SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Dario L. Santana
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
www.layer3securityservices.com
dario@layer3securityservices.com
INTERNET PROTOCOL VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 2Confidential
Key Topics
• Video Surveillance moving from
traditional (analog) CCTV to IP Video
Surveillance (IPVS)
• The benefits of IP Video Surveillance
• Layer3 Security Services
• Video analytics
6/30/2010 3Confidential
Trend to IPVS Started Earlier in Decade
• First saw trend from Analog CCTV to IPVS while
leading Tyco Fire and Security Latin America ’02-’06:
– ADT: Residential
– Sensormatic: Retail and Commercial
– SimplexGrinnell: Industrial
Convergence of Physical Security and Internet
6/30/2010 4Confidential
My Experience with Convergence
• Pay TV/Digital TV – General
Instrument/Motorola
• Video Streaming – Aerocast
• Buzztime – Digital Signage
Disruptions Lead to Opportunities
BENEFITS OF IP VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 6Confidential
The Benefits of IPVS
• More Detail – MegaPixel, fewer devices needed
• Intelligence – Video Analytics
• Plug and Play (IP) Systems – Promotes innovation
• Significant ecosystems – Protect your investment
• Best of breed – Reliable, Available
• Ease of support – Just another IT application
• Objections: bandwidth, network impact, costs
ROI, Ease of Support, Lower TCO
IQinVision
6/30/2010 7Confidential
Field of View with Forensic Detail
Courtesy of IQinVision
VGA = 16’
HD720p = 32’
HD1080p = 48’
3Mpix = 51’
5Mpix = 64’
640/40
1280/40
1920/40
2048/40
2560/40
Best AnalogRecognition of human
face or auto license
plate requires
40 pixels/foot!
PIXELS ON
TARGET
6/30/2010 8Confidential
Enterprise Class – IP VMS* System
*Video Management S/W features:
• Central Management
• Multi-site support
• High Availability – fail over
Courtesy: Milestone Systems
• Multicast and streaming
• COTS servers, storage
LAYER3 SECURITY SERVICES
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
• Site Survey and System Design
• Product Selection
• System Integration
• Installation and Training
• On-going Maintenance and Support
• Related solutions: Partnerships in IT, Infrastructure
and Physical Security
Knowhow, Tools and Processes
106/30/2010
Layer3 – IPVS Integration Services
• Industrial
• Business campuses
• Hospitals
• Distribution Centers
• K-12 Schools and Universities
• Government agencies
6/30/2010 11
Common Goals: Assets Protection and People Safety
Layer3 Solutions for the Enterprise
6/30/2010 12Confidential
Layer3’s KEY Partners
• Milestone Systems – Video Management Software
• Axis Communications – IP video cameras
• IQinVision – IP MegaPixel cameras
• Mobotix – 180/360 IP video cameras and more
• The Siemon Company – Infrastructure
• Cisco – Networking Products
Best of Breed Components
6/30/2010 13
Layer3 Knowhow
CA License
GI General Instrument
Experience, Training, Certification, Licensing
Engineering
Networking
6/30/2010 14
CA License
GI General Instrument
Engineering
Networking
Capabilities
1. Physical Security
2. IP Networking
3. Project Execution, Infrastructure
Three Disciplines, One Goal – YOUR SECURITY
Visit: www.layer3securityservices.com
Knowhow Makes Layer3 Unique
VIDEO ANALYTICS
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 16Confidential
Video Analytics (VA) Defined
• Video motion detection - VA or NOT VA?
• Most common VA applications
– Perimeter violation; trip wire
– License plate recognition
– People counting (biz app)
• Other applications include
– Direction of travel
– Dwell time
– Items left behind….
Generate Alerts for Recording and Response
6/30/2010 17Confidential
Big Debate: Where does VA Belong?
Courtesy: Milestone Systems
At the edge?
.. save on B/W
Centralized?
... capability
“Depends on
the application”
6/30/2010 18Confidential
Issues with Video Analytics
• False alerts – organizational impact
• System maintenance – calibration
• Cost of System - $300 to $500 per channel
• Unrealistic expectations have been set: “VA
eliminates human interaction”
There is a place for VA; makes traditional
solutions (Guards etc.) more effective
Dario L. Santana
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
www.layer3securityservices.com
dario@layer3securityservices.com
INTERNET PROTOCOL VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY

Contenu connexe

Tendances

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot IoT Tunisia
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisTI Safe
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installationOm Kumar
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyBettShow
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...OPEN DEI
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftMind the Byte
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoTMONICA-Project
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkQuEST Forum
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAlcatel-Lucent Enterprise
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawRizkiawan Achadi
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 

Tendances (20)

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installation
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
IOT presentation
IOT presentationIOT presentation
IOT presentation
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 

En vedette

Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Saprative Jana
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Roger Dingeledine
Roger DingeledineRoger Dingeledine
Roger DingeledineEvangeline
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Thoughtworks
 
Quartelry Technology Briefing Defending the Free Internet
Quartelry Technology Briefing   Defending the Free InternetQuartelry Technology Briefing   Defending the Free Internet
Quartelry Technology Briefing Defending the Free InternetThoughtworks
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLKirsten Fiedler
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 201244CON
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillanceZied Jebali
 
Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting publicantitree
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDMarc Manthey
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and futureblogzilla
 
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass SurveillanceDefending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass SurveillanceThoughtworks
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
 

En vedette (20)

