SlideShare a Scribd company logo
1 of 19
Download to read offline
Dario L. Santana
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
www.layer3securityservices.com
dario@layer3securityservices.com
INTERNET PROTOCOL VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 2Confidential
Key Topics
• Video Surveillance moving from
traditional (analog) CCTV to IP Video
Surveillance (IPVS)
• The benefits of IP Video Surveillance
• Layer3 Security Services
• Video analytics
6/30/2010 3Confidential
Trend to IPVS Started Earlier in Decade
• First saw trend from Analog CCTV to IPVS while
leading Tyco Fire and Security Latin America ’02-’06:
– ADT: Residential
– Sensormatic: Retail and Commercial
– SimplexGrinnell: Industrial
Convergence of Physical Security and Internet
6/30/2010 4Confidential
My Experience with Convergence
• Pay TV/Digital TV – General
Instrument/Motorola
• Video Streaming – Aerocast
• Buzztime – Digital Signage
Disruptions Lead to Opportunities
BENEFITS OF IP VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 6Confidential
The Benefits of IPVS
• More Detail – MegaPixel, fewer devices needed
• Intelligence – Video Analytics
• Plug and Play (IP) Systems – Promotes innovation
• Significant ecosystems – Protect your investment
• Best of breed – Reliable, Available
• Ease of support – Just another IT application
• Objections: bandwidth, network impact, costs
ROI, Ease of Support, Lower TCO
IQinVision
6/30/2010 7Confidential
Field of View with Forensic Detail
Courtesy of IQinVision
VGA = 16’
HD720p = 32’
HD1080p = 48’
3Mpix = 51’
5Mpix = 64’
640/40
1280/40
1920/40
2048/40
2560/40
Best AnalogRecognition of human
face or auto license
plate requires
40 pixels/foot!
PIXELS ON
TARGET
6/30/2010 8Confidential
Enterprise Class – IP VMS* System
*Video Management S/W features:
• Central Management
• Multi-site support
• High Availability – fail over
Courtesy: Milestone Systems
• Multicast and streaming
• COTS servers, storage
LAYER3 SECURITY SERVICES
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
• Site Survey and System Design
• Product Selection
• System Integration
• Installation and Training
• On-going Maintenance and Support
• Related solutions: Partnerships in IT, Infrastructure
and Physical Security
Knowhow, Tools and Processes
106/30/2010
Layer3 – IPVS Integration Services
• Industrial
• Business campuses
• Hospitals
• Distribution Centers
• K-12 Schools and Universities
• Government agencies
6/30/2010 11
Common Goals: Assets Protection and People Safety
Layer3 Solutions for the Enterprise
6/30/2010 12Confidential
Layer3’s KEY Partners
• Milestone Systems – Video Management Software
• Axis Communications – IP video cameras
• IQinVision – IP MegaPixel cameras
• Mobotix – 180/360 IP video cameras and more
• The Siemon Company – Infrastructure
• Cisco – Networking Products
Best of Breed Components
6/30/2010 13
Layer3 Knowhow
CA License
GI General Instrument
Experience, Training, Certification, Licensing
Engineering
Networking
6/30/2010 14
CA License
GI General Instrument
Engineering
Networking
Capabilities
1. Physical Security
2. IP Networking
3. Project Execution, Infrastructure
Three Disciplines, One Goal – YOUR SECURITY
Visit: www.layer3securityservices.com
Knowhow Makes Layer3 Unique
VIDEO ANALYTICS
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 16Confidential
Video Analytics (VA) Defined
• Video motion detection - VA or NOT VA?
• Most common VA applications
– Perimeter violation; trip wire
– License plate recognition
– People counting (biz app)
• Other applications include
– Direction of travel
– Dwell time
– Items left behind….
Generate Alerts for Recording and Response
6/30/2010 17Confidential
Big Debate: Where does VA Belong?
Courtesy: Milestone Systems
At the edge?
.. save on B/W
Centralized?
... capability
“Depends on
the application”
6/30/2010 18Confidential
Issues with Video Analytics
• False alerts – organizational impact
• System maintenance – calibration
• Cost of System - $300 to $500 per channel
• Unrealistic expectations have been set: “VA
eliminates human interaction”
There is a place for VA; makes traditional
solutions (Guards etc.) more effective
Dario L. Santana
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
www.layer3securityservices.com
dario@layer3securityservices.com
INTERNET PROTOCOL VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY

More Related Content

What's hot

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot IoT Tunisia
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisTI Safe
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installationOm Kumar
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyBettShow
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...OPEN DEI
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftMind the Byte
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoTMONICA-Project
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkQuEST Forum
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAlcatel-Lucent Enterprise
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawRizkiawan Achadi
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 

What's hot (20)

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installation
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
IOT presentation
IOT presentationIOT presentation
IOT presentation
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 

Viewers also liked

Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Saprative Jana
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Roger Dingeledine
Roger DingeledineRoger Dingeledine
Roger DingeledineEvangeline
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Thoughtworks
 
Quartelry Technology Briefing Defending the Free Internet
Quartelry Technology Briefing   Defending the Free InternetQuartelry Technology Briefing   Defending the Free Internet
Quartelry Technology Briefing Defending the Free InternetThoughtworks
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLKirsten Fiedler
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 201244CON
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillanceZied Jebali
 
Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting publicantitree
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDMarc Manthey
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and futureblogzilla
 
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass SurveillanceDefending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass SurveillanceThoughtworks
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
 

Viewers also liked (20)

Tor
TorTor
Tor
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Roger Dingeledine
Roger DingeledineRoger Dingeledine
Roger Dingeledine
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
Quartelry Technology Briefing Defending the Free Internet
Quartelry Technology Briefing   Defending the Free InternetQuartelry Technology Briefing   Defending the Free Internet
Quartelry Technology Briefing Defending the Free Internet
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRL
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass SurveillanceDefending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
 
Utopia Internet
Utopia InternetUtopia Internet
Utopia Internet
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 

Similar to INTERNET PROTOCOL VIDEO SURVEILLANCE

IPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security ServicesIPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security ServicesLayer3 Security Services
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünlericem lale
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieAlessio Pennasilico
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015ctgoff
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021Heidelberg India
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionIptech View
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standardsgiladpn
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance InstallationShein Myint Aung
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMahbubul Alam
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alamMahbubul Alam
 

Similar to INTERNET PROTOCOL VIDEO SURVEILLANCE (20)

IPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security ServicesIPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security Services
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alam
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

INTERNET PROTOCOL VIDEO SURVEILLANCE

  • 1. Dario L. Santana Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 www.layer3securityservices.com dario@layer3securityservices.com INTERNET PROTOCOL VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 2. 6/30/2010 2Confidential Key Topics • Video Surveillance moving from traditional (analog) CCTV to IP Video Surveillance (IPVS) • The benefits of IP Video Surveillance • Layer3 Security Services • Video analytics
  • 3. 6/30/2010 3Confidential Trend to IPVS Started Earlier in Decade • First saw trend from Analog CCTV to IPVS while leading Tyco Fire and Security Latin America ’02-’06: – ADT: Residential – Sensormatic: Retail and Commercial – SimplexGrinnell: Industrial Convergence of Physical Security and Internet
  • 4. 6/30/2010 4Confidential My Experience with Convergence • Pay TV/Digital TV – General Instrument/Motorola • Video Streaming – Aerocast • Buzztime – Digital Signage Disruptions Lead to Opportunities
  • 5. BENEFITS OF IP VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 6. 6/30/2010 6Confidential The Benefits of IPVS • More Detail – MegaPixel, fewer devices needed • Intelligence – Video Analytics • Plug and Play (IP) Systems – Promotes innovation • Significant ecosystems – Protect your investment • Best of breed – Reliable, Available • Ease of support – Just another IT application • Objections: bandwidth, network impact, costs ROI, Ease of Support, Lower TCO IQinVision
  • 7. 6/30/2010 7Confidential Field of View with Forensic Detail Courtesy of IQinVision VGA = 16’ HD720p = 32’ HD1080p = 48’ 3Mpix = 51’ 5Mpix = 64’ 640/40 1280/40 1920/40 2048/40 2560/40 Best AnalogRecognition of human face or auto license plate requires 40 pixels/foot! PIXELS ON TARGET
  • 8. 6/30/2010 8Confidential Enterprise Class – IP VMS* System *Video Management S/W features: • Central Management • Multi-site support • High Availability – fail over Courtesy: Milestone Systems • Multicast and streaming • COTS servers, storage
  • 9. LAYER3 SECURITY SERVICES Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 10. • Site Survey and System Design • Product Selection • System Integration • Installation and Training • On-going Maintenance and Support • Related solutions: Partnerships in IT, Infrastructure and Physical Security Knowhow, Tools and Processes 106/30/2010 Layer3 – IPVS Integration Services
  • 11. • Industrial • Business campuses • Hospitals • Distribution Centers • K-12 Schools and Universities • Government agencies 6/30/2010 11 Common Goals: Assets Protection and People Safety Layer3 Solutions for the Enterprise
  • 12. 6/30/2010 12Confidential Layer3’s KEY Partners • Milestone Systems – Video Management Software • Axis Communications – IP video cameras • IQinVision – IP MegaPixel cameras • Mobotix – 180/360 IP video cameras and more • The Siemon Company – Infrastructure • Cisco – Networking Products Best of Breed Components
  • 13. 6/30/2010 13 Layer3 Knowhow CA License GI General Instrument Experience, Training, Certification, Licensing Engineering Networking
  • 14. 6/30/2010 14 CA License GI General Instrument Engineering Networking Capabilities 1. Physical Security 2. IP Networking 3. Project Execution, Infrastructure Three Disciplines, One Goal – YOUR SECURITY Visit: www.layer3securityservices.com Knowhow Makes Layer3 Unique
  • 15. VIDEO ANALYTICS Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 16. 6/30/2010 16Confidential Video Analytics (VA) Defined • Video motion detection - VA or NOT VA? • Most common VA applications – Perimeter violation; trip wire – License plate recognition – People counting (biz app) • Other applications include – Direction of travel – Dwell time – Items left behind…. Generate Alerts for Recording and Response
  • 17. 6/30/2010 17Confidential Big Debate: Where does VA Belong? Courtesy: Milestone Systems At the edge? .. save on B/W Centralized? ... capability “Depends on the application”
  • 18. 6/30/2010 18Confidential Issues with Video Analytics • False alerts – organizational impact • System maintenance – calibration • Cost of System - $300 to $500 per channel • Unrealistic expectations have been set: “VA eliminates human interaction” There is a place for VA; makes traditional solutions (Guards etc.) more effective
  • 19. Dario L. Santana Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 www.layer3securityservices.com dario@layer3securityservices.com INTERNET PROTOCOL VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY