Intelligence in the Cloud Cloud Computing for Military & Government.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Milestone Systems Nikolay Mitev – Channel Business Manager.
Axis Intelligent Video Intelligence where you need it.
XProtect® Smart Wall.
AXIS Camera Station Comprehensive video management software for monitoring, recording, playback and event management.
Video management and analytics intelligent security systems intl 1 Videoo Management & ANALYTICS.
Presented by Adam Alcock.  Germany 1942 by Siemens AG. Walter Bruch.  September 1968 Olean, New York.  CCTV in Banks and Stores.  1990s and 2000s.
AxxonSoft Company Profile Products overview References.
Case Study Portable Wireless Network for Emergency Response.
AXIS Q7404 Video Encoder High-performance, full-featured video encoder with H.264.
Bosch Video Management Systems
Network Techlab (India) Pvt. Ltd.
Ten Reasons to Buy a Network Camera. Focus 10 of the most important functional differences between analog and network cameras.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
1 Video Intelligence Retail Solution - Surveon Technology Sales & Marketing Department Surveon Technology, 2013.
Axis Intelligent Video Strategy Focus on Embedded Video Analytics.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
IP-based Integrated Security Solutions for Airport Operations and Security AirporTech Asia 2008 Danny Peleg.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Copyright 2014 Intel Corporation. All rights reserved. Taking Advantage of Digital Security & Surveillance January 2014.
Choosing a Network Camera The top 10 factors for making the right choice.
Trends in IP video surveillance Tsvetan Filev.
Video Analytics Integration and Analytics. Introduction The functions of video analytics. The architecture of video analytics. The applications of video.
Electronic Banking & Security Electronic Banking & Security.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
CCTV - Security Cameras
Vigilant NetStream Series Overview 12/1/2011. Private & Confidential. Copyright Vigilant Technology 2007 Vigilant NetStream Series IP Cameras Video Encoders.
1 Milestone Systems, Inc. Confidential Milestone Systems Open Platform Video Management Software Reinier Tuinzing Strategic Alliance Manager, Americas.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Video Surveillance Market to Global Analysis and Forecasts by Components and End-user Industry No of Pages: 150 Publishing Date: Jan 2017 Single.
Video Surveillance Market to Global Analysis and Forecasts by Components and End-user Industry No of Pages: 150 Publishing Date: Feb 2017 Single.
CSCI 465 Data Communications and Networks Lecture 26
WHY VIDEO SURVELLIANCE
How to Sell IP Video.
Ten Reasons to Buy a Network Camera
Axis Megapixel Network Cameras
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Matrix Video Surveillance Solution for Retail
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
802.11b Wireless Access Point
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 IP Camera Market to surpass.
Avocado Security Solutions, Avocado Open Architecture Convergence platform (OAC) Consolidation Centralized viewing & Management Security Asset Management.
A Better Choice For COMPANY NAME
Wavestore Integrates…
ACTi Stand-alone Network Video Recorder
 i3S Integrated Smart Surveillance Systems Confidential. Copyright © Aurionpro Solutions. All rights reserved.
DATS International Portfolio.
WHY VIDEO SURVELLIANCE
Designed for powerful live monitoring of larger installations
Pitch Deck.
LM 5. Wireless Network Security
Presentation transcript:

Video analytics and security Philip Siow Senior Consultant South Asia Pacific

>T>The market is moving towards digital >F>From CCTV to IP/Digital Surveillance >F>From closed to open >F>From fixed to flexible and scalable >F>From security to secure intelligence >F>From surveillance to What is video surveillance today? The future is information! information

Recognition What is your surveillance need? DetectionIdentification 3 Pixels16 Pixels ? ? 80 Pixels ?

Resolution - Exposure - Shadows - Proportions Can you recognize this face ?

Fine Details 8 pixels64 pixels Know your application demands!

Demand for Automation & Analytics > Easy to install, configure and use Easy to manage, integrate and support A processor that meets the algorithm calculation

>The image chip is the core component in a network camera or video encoder –Axis ARTPEC is optimized for surveillance demands and usage –Surveillance industrys most advanced single-chip solution –Image processing power for superior image quality The core component in video surveillance products 7

Mpixel/sec 3x the performance (60 Mpixel/second)

License plate - 120m (394 ft) 35x optical zoom (15px)

Axis Camera Application Platform COMPATIBLE APPLICATION Axis network camera or video encoder AXIS Camera Application Platform COMPATIBLE APPLICATION Detection Counting Recognition Unique IP video product meeting specific end user needs!

>Tampering alarms >Tripwire or Cross Line detection >Loitering detection >Tailgating detection >Counter-flow detection >Left luggage detection >Crowd detection >Car pulled off the road >Car made illegal U-turn Examples of intelligent applications

Securing Your Network Video

Overview >How do we achieve security? –System Design –Secure the content –Secure the environment –Authenticate users and devices

Securing the content >Watermarking >Digital signature cryptography >Use to authenticate users

Encryption of data – SSL/TLS Encryption: Uses an algorithm or cipher to scramble data which makes it unreadable to everyone except the recipient >The most common way to secure content is using SSL/TLS encryption >This runs on top of TCP/IP >When HTTP is secured it is referred to as HTTPS >Commonly used in e-commerce applications, such as E-banking >Prevents eavesdropping, tampering, and message forgery from man-in-the-middle attacks

Camera - HTTPS and network video >Use HTTPS for management on public or semi-public networks >Below are the settings on the camera

Camera - WLAN/Camera configuration SSID (Name of the WLANs) (Master) or Ad-hoc Security: WEP, WPA/WPA2-PSK or WPA/WPA2-Enterprise

Environment - Virtual Private Network (VPN) >A virtual private network (VPN) uses an encryption protocol to provide a secure tunnel over unsecure networks, through which data can be safely transferred.

Failover recording >Temporary storing recordings on local SD card when network is disconnected >Using Local Storage API together with extensions to the RTSP API >Available for models supporting local storage

Thank you! network video innovation global HDTV partner network leader camera protect outdoor image usability leader safe thermal easy installation intelligent open integration ease of use competence megapixel environment worldwide H.264 focus Axis video encoder convergence Get the Axis picture. Stay one step ahead.