sony security cio survival guide

24

Upload: wasef-al-hakim

Post on 03-Aug-2015

19 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: SONY SECURITY CIO survival guide
Page 2: SONY SECURITY CIO survival guide

How do you make asuspect bag stand out from the crowd?Talk to Sony about Inte lligent Object Detection.

Page 3: SONY SECURITY CIO survival guide

- -

Vof c lunky cameras and

closed·

ide·O surveillance is at thefront end of an astonishingtransformation. Once a world

circuit coaxial netwo rks hardw ired in to a room ful l of c loudy gray S·inch screens, surveillanceis rapidly becoming a land of sleek, intellige nt cameras linked to sohware applicat ons running on the IP network. Some of these applications arebasic, such as motion detection setting off alarm s. Some are clever, such as a grocery store system where cameras atthe checkout counter are l inked to thereceipt tape.

Though CCTV st ill composes almostha f the overal l v ideo surveillance market, its share is rapid ly swindling with a surge in IP-based digita l v·ideo systems. A nd

proving ROI on dig tal surveillance may not be as hard as you th nk either.The post-9/ 1 1 obsess on with secur ty created th s surgein surveillance investment, butwhat's susta n ing i t is that dig tal video surveillance appears to be l iv ing up to its hype.And, when done wel l, t prov des real ROI for the business. First off, i t allows for consol idation of monitoring:You canwatch many geograp hically disperse sites from one contro l roomHsomething that was impossible w ith c losedcircuitsystems. An even b gger benef it of d ig tal is that central control and monitor ing allows you to put cameras at smal lersites and monito r them from the cent raloperat ions center. With CCTV, you'd requ ire a closed system at that smaller site and onsite monitor ing, which itself

requires at least one employee.D igital video also beats tapein terms of storage and retrieval. Tape-based system s can require a full t me employee just for retrieval.

But the key to IP-based video survei l lance s appeal is the ever expanding roster of appl ications

being attached to it. In other words, survei l lance isn't j ust about security anymore.For example, in retail stores, v deo survei l lance is being used for

measuring foo t traffic through a store to understand both peak traffic t mes and a so shoppers' brows ng hab its, whichin turn allows them to better conf igure

and ise around the store. Of course

the survei l lance s used for security as wel l, but t 's also be ng utilized to t rain

new employees.Train ing, n fact, has become a

possiblekiller applet for video

survei l lance, duein large part to theincreased qual ity

ofthe images.Vide·O of cashiers at a

grocery store doing their jobs correctly {and

incorrectly) is edited into video packages that train new h ires. Still o thers are using cameras to improvelog stics, assembling trains at humpyards (where the rail cars come off boats and trucks), for examp e,

or monitor ing assembly l ines for quality control. Suddenly, surveillance is a business enab er, not j ust barbed wire.

merch

• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

c e o • n d . ,,.,.... ,. ,• • l,l.• n• 11" '11 O. . ,c t o•

...... A •• oc:i• t • P ubliidl•• 1,1.• n• 11" '11 e . ,. ,...,...... A •• oc:i• t • P ubliidl••e.i,,cuC h l •t 0 .• 1911+•o .,.ia. . .. . .

()omni<' 0 . S o " '•, \ , . ;111 ,.....

l(w,.tt>• 11,.. . . , ., •

J ,. ., . f h . , .b pfu••c. . ..... .,. .Mo,t.C.......,.,- ,a.,:i.,,

S,..,1h N• !h i+ • O . . .c t o •11' . . . ... a , .,w•...,.,••,•••

P •o dudOOn

N• N • Hood,. . ,. . . 1. . ., 1,1. .p , u ,fliut:.l!\l'I.....

J . . ,. . Th••ion•- • , .1 > . . 0 C p l>..,<0mC ••i<I

Jot,n,,.,..,S . .l>.c • p b o n

. . .. . . . . . .11 "'•"-ii. .

O Co-py ,ia,1,t 2 0 011 C PI,- '• <'o;M• , . . .,v+d ,

W hlo'" • p ul>hl l. , . . . . . . .. . • •,. .,y• " ""' 10 +nou••

"'*..,•. ,, . v o l • l

'" " " "" '" " ,n I"•" '"9" 'n+, . , ,. . ,'" ' n o t t + . . .1o1... . ,. .. . 11:, """""

+tftlfll l .,.n.

--=-

cp

( (:olj,() f l l '\,8USH!I <IM l (IIN. .h()NA

Kto• d O H ie •PO e - !U t t !

0 ......1.uAfT•l +117l • U l l l l,. ,., 11 3» 8• 4...-. .11,w,,w .cpd-

i.c""'

S O N Y. 3

Page 4: SONY SECURITY CIO survival guide

• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

IP network-based surveillance cameras offer enticing possibilities. But do you want full or partial IP? How much bandwidth? We'll walk you through the entire process.

Networt.: cameras for P-basedv ideo surveil lance systems

have been arou nd s nce

1996. These are attached

directly tothe network and send v ideo to a network video reco rder or to a server equipped with video management software,whk h stores, displays or broadcasts the images. It w il l be another five years, accord ing to co nsultancy and

research f irm Gartner, before t he market favors P over analog. However,IP cameras are considered a fast-growing market; according to IMS Research, the global

network video market grew 42 percent last

year and is expected to reach $2.6 bil l ionby 2010.

Experts say the reasons for analog's

con tinued dom nance center ma nly around up grade costs and a generallack of knowledge about network ing tech nologies

in many physical secur ity departments.Two Kty DtcisionsWhen looking at your options, the first th ng you need to consider is whether you should use fu l lor partial IP.Yo u can st i l l get some of the advantages of IP wh le maintaining your

investment n analog by using encoders

that convert t he analog signa l to one t hatcan run overIP. These systems work

well but are not architected for

growth . Ful lIPinstalla tions are more st reamlined and eff icient and require less maintenance. They re digital from one end to another

and are very reliable because th ere are fewer m ov ing parts.

Second, consider if t here is enough bandwidth on the co rporate backbone.

BecauseIP-based surveil lance places new demands on exist ng network

infrastructures, t he physical securi ty department has to work w ith IT to

imp ement or even choose t he best system, which means overcoming a t raditional barrier between the two groups. The bestdecisions on network design will be made jo nt ly between t he two groups, says JeffVining. research vk e president at Gart ner.Forinstance, because streaming l ive videois bandwidth -intensive, i t can be too costly to upgrade networks o r too diffic ul t to u sein situations where there are many users.. To optimize bandwidth, you may need to use appl ication del ivery control lers and/orwide-area-network opt mizatio n control lers,

he says.

• S O N Y.

Do's and Don'ts•DON'Tltt cc,st bt ,our guiclirlg ligtit. Most p,tople buJ<al'lera.s with cost as their hlghttt ptiority and fffectiYfftessu ttit secod, which resuttsin grainy, o .t·of.fows images. Thereare toolsnailable that htlp ro• cl!loost theresolution and ltltS dlatfits,our nteds, baste!Ofl fa,,c:tors likedistance and a 1H u heiglit.•OOWT ttiillk s •all whtll upgradi119 from analog/llYJt systems.

•00Hderst u d the trHe-offs to11,igli· quality il'lages. f¥Voracrisper il'lage o m saiooth motion.

•00co.sider U1e lm 1tfitsc,f ctnt,aliting video suTtila11ce.

• DON'Tassumt everything isl'lil and•atch. Wllile runy Htwork a • ffas da.i• compatibility with rnuy vendors'Yideo ma11a.ger.et1tsoftware, SOile nu.agemHtsoftware is • 0ore o,tn ttianoth«s.

Page 5: SONY SECURITY CIO survival guide

Because IP-based surveilla nce places new demands onexisting network infrastructu res, the physical security department has to work with IT to implement or even choose the best system, which means overcom ing a traditional barrier between the two groups

b aJuation CrittrilThe range of features avai lable on network cameras is co nstantty chang ing, but here are some basic things to look for, according to ana lysts.Field of v iew : According to Vining, most appl ications cal l for a 2404 degree field ofview and a zoom capability of 500 feet.For those who need more, th ere are pa n/tilt/ zoom (PTZ} cameras, which can prov ide360-de,gree views. These can cost mo re t hantwke as mu ch as fixed camera s, Vining says,

and normal ly require more maintenance

because of their m oving pa rt.s. Bandwidth: It's a huge issu e, especially as demand grows for more cameras on thenetwork and higher-resolution images. You can reduce bandwidth consumptio n by putting intelligence into th e camera, says Simon Hanis, senior analyst a t IMS Research, so, for instance, only certain images are forward ed. However, that means you'reno t recording nonevents that may supply

needed context."You need to use that selectivety," h e says.Power source: The state -of-the-art approach for network cameras is to use power over Ethernet (POE), which means you power the ca mera through the same wire that sends the IP signal resulting in significant cost savings. POE is not always available on PTZ ca meras, however, because of the amount of power they consume. Also ensure that the POE fea ture complies with

the IEEE 802.3a f standa rd so it 's co m pat ible with network switches from lead ing vendors .Reso lution: Many use rs are m oving toward megapi xel cameras, which offer five times the resolutio n of video g raph ics a rray (VGA) cam eras. Not onty d o you ge t a d earer image, but because of the higher resolution, you can also reduce the number of cameras you need.Auto filtering :For image clarity in various lightin g situations, it s impo rtant to get a

camera ,vith adjustable lenses to control the a mount of light that is received. This is especially importa nt, Vining says, w hen a camera is facing east o r west. However, hesays, some orga niza tions will sim ply eleva te cam era mounts a nd then angle downwa rd to view the horizon ra ther tha n incur the additional costs of adju stable lenses.Open platforms: Look for vendors that comp ly 100percent with indu stry standa rds, su ch a s in th e a reas ofsecurity and video comp ression, Gartner recom mends. Also lo ok for open application program ming inte rfaces a nd multiple supported software application s.Scalability: Companies with large installation s will want the equ ipment to be

compat ible with tools that locate, update and monitor the status of the devices and the ir IP addresses.Service fsupport : Make sure the vendor or reseller is able to send replacement parts quickly and can readity offerengineering support. Many ne twork camera manufa cturers sell indirectly th rough channe l partners, which is common in the IT indu stry but not in the secu rity industry. This takes some ge tting used to a mong traditional security personnel.S O N Y. s

Page 6: SONY SECURITY CIO survival guide

AVOIDING COMMON MISCONCEPTIONSABOUT VIDEO ANALYTICS• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

Video content analysis (AKA video analytics) is getting better all the time, but it's still new enough that buyersshould proceed with eyes wide open

6 S O N Y.

MYTH ONE: Video analytics can replace or su rpass human performance.W hen confronted with an un ike y claim about video analytics, a good rule of thum b is to ask the following quest ion: could a person watch ng the video perform the same task? If the answer s no, then i t is unl ikely that v ideo analytics can do it either.Evenif the answer is yes, i t is still possible thatthe abilit ies of video analytics will bestretched •• remember, humans have been interpreting v isual images fo r about S mil l ion years. Computers have only been at i t for about 40 yea rs.THE TRU TH: In most operat ional environments, good analytics software can be configured to be a s capable as a human observer at de tecting important events such as cars parking illega lly, people climbing over fences, people entering restricted areas, and so on. This event discrim ination ability makes th e techno logy a significant improvement

Video analytics is one of tho se hot technologies that gets peop le excited . The ability to use artificial intelligence based technology to"watch•video, extract useful information

and creat e a lerts holds much promise for security and surveilla nce applkat ions.In fact, the technology can appear socutting edge that it often sounds more like science fiction than reality. And,u nfortunate ly, the excitement a round the tech nology has led to a marketplacewhere the line between fict ion and realityh as blurred . For instance, one commo n myth about video ana lytk s is that i t can spot a terrorist in a stad ium full of people·· something even th e hum aneye can't detec t . Or i t can automatically"see" a person cheating at a black jack table, while highty trained surveillance personne l cannot. This article covers the five biggest myths of video analyticstechno logy and practice, and exa minesthe true state of·the -a rt .

Page 7: SONY SECURITY CIO survival guide

over oth er sensing technolog ies suchas b uried cables. m k rowave detec tors, and taut wire fencing. The real value of video ana lytics, though, is that casts an unblinking eye over the scene 4 4 in this sense, it is a dramatic improvement over huma n pe rformance

most realist ic operat ional scenarios,there will be ma ny false alarms caused by extraneous mot ion and the inability of VMD to dist ingui sh betwee n an y motion and a real event of interes t .

THE TRUTH: Like any p roduct, th ere a re varying design spedfica tions beh ind each video analytics application. Don'tbe fooled into thinking that a technology for counting people in a re ta il settingwill work for perimeter protec tion or vke versa. Analytics products often make assumptions about camera orientat ion,d istance to objects. numbers and type s of objects, indoor vs. outdoor environment s, illumin a tion and many other factors th at can affect performance . Make sure that whichever products and technologiesyou choose are appropriate for your operational environment and your partic ular mission.MYTH FOU R: Video analytics (or the necessary hardware) is not cost effective. H istorica lty, video ana lytk s solutio ns h ave req uired a serious capital outlay to ge t

MYTH TWO: Video ana lytics can improve bad CCTV infrastructu re . Most CCTV systems a ren't designed with video anatytics in mind··in fact, many are designed without human operators in mind . Cameras are often low q uality; views a re obstructed by natural o r man -made obstacles such as trees and bu ildings; and scenes are often poorty illuminated at night. Ana lytics is no "'magic bullet"'that can see through walls o r turn night into day. If the cam era doesn't have a d earunobstructed view of the area of interest, anatytk s will struggle to add value.THE TRUTH: The performance of ana lytk.s systems is generally very acceptable inwen-designed operating environments. If there are enough pixels and appropriate

Analytics products often makeassumptions about camera orientation, distance to objects, numbers and types of objects, indoor vs. outdoor environm ents, illumination and many other factors that can affect performance.

illumination to view an unobstructed area of interest, detection rates are u su altyvery good. Most reputa ble manufa cturers claim detect ion rates (in ideal cond itions) of over 90% with very acceptabl e fa lse alarmrates · as low as 1 per week per camera or even better.

ne size fits a l l Cu stomers often have ble in the field w hen an ana lyticslogy is taken out side of its

comfortere are many different video

rod ucts that a re designed to

eren t jobs in many d ifferentvironments. Many vendors

Video Motion Detec tiont video ana lytk s. In a

indoor environment, some value but in

up and runnin g. Per camera license costs used to be very high; systems required large PC infrastructure footprints; and deployment, maint enance, and training costs were a constant financial questio n.In some cases th is is st ill true! This is a very large expense for system that isn'tgoing to replace a human guard.force an yt ime soon.THE TRUTH: Video an alytics technology, as it h as matured in the ma rketplace,has be come more of a value added compone nt of CCTV infrastruct ure rather than a stand alone enterprise software solution . Today, it is possible to purchase true intelligent an alytics capabilities a sa feature of ma in·stream CCTV hardwa re compone nts such as: cameras; IP video encoders; IP routers: and OVR s, NVRs, and

S O N Y. 1

Page 8: SONY SECURITY CIO survival guide

video management platforms. A nalytics features do add a p remium to the prices of these devices but the price-tag issignificantly lower than a stand alone PC-based solut ion. Furthermore, more sophisticated customers of analyticsh ave seen more value in analytics thansimply rep lacing a guard-force .Customers

are now reap ing value from analyticsby making their people, processes andinfrastructure more cost effective .Thisis be ing done by using analytics tohelp opt im ize bandwidth and storage of ne twork v de·O system s; or by usinganalytics to make foren sic investigationsfaster and more personnel-efficient.

Analytics featuresdo add a premium to the prices ofthese devices but the price-tag issignificantly lowert tian a stand-alone PC-based solution. Furthermore,more sophisticatedcustomers of analytics haveseen more value in analytics thansimply replacing a guard-force.

MYTH F IV E:Video ana ytics is over·hyped . It seems that there is a newvideo ana ytics vendor hawk ng their wares every week. Every v ideo analyticsapp ication is the best on the market: the

most robust: with fewest false alarms;also easiest to use; and operat ng in the w idest variety of environments; oh, and i t costs almost nothing to own.With all the market noise, i t is ditncult to separate the wheat from the chaff of even f igure out if there is any wheat at all!THE TRUTH:like any competitivemarket w ith new and excit ing techno ogy, there w il l be outrageous claims madeby some less-than-scrupulous vendors.But this doesn't mean that everythingis hype.We're al l fami l iar w ith used car sa espeople and yet there are a greatmany good quality used cars out there. Be suspicious of a vendor who answers•yes" to every question. Look for reputab le vendo rs with p roven track records.They w il l help guide you through the process of evaluat ng and deploying v deo analytics. They will help set e,cpectat ons and work w ith integrators to ensure that CCTVinfrastructure w ill be approp riate to make your m iss on and your exper ence w ith analytics as successful as possible.s S O N Y.

Page 9: SONY SECURITY CIO survival guide

LOOK SMA RT• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

Video analytics has come along way from the hyped up, gee·whiz technology of a few years ago thatpromised way more than i t cou ddeliver. The good news is. the tec hn ology

has improved enou gh that organ izations, slowly but surely, are finding that analytics tools can help them make sense of all the video they are collecting and

even find an R O I -but only if they a re careful shoppers. Here's w hat to know before you beg n.

intrusio n detection, entry t hrou gh an exi t and so on. Some of the analytics

companies are still focused on only the software.

TIP 2 - Start With Your Business NHd- Th•n Select the TechnologyThe lat est v deo anatytics tools claim to

do very sophisticated activities, from identifying loiterers to detecting vandalism to monitoring crowds for dropped baggage.When evaluating your options, you may be tempted to get carried away. Don't. Always start with the b usiness need, then see if there is technology that could fill i t - not the other way around .

It s like every other decision. What is the return on investment, what is the value it can bring my organization, and what can it

TIP 1 - Und•rst•nd t h • Mark•tplace Once, video analytks was largely a software business, with applicat.ionsresiding on central servers or digital video re<orders.These applkations were (and still are) based on algorithms that monitor for spedfK event. s - motion detection,

help me accomplish tha t I can't accomplish any o ther way? Could analytk.s allow youto reduce your security guard force? Could it let you monitor a site remotely and save money on gasoline? Could it help manageall the video information you're <olle<ting or let you <onduct investigations more efficiently? Prices have come down, but the te<hnology is st ill expensive.One way vendors are dealing with this is by moving to packaged models, with groups of algorithms targeted at specific industries.TIP 3 - Think About Whe th er On-th •· E d t • Analytiu Makes Se n u f or You Another key decision is whether you wan t to have content analysis performed "on the edge" - that is, on digita l video <ameras or encoders, rather than on servers or DVR.s. Analysts say this is where the industry is heading, but right now you still have a lot of option s.

The advantage of on the edge analytics is that content analysis <an be performed when the video is of its highest quality, before it is compressed to be sent over

the network and stored .A traditional. cent ralized model, however, provides

more flexibility. One OVR or server <an do analytic.son more than one camera feed, which means that <apabili ties can

be dire<ted and redirected based on the

needs of the minute.Which direction to go, says Frost &

Sullivan research analyst Dilip Sarangan, depends largely on your organization's network capabilit.iesand what the IT

department is willing to put on the network, since video traffic tends to

be a bandwidth hog. The decision may influence which vendors you want to

consider. Some vendors, such as Cemium, focus on centralized tools,w hile others such as toimage focus on on-the-edge setup s.A lot of vendors, however, do sell

both .

TIP 4 •Test , Test , T u t., B•fore You Writ. the CheckOnce you identify your business needand narrow down the field, it's t ime to start testing.Video anatytics technologyis able to deliver on more of its promises than i t could a few years ago. Even today, however, the techn ology must beconfigured correctly, and i t may not work at all in certain situation s. Fortunate ly, vendors may be willing to let you try out the hardware or software for a month or two before you actually write any checks. Insist on it .

S O N Y. 9

Page 10: SONY SECURITY CIO survival guide

• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

The growing popularity of video surveillance is fuelled by the shift to IP video systems that are less expensive than traditional analogue systems and make it easier to add or relocate cameras and multicast video signals to multiple locations.

,o S O N Y.

Page 11: SONY SECURITY CIO survival guide

Video-recording managem ent software also can act as a traffic cop - lielping distribute video in 1GB blocks across various iSCSI disk arrays on the network. This allows for higher storage limits for cameras that are capturing video in sensitive or high-traffic areas where alarms are frequent.

Yet, every system is limited by two finite resources:network bandwid th and d isk space.

A 100Mbps networkconnection can support nearty 85cameras producing 10·1SKB images per second (about 1Mbps each), but the network will be running a t 100 percent utilization. Whether the IP video systemis on the existing IT network o r a paral lel network, en terprises need to set a rea listic ba ndwid th targe t and then determine how many cameras can be supported by their infrastructure

To en sure efficient ba ndwid th usage,security integrators can help design

fluid systems that adjust to accomm odate traffic surges. For example, frame rates can be

red uced temporarily while the sharpness of each image is mainta ined, o r the same num ber of fra m es can be recorded a t a lower resolut ion.

Video conten t analysis (VCA) embedded in an IP encoder - the device tha t translates analog ue camera signals into digital - also can reduce the amo unt

of traffic sent across the network .With

VCA a t the edge, it is possible to only transmit video tha t generates an ala rm due to a security concern - su ch as a perso n loitering, thef t of a n object or an object left behind in a scene . By selecting spedHc port ions of v ideo to forward, VCA diminishes the a mount of ba ndwidth

req uired for surveillance but enables all camera channe ls to be monitored effectively.

Of course, storing all of that IP v·ideo represen ts a challenge. A 200GB hard drive ca n s tore approximately two weeks of v ideo da ta, depending on the quality of v ideo . For so me industries, such

as correctiona l facilities and gaming,reg ula tions require tha t reco rded

video is stored for a longe r period of time - up t o 30 days or even a year in some states .

Enterp rises ca n red uce s to rage costs by improving and o p timizing how the

available sto rage is shared among cameras. The trad itional s to rage approach uses network video recorders (NVRs), whkh

are PC servers that act a s ga teways to directly attached SCSI RAID storage o r storage-area ne twork storage . By moving the intelligence to the edge, it is possible to config ure a n IP ca mera or IP encoder to stream d irectly to a n iSCSI RAID, bypassing

the NVR and the associated capital and ong oing costs .

The difference in this architecture is pa rticularly noticeable in dispersed systems where the WAN lacks the

ba ndwid th for centralized record ing .

Instead of installing NVRs in each building, which can be a maintenance nightma re, en terprise s can insta ll s to rage that is directly attached to IP ca meras or to IP encoders.

Consider a university wit h 20 buildings and 25 ca meras per building. Each

camera is recording high-quality v ideo a t

2.8Mbps per camera for 90 days. With an NVR solution, the university would need

1,SOOTB of s torage and 40 NVRs sp read over each loca tion. With direcMo iSCSIrecording, the 40 NVR PCs are not req uired.

Multip le cameras can share thedirec t tO·iSCSI RAIDs on a local record ing network, keeping the reco rding load off the main local or wide-area netwo rk.Video traverses the backbone only when perso nnel need to review stored vide·O. When this occurs. the video can b e sh ared and searched by a nyone with the proper

network access.This approach also mea ns thatenterprises d o not lose reco rded

video due to network outages or NVR server

hardwa re or sohwa re failure.Video recording management

sohwa re also can act a s a traffic cop -helping distribute video in 1G8 blocks across various iSCSI disk arrays o n the ne twork. This allows for higher storage limits for cameras tha t are capturing vide·O in

sensitive or h igh-tra ffic areas where alarms are frequent .

Also, if one disk array fails, the recording -manageme nt software will

sim ply redirect v ideo to a backup devk e . That results in bette r d isk utili zation, better load balanci ng and g reat er re liability. This

architecture is also simpler, with fewer items that can fail, and less hardwa re and sohwa re for IT perso nnel to manage.

Among enterprises, there is no doubt tha t the use of video surveillance is growing, makin g it importa nt that IT managers understand the methods to eliminate issues tha t ca n cause network

congestio n and failure. Record ing video a t the edge is a simple a nd com mon practice tha t can make IP video su rveillance systems easier to manage a nd mo re cost -effective .

S O N Y.11

Page 12: SONY SECURITY CIO survival guide

• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

TIPS TO GET YO U STARTED ON THE RIGHT ROAD

STEP 1:D•t • rmine your u m . , H ' ra ison d 'i tre.From th is you'll be able to decide just about everything else. Be on demand, beca use you can't watch th e cameras all the time.You sh ould be able to call up the camera with the best coverage to mo nitor situations if and when incidents occur. Allow for targeted smart cameras for high-risk areas, so that camers willtrigger alarms when something begins toh appen .STEP 2:T•k• •n inventory.If yo u have cameras already, su rvey what departments own them, what they are for, h ow they are mo nitored and what format they use, then decide if any of these cameras can be folded into yourn ew system.

STEP 3:G•t s m u t on ca mera t echnol o g i u .Determine the effect of new technologies on operations, training, maintenance and staffing. Determin e how clear you need the picture to be (as opposed to howclear yo u want it to be).This will have an impact on costs. Here are some of your ch oices:• FRAM E RATE.The more fram es per second (fps) you choose, the morenetwork capacity each camera will require and the more data storage you'll need.• RESOLUTION.Similar to frame rate.but this is not a motion issue; rather, it s a clarity issue. The clearer yo ur picture,the mo re pixels i t will have, the larger the file will be and the more bandw idth i t will consume.• COMPRESSION . There are several sta ndard commercial compress io n algorith m s. b ut the most common. for

,2 S O N Y.

Going megaNetwork u11Hruart rupi"9 tht btntfits of die me,apiul rev• lutiort, a major btntfit th.It uirtnot r.e adiitvtd by ttltir.1..ato9ue counter,arts. tbt ntw geoeratiort of 1ae9, apixtl<amtm provide tllh.lll<td darity.11ld practiu,I irittligenct intoanyst<urityorsuTtila•ct operation, from.1if'1'•ru, stadiums anti stioppin9 ,ulls., to<orporatt, ba1tin9 carparts and pu.ii<spaces.. the me9apixtl resolrtiort will t l t t •4 your u,p,1bility I t prottd people, property, p,.ducu.11ld nnicts. Wrtb 1J me9apixtl rts.lutioa, thiseew gtntration of ca111er1:s<al'l cltlivff sbirp afld vivid images., at tvt••idt Yitwing a11gles., ideal fOf fortesicdetailsin st<urit)'a,ppliuitions like buiklin9 tflttallctSa11d u r ,arks, the me9apixtl range gh-tsJOU the level of idt11tifimiort detail you 11ttd•ithout creating ovtr·large files cnsin9 bandwidt• problfflls,

Page 13: SONY SECURITY CIO survival guide

S O N Y. , 3

Page 14: SONY SECURITY CIO survival guide

al l the r ight reasons, is MPEG-4.You can add a commerc ial compression package to your MPEG-4 to fur ther reduce your storage needs.• STORAGE DURAT ION. Th rty days of storage is the unofficial standard.Th s g ives enough t ime, without overdoing it, to learn of an incident before the data islost. When you get an event of nteres t, you should p an on dropping that file onto a DVD and storingit ndefinitely o r at east unti l al l cr m inal and c ivil proceedings are concluded, ncluding appeals.You can also send events ofinterest to a separate server fo r indef inite

storage.• STORAGE SIZE. A single digital camera running 24 hours at just S fps, using MPEG-4 at Quarter CIF reso ution, creates 11GBof information. A 500· camera system, not at al l uncommon for corporate build ings and campuses, will generate 165 terabytes every month. Soit's easy to see why keeping pedestrianimages beyond 30 days is economk al ly foolhardy. And remember, th isis wit h cameras running on spare frame rates and resolut ons. Full motion v ideo (30 fps) wi l l create 990 tetabytes, almost apetabyte, of data. If you also go to full CIF,mult iply that by four, and you 're talking a few petabytes a month! Stay on top of the contractors and consu ltants so that they st ick to the original engineeringd iscuss ons, or they could eas ly overdo your system. Mission creep can be expensive. And remember, t 's not j ust storage but also bandw idth you haveto consider.

14 S O N Y.

At some point you'll want toconvert your images to digitalto take advantage of its easier storage and better retrieve and search capabilities .

• DIG ITA L VS. ANALOGUE . At somepoint you'l l want to conver t your imagesto digital to take advantage of ts easier storage and better retrieve and searchcapabi l ities. But analog images can travel farther from the camera, so cable runsw il l impact your choices.A consultant can adv se you on the best route to go.• PAN T LT ZOOM (PTZ). There are two ways to do th is. The old-fash oned way, which stillworks real ly wel l, is tophysical ly move the camera and change its focus whenever you want to get a

c lose-up. Dome cameras have a dark bubble over the camera to mask whereit is po inted at any given t ime. Make sure each PTZ has a default •park• position that gives you an op timal v·ew and focallength. I t is easy to forget to do th is andleave a PTZ whereit waslast focused; th s w il l likety not give you the best coverage w hen nothing special s happen ng. The other (more costly} way to do PTZ isdig tal ly, wit hin the image itse f.This will require megapixel images. Zooming in on, say, a l icense p ate, will fuzz out the imageil legibly if you don't start with sufficient pixel density in your camera platform.

Page 15: SONY SECURITY CIO survival guide

Surveillan ce software reven ue to quadruple by 2013

Ina ntw studylllat hu pote• tilllJOrwelliall i •plkations, A.Bl Res.arcll projt<Udlat l ' f f t f l t e forvideowmll&ln<e

softwartwill q11ad,. , .k everthe nut five years. Accotdi•gtoA.Bl Vi<e Preslde•t and b seatth or ertor Stan Sdlatt.. rneitue generned from s.rve lance software willincrease t o • ore tMll S900 milio. i lt 2013, • P from a i r r t f l tteVtlllltS of $24$ million,Sdlattsays there art se,eral big dri¥ersto,tilisirlaeas.t., i,ul• ding il'luHsed spe11dil'l9o . security systffll sbydie government Otl theft p ,ewntiOf'I sys-tenu b)'rt-tail outleuancloe surveillanct It}' mil1ket res.tarclers.AdditiOflally, he saystflat theadvft'lt of Wj.fi Msmade itpossible toplace wirtlesscamerasjust aboutanywhere wllik stil sending fooU9t ba.c:k toa central locatio• .

Looting atdie broaderpimlre, Sch.1tt saystflattedinologia.l advancesareabo inmasir19

ttiescope and the poteetill usesof video s• rveillance, He says th.ato11e

of the more dist11rbin911Sesis theability of store marlttiegdepartnuntstoactllaly rnoeitorthe eyeb•H 1.0-ttmentsof customers tofi9urtollt wlwlt products or displays • aw their atteetio11.

"Wbtn stottS have theability i . ollsffl't yo.• s

you walk through a SIOtt, wflat I an

il!Wlgine istlwlt morund• orestoresw•tJ}' toba:slc.ally

havea pretty in-dep knowledge ofthts<11stomm,"lle says.'"Solefi s,yfOf instance thestore issues you a dis<o. . .t an l thatalso hasa n1ditfrequeecy ID um icleetifies whoyou are, Atld tbenltt's say thtyobserve you looking at, butnot a<tually pwdlasin9, rncvies in theadglt'tideos.ection.Well, the l lt t t thiagyoublow)'Mre9etmga ltties.e,ro,.otion.almaterials forracymoviesyoWre not f ' IH intHtsted ia,"'

S<lwltt abo 11otes th.at more

•nd m0tt batikure lookieg into htstalling u • eraswith face recognition allility to hel, pre¥fflt rotilleries before theyne11occur,Thus, when ablowll banlrollber enten aba11k,ttle

camera cn recogniu his face and seedoutan alert.Winos arealready deployi,9 this sort of face recognitio. software i .

•onitor their employees. S<hausays, and •SWl9it to detect wlle11 certain employees ft'lter into•n.authorized areasan4

alerting e securityteam,Sdlatt btlieves th.au s

•ore surveilancef'Cl11ipnu11t becomesiriaeasingly digitiud antlsoftware-reliaet, itwill inaeaSWlglymovt irito the

,urviewof IT de,artmeats.. Aftd becauu the s..neilance software vastly broadens the e:rtent to wtiidl companies and

9oven1menuca.watdl people,

i twill inf'ritably m ate privacyco11cerJ1stllat will have tobe add.ress d .

"Dow• the road o. ,

behaviour is9oin9 tobe oluffl'td ••dimottfre111t11tly, and tllat kasall Dul of i111plk.rtion.S:he says.."'Imeat1, thefact that t e (rea<tuly looking at your eyebal•Oftme11u sll.wswe'v-t t tached • whole new real• of wrveillan<e capabilities,"'

STEP 4:Wr.stle • few more issues to t h • ground.• MONITORING . This is a cont ent io us issue. The p ublic may expe<t thatcameras a re mon itored all the t ime,b ut it s neither practical nor possible. The best you can do is p ut your high· p riority <amera images up in yourcomm and center for occasiona l viewing. Even better: Use an alytics sof tware to pinpoint an event of interest and <a ll it up with an aud ible alarm.• DECOYS. It may be tempting to use dummy camera domes to suggest you have su rveillance, th is will g ive you,p ublic a false sense of security. Most competent p rogram s avoid the ir use, except in specific circumstan ces andthen only in concert with live cameras.• STAFFING. It s unrealistic to expec t to be g iven add it ion al staff to monitor a new suite of camera s, and it s equally unrealistic to expec t to ge t differentpeople than the o nes you have now. For these reasons, you will want to choose a system that has a simple GUI (graphical use r int erface), provides ou t-of-service ala rms for cameras and encoders, is low· maintena nce and has high mean t imes between failures .• POLICIES ANO PROCEDURES. If yourcameras can view geog raphy off yourp roperty, consult with your sohwarep rovider to mask out th ese areas . This is especially important if you haveline of sight to residential p roper ties. Supervision and the applkation of swift discipline are very important to avoidinappropriate use.• TRAINING.The mo re complex your syst em, the more training the staff will need. This takes good time manag ementbe<a use un less you have a full shift to go on training rotat ion, you will be do ingtraining on overtime .• MAINTENANCE . Include in yourmaintena nce contract a service-levelag reement th at g uarantees your high· p riority camera s are fixed promptly.Be sure i t requires an adequate stockof onsite re placem ent cameras andne twork encoders and o the r perip hera l devices so that the mo st importantcameras can be restored to servk e quickly. Yo ur system shou ld open atrouble ticket immediately upon d evice failure, and you will want to review the system's performance monthly to en sure you are up to speed on how reliable itis and w hich p arts are giving you the most trouble.

S O N Y.1s

Page 16: SONY SECURITY CIO survival guide

• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

Sony is at the forefront of the digital ranging portfolio of products and sol Manager, Sony Professional Solution trends in the regional market.

• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

nee revolution,offering a wide Magesh Srinivasan, Marketing East,encapsulates some of the key

16 S O N Y.

Page 17: SONY SECURITY CIO survival guide

Is SclflJ bullish allowtthe s11rYeillanct martet i11 the Mkldle la.st? Do ,• .,seei te<hHl• f J shift (Nun aniklf H t t IP?Yes,we areq uite optim stk in our outlook towards this market.Clearty, with secur itybe ng on top of both pub ic and private organizations there w il l be a greater focuson th s technology for years to come. Furt her, v'ideo survei l lance has various emerg ing app ications for example for the retail and sportsindustry both of w hich are high growth areasin t his region With regards to transition from analogue to P vte've seen a big growth n demand for IP cameras since '06 and it will cont nue to r ise.The market has adapted by making available hybrid p roducts which support both analogue as vtell as IP cameras, such as Sony 's new Hybr id NSR- 1000 series of Ne twork Surveillance Recorders.

Whit impart will h v e tlte new generati . . of•e9apixel ted1n.klt,hive on t11e market ind tflterprise HtworlutHigh Defini tion is the name of the game n al l current and fut ure v isual communication technologies. We've seen HO w aveinf luencing all Consumer and Professional e ectronk technologies across the globe.Video Security has seen t he beg nnings of HD transition wit h th e n troductionof mega pixel'IP cameras, specificallydes gned to meet th e needs of the v ideo

secur ity market. The tech nology enablesa new set of applications w hich cou ld bedelivered owing to greater v sual clarityfor surveillance. Hovtever. the end-userappl icat ons are stillin the earty stages andi t would take at least another year to checkand conf irmif the intended benefits come

th rough with acceptable trade off on Pnetwork bandwidth and processing powerof t he server.

camera is expensive,over r ime « onomies of scale' shouk l br ing down

the end-user price. Sony's range of mini-do me and box cameras are equipped with 'Light FunnelFunct ion'and ExWavePRO for high sensitivity and are also capable of ' ntelligent Motion OetectioO:These features aUovt effectiveimplementation on projects that may have very br ight or dark environments, face

identification, number plate

recognition and other such applications.

One of the bsues with tlle IPs11rYeilla11ct marl:et

b tick tf • •rtet educition ind la<k of ope.nstandards.H••do ,.uuckle this

bsue?We nvest a large port io n of our resources towards market education and training on the P video security techno logy .Wit h regards to t he ssue of 'lack of open standards'a key event occurred duringIFSEC'OS.Three leading vendors of

ne twork video products - Sony, Axis and 8osch - began work ing col laboratively to establish a global openinterface standard. Open Network VKl eo nterface Fo rum- ONVIF wil l be the governing body to formulate and communicate the ind ustry standards. A standard interface will achieve interoperabili ty betvteen al l di fferent

vendors' products - allowing customers to "p' k k & mix" equ pment from various companies and then simpty"plug & pl a y This new standard w il l offer increasedflexibil ity to n tegrators and users of network video equipment.

Will megi pixe.l umeru lte more Hpeu inandwtiu kind tf ipplicitions4• Jl>U see forthis tedlntklty?Yes, mega pixel will cost more as thetechnology required to build a mega pixel

Whit is Sony doing t t lm 1npartnff n , ertise i l lHtworllYi4eo sol• t" '•ulWe ensure that our channel panners are

have access to free tech nk al train ing on a regu ar basis as well as acqu re professional guidancein key

projects.Further, we are put t ing in place a process of accreditation for ou r channel.Th s requires the prospective dea er or system integratorto com ply w ith the specialist skill set and knowledge base as required to providevideo secur ity solutions to end-u sers.

We ensure that our channel partnersare have access to free technicaltraining on a regular basis as well asacquire prof essional guidance in keyprojects. Further, we are putting inplace a process of accreditation forour channel.

S O N Y. ,1

Page 18: SONY SECURITY CIO survival guide

THE DIGITALWAVE• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

IP video-su rveilla nce systems offer features far more adva nced than wh at you can get from standard analogue CCTV.Simon Nash, Senior Europea n Marketin g Manag er, Network Video Monitorin g, Sony Europe, talks about why these systems are becoming in creasin gly popular in the enterprise.

VWH su m ila11c.t hastr.Kil•aal y beef! a dosed·<imiit ••alofue affail'n i• bJthep Iseairity naff.Now, wllat isdriri•gthe sh.iftttw-ards IP·llase4 dt9italr ,ste,u tWe areexperiencing a rapid shift from existinganalogue systems to IP.This is mainly due to customers taking advantage of the &a test intelligent video analysis.Current motion detection analysis can only alert operators when and where to look at images. but are unable toident iy specific behaviours.With intelligent video analysis.a system can betuned to send an alert based on highly specific conditions appropriate to the iod ividual

cameras'role withinaninstallation.Thesystem designer cancreate highty customisedinstallations where each camerais set to de ivera range of alarms to signal whenvarious events occur so that operatorscanrespond appropriately.Such a fine tuned system with a high degree of filtering makes efficient use of theoperator'sanention.They donot haveto watch muhiple screenssimuhaneously,and images that are selected andpresented are looked at carefu ly.Intelligent \lideo analysis that makes better useof operator attention produces greater accuracyin monitoring with faster response times.While the number of

operators rema ns the same., the system's overall effectivenessincreases.

With the rise of IP based digital systems.\lideo surveillance has become anotherapplication on the corporate net\vork managed by the IT department.

Do IPNsed syste• s,o IMphd j• st• ci•it.or91tl Wllatnew applkatiOfls are fffler,irltlYes, n fact many customers are using thecounting capabilities of our cameras and mar\clgement software .Wea.re see ng anincrease of this being used for many other applications outside of traditional security applications..Wh t i• plkati• n:s will vid e . survtill,a .cthaw

o• eatetprise flet- .rltsas i t lte<o•es 111applkatiOfl! W h do (10s11ee411 to h e p i• mi•dwhile411esi9ni• ga survtillol11ctirlfrastrltffllrelWith theiocreased popularity of the megapixel cameras, this is havingan mpact on the bandwidth requirements. Itis mportant to work with a manufacturer that has a heritagein producing H264 cameras.Sony has been producing cameras with H.264 compression since 2006.Wenow have eight cameras using this algorithm.

<.a•vid e . aiutytks hielp compa•ies todrawi11telllfet1<e fromthieir surwilan<e vil e .?Yes, ntelligent video anatysisis being used formany other applications.. For example, retai l owners a.re using Pcameras to not only provide traditior\cllsecurity, but also heatmapp ng fuoctions to show hot spotsin their stores..

<.a•you tel us ftMltt abo..t S .ny's Distrill•ted &illan<edPNctssi119 Ardlit.ecturetSony's newIP basedsecurity architectureisa fundamental departure from today s back heavy,centralised processor systems.As its name suggests,DEPA distr ibutes processing power throughout the system to avoidthe performance bottlenecks inherent to pre\lious designs.A DEPA system assigns specific processing tasks appropriate to eachseparate componentwhile shar ing processing power betweenlike components..This opens new opportunities for system flexibility and scalability.Overallsystem costs aregreatly reduced by closelyintegrating pre processinganalysis and metadata generation inSony, DEPA enabled Pcameras.with back end processingin network video recorders. Inaddition, the front end anatysisoperates across all the cameras simuhaneously.Th s sign f icantly raises the overal lsecurity capabilities.

,s S O N Y.

Page 19: SONY SECURITY CIO survival guide

Experts Group.We should note that MPEG

comp ression techniques can also be used

for video thatis sent over non-IP networks

l ike broadcast cable te levision systems.MPEG-4 Part 10 has a so been

incorporatedinto thelatest rrustandards

and this most recent standard s referred to as H.264 or Adva nced Video Coding. MPEG-4 provides a signi f icant

improvement in both picture qual ity and i t doub es bandwidtheffic iencyw hen compared to MPEG-2, MP-EG· 4 Part 2, or H..263 techn ques.

For video, the two most common compression techniques- MPEG-2 and MPEG-4 were established the Motion Picture Experts Group.

H.264 PRIMER• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

How video over IP worksV

ideo encod ng and session controlis more complex than techniques used fa< voice because i1must allow fora wider al lowance of bandwidth, i1must include protocols for presenting

pictures on a multiple k nds of screens,and it must also include an audiocomponent to al low for sound that accompanies the picture.

In the voice wo rld, the ITU T has establ ished a series of standards including G.711, G 721, G.722,G.726, G.727,G.728,and G.729. And once digitized

and encoded, voice transmissions (or sessions) are typically controlk!d by H.323 or SessionInitiation Protocol.w ith SIP be ng the strategkalty controlk!d pro tocol.

For video, the t \vo most common compression techn iques . -MPEG-2 and MPEG-4 were established the M otion Picture

H.264" Zulres l f f lbandwidth,whllt dtl nring btttor plctun qualityPSNfl (Cl8t .... ....._,tt

..:A .1 , ...,..,

·OCfIIHcl . . 1«11111.

..10 - 1 1 . .,. .

uu r.-.t1,11.

.,.) S

µ

i .1PEG..t

" "' "

.i

!.11 , tt tK!

W1)

,oo

0 ,oo ,oo

lmprovtd quaJjtyBecause the P-VOP elements of each frame are more accurate, H264 will provide better images w ith moredetai In securityapplications. this could make a real difference.

H.264 t 1pl1intdIn MPEG-4 co mpression, each frame is subdividedinto an nitial Video Object Plane (I· VOP), which contains al l the anchor

data, and several PredictiveVid eo Object Planes

(P-VOPs) w hich p redict the difference between the current image and the previous VOP. H264 works on the same pr inciple, butadj usts i ts data capture for the P-VOP-sin real·

t me, to focus more accuratety on the area where movement has occurred.This achieves enhanced mages whi lst actual ly transmitt ing significantlyless data.ltss bandwidthFor network security users, H.264 offers all sorts of practical benefits. Us ng network cameras designed to wo rk with H.264, you will need less bandwidth . MPEG-4 requires approximately one-third of the bandwidth used by JPEG; H.264 requ res just o ne fifth. That's a most a 40% saving between standard MPEG-4 and H.264.Rtductd StOTlgtWith better compression, your stored files will take up much less room o n your server, potentially saving signi f icant sums in your net\vork storage requirements.

S O N Y.19

Page 20: SONY SECURITY CIO survival guide

Ph1!1p Robinson, 0 0 , Shal)ah Teaching Hospital

Page 21: SONY SECURITY CIO survival guide
Page 22: SONY SECURITY CIO survival guide
Page 23: SONY SECURITY CIO survival guide
Page 24: SONY SECURITY CIO survival guide

D_esi •

Introduce a new level of intelligence and clarity to your business - Go M a w ith Sony.

gned for ·security,Sony Megapixelcameras combine 1.3 MegaR:ixel resolution with

,;:ew

ExwavePRO CCD,Light Funnelwith colour filters and I ntelli gen t Motion Detection

Oeliver high picture quality in even the most difficult lighting conditions.