Tor
TorTor
Tor
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Roger Dingeledine
Roger DingeledineRoger Dingeledine
Roger Dingeledine
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
Quartelry Technology Briefing Defending the Free Internet
Quartelry Technology Briefing   Defending the Free InternetQuartelry Technology Briefing   Defending the Free Internet
Quartelry Technology Briefing Defending the Free Internet
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRL
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass SurveillanceDefending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
 
Utopia Internet
Utopia InternetUtopia Internet
Utopia Internet
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 

Similaire à INTERNET PROTOCOL VIDEO SURVEILLANCE

IPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security ServicesIPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security ServicesLayer3 Security Services
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünlericem lale
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieAlessio Pennasilico
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015ctgoff
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021Heidelberg India
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionIptech View
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standardsgiladpn
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance InstallationShein Myint Aung
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMahbubul Alam
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alamMahbubul Alam
 

Similaire à INTERNET PROTOCOL VIDEO SURVEILLANCE (20)

IPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security ServicesIPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security Services
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alam
 

Dernier

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Dernier (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

INTERNET PROTOCOL VIDEO SURVEILLANCE

  • 1. Dario L. Santana Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 www.layer3securityservices.com dario@layer3securityservices.com INTERNET PROTOCOL VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 2. 6/30/2010 2Confidential Key Topics • Video Surveillance moving from traditional (analog) CCTV to IP Video Surveillance (IPVS) • The benefits of IP Video Surveillance • Layer3 Security Services • Video analytics
  • 3. 6/30/2010 3Confidential Trend to IPVS Started Earlier in Decade • First saw trend from Analog CCTV to IPVS while leading Tyco Fire and Security Latin America ’02-’06: – ADT: Residential – Sensormatic: Retail and Commercial – SimplexGrinnell: Industrial Convergence of Physical Security and Internet
  • 4. 6/30/2010 4Confidential My Experience with Convergence • Pay TV/Digital TV – General Instrument/Motorola • Video Streaming – Aerocast • Buzztime – Digital Signage Disruptions Lead to Opportunities
  • 5. BENEFITS OF IP VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 6. 6/30/2010 6Confidential The Benefits of IPVS • More Detail – MegaPixel, fewer devices needed • Intelligence – Video Analytics • Plug and Play (IP) Systems – Promotes innovation • Significant ecosystems – Protect your investment • Best of breed – Reliable, Available • Ease of support – Just another IT application • Objections: bandwidth, network impact, costs ROI, Ease of Support, Lower TCO IQinVision
  • 7. 6/30/2010 7Confidential Field of View with Forensic Detail Courtesy of IQinVision VGA = 16’ HD720p = 32’ HD1080p = 48’ 3Mpix = 51’ 5Mpix = 64’ 640/40 1280/40 1920/40 2048/40 2560/40 Best AnalogRecognition of human face or auto license plate requires 40 pixels/foot! PIXELS ON TARGET
  • 8. 6/30/2010 8Confidential Enterprise Class – IP VMS* System *Video Management S/W features: • Central Management • Multi-site support • High Availability – fail over Courtesy: Milestone Systems • Multicast and streaming • COTS servers, storage
  • 9. LAYER3 SECURITY SERVICES Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 10. • Site Survey and System Design • Product Selection • System Integration • Installation and Training • On-going Maintenance and Support • Related solutions: Partnerships in IT, Infrastructure and Physical Security Knowhow, Tools and Processes 106/30/2010 Layer3 – IPVS Integration Services
  • 11. • Industrial • Business campuses • Hospitals • Distribution Centers • K-12 Schools and Universities • Government agencies 6/30/2010 11 Common Goals: Assets Protection and People Safety Layer3 Solutions for the Enterprise
  • 12. 6/30/2010 12Confidential Layer3’s KEY Partners • Milestone Systems – Video Management Software • Axis Communications – IP video cameras • IQinVision – IP MegaPixel cameras • Mobotix – 180/360 IP video cameras and more • The Siemon Company – Infrastructure • Cisco – Networking Products Best of Breed Components
  • 13. 6/30/2010 13 Layer3 Knowhow CA License GI General Instrument Experience, Training, Certification, Licensing Engineering Networking
  • 14. 6/30/2010 14 CA License GI General Instrument Engineering Networking Capabilities 1. Physical Security 2. IP Networking 3. Project Execution, Infrastructure Three Disciplines, One Goal – YOUR SECURITY Visit: www.layer3securityservices.com Knowhow Makes Layer3 Unique
  • 15. VIDEO ANALYTICS Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 16. 6/30/2010 16Confidential Video Analytics (VA) Defined • Video motion detection - VA or NOT VA? • Most common VA applications – Perimeter violation; trip wire – License plate recognition – People counting (biz app) • Other applications include – Direction of travel – Dwell time – Items left behind…. Generate Alerts for Recording and Response
  • 17. 6/30/2010 17Confidential Big Debate: Where does VA Belong? Courtesy: Milestone Systems At the edge? .. save on B/W Centralized? ... capability “Depends on the application”
  • 18. 6/30/2010 18Confidential Issues with Video Analytics • False alerts – organizational impact • System maintenance – calibration • Cost of System - $300 to $500 per channel • Unrealistic expectations have been set: “VA eliminates human interaction” There is a place for VA; makes traditional solutions (Guards etc.) more effective
  • 19. Dario L. Santana Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 www.layer3securityservices.com dario@layer3securityservices.com INTERNET PROTOCOL VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY