SlideShare a Scribd company logo
Dario L. Santana
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
www.layer3securityservices.com
dario@layer3securityservices.com
INTERNET PROTOCOL VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 2Confidential
Key Topics
• Video Surveillance moving from
traditional (analog) CCTV to IP Video
Surveillance (IPVS)
• The benefits of IP Video Surveillance
• Layer3 Security Services
• Video analytics
6/30/2010 3Confidential
Trend to IPVS Started Earlier in Decade
• First saw trend from Analog CCTV to IPVS while
leading Tyco Fire and Security Latin America ’02-’06:
– ADT: Residential
– Sensormatic: Retail and Commercial
– SimplexGrinnell: Industrial
Convergence of Physical Security and Internet
6/30/2010 4Confidential
My Experience with Convergence
• Pay TV/Digital TV – General
Instrument/Motorola
• Video Streaming – Aerocast
• Buzztime – Digital Signage
Disruptions Lead to Opportunities
BENEFITS OF IP VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 6Confidential
The Benefits of IPVS
• More Detail – MegaPixel, fewer devices needed
• Intelligence – Video Analytics
• Plug and Play (IP) Systems – Promotes innovation
• Significant ecosystems – Protect your investment
• Best of breed – Reliable, Available
• Ease of support – Just another IT application
• Objections: bandwidth, network impact, costs
ROI, Ease of Support, Lower TCO
IQinVision
6/30/2010 7Confidential
Field of View with Forensic Detail
Courtesy of IQinVision
VGA = 16’
HD720p = 32’
HD1080p = 48’
3Mpix = 51’
5Mpix = 64’
640/40
1280/40
1920/40
2048/40
2560/40
Best AnalogRecognition of human
face or auto license
plate requires
40 pixels/foot!
PIXELS ON
TARGET
6/30/2010 8Confidential
Enterprise Class – IP VMS* System
*Video Management S/W features:
• Central Management
• Multi-site support
• High Availability – fail over
Courtesy: Milestone Systems
• Multicast and streaming
• COTS servers, storage
LAYER3 SECURITY SERVICES
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
• Site Survey and System Design
• Product Selection
• System Integration
• Installation and Training
• On-going Maintenance and Support
• Related solutions: Partnerships in IT, Infrastructure
and Physical Security
Knowhow, Tools and Processes
106/30/2010
Layer3 – IPVS Integration Services
• Industrial
• Business campuses
• Hospitals
• Distribution Centers
• K-12 Schools and Universities
• Government agencies
6/30/2010 11
Common Goals: Assets Protection and People Safety
Layer3 Solutions for the Enterprise
6/30/2010 12Confidential
Layer3’s KEY Partners
• Milestone Systems – Video Management Software
• Axis Communications – IP video cameras
• IQinVision – IP MegaPixel cameras
• Mobotix – 180/360 IP video cameras and more
• The Siemon Company – Infrastructure
• Cisco – Networking Products
Best of Breed Components
6/30/2010 13
Layer3 Knowhow
CA License
GI General Instrument
Experience, Training, Certification, Licensing
Engineering
Networking
6/30/2010 14
CA License
GI General Instrument
Engineering
Networking
Capabilities
1. Physical Security
2. IP Networking
3. Project Execution, Infrastructure
Three Disciplines, One Goal – YOUR SECURITY
Visit: www.layer3securityservices.com
Knowhow Makes Layer3 Unique
VIDEO ANALYTICS
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY
6/30/2010 16Confidential
Video Analytics (VA) Defined
• Video motion detection - VA or NOT VA?
• Most common VA applications
– Perimeter violation; trip wire
– License plate recognition
– People counting (biz app)
• Other applications include
– Direction of travel
– Dwell time
– Items left behind….
Generate Alerts for Recording and Response
6/30/2010 17Confidential
Big Debate: Where does VA Belong?
Courtesy: Milestone Systems
At the edge?
.. save on B/W
Centralized?
... capability
“Depends on
the application”
6/30/2010 18Confidential
Issues with Video Analytics
• False alerts – organizational impact
• System maintenance – calibration
• Cost of System - $300 to $500 per channel
• Unrealistic expectations have been set: “VA
eliminates human interaction”
There is a place for VA; makes traditional
solutions (Guards etc.) more effective
Dario L. Santana
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
www.layer3securityservices.com
dario@layer3securityservices.com
INTERNET PROTOCOL VIDEO SURVEILLANCE
Physical Security, IP Networks, Project Execution
Three Disciplines, One Goal – YOUR SECURITY

More Related Content

What's hot

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
IoT Tunisia
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
TI Safe
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
automatskicorporation
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installationOm Kumar
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
BettShow
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
OPEN DEI
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftMind the Byte
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
MONICA-Project
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
QuEST Forum
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
CableLabs
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
European Union Agency for Network and Information Security (ENISA)
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
Alcatel-Lucent Enterprise
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
Alcatel-Lucent Enterprise
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawRizkiawan Achadi
 
IOT presentation
IOT presentationIOT presentation
IOT presentation
Al Asmaull husna Asha
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
Daniel Miessler
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
Dale Butler
 

What's hot (20)

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installation
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...Digital Platforms and Reference Architectures in Healthcare, Social care and ...
Digital Platforms and Reference Architectures in Healthcare, Social care and ...
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
IOT presentation
IOT presentationIOT presentation
IOT presentation
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 

Viewers also liked

Tor
TorTor
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
Saprative Jana
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
Phil Cryer
 
Roger Dingeledine
Roger DingeledineRoger Dingeledine
Roger DingeledineEvangeline
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Thoughtworks
 
Quartelry Technology Briefing Defending the Free Internet
Quartelry Technology Briefing   Defending the Free InternetQuartelry Technology Briefing   Defending the Free Internet
Quartelry Technology Briefing Defending the Free Internet
Thoughtworks
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRL
Kirsten Fiedler
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
44CON
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillanceZied Jebali
 
Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
antitree
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Marc Manthey
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
axnv
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
F-Secure Corporation
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
Onkar Badiger
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
blogzilla
 
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass SurveillanceDefending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Thoughtworks
 
Utopia Internet
Utopia InternetUtopia Internet
Utopia Internet
Peter Parycek
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
Aleque Juneau
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
i_scienceEU
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
n|u - The Open Security Community
 

Viewers also liked (20)

Tor
TorTor
Tor
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Roger Dingeledine
Roger DingeledineRoger Dingeledine
Roger Dingeledine
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
Quartelry Technology Briefing Defending the Free Internet
Quartelry Technology Briefing   Defending the Free InternetQuartelry Technology Briefing   Defending the Free Internet
Quartelry Technology Briefing Defending the Free Internet
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRL
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass SurveillanceDefending the Free Internet - Our Responsibility to Defeat Mass Surveillance
Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance
 
Utopia Internet
Utopia InternetUtopia Internet
Utopia Internet
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 

Similar to INTERNET PROTOCOL VIDEO SURVEILLANCE

IPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security ServicesIPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security Services
Layer3 Security Services
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
cem lale
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
Brain IoT Project
 
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
Alessio Pennasilico
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015
ctgoff
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
Heidelberg India
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
Proofpoint
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Iptech View
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
Syed Mustafa
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
giladpn
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
Bessie Wang
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
Michele Vecchione
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
Shein Myint Aung
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alamMahbubul Alam
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Mahbubul Alam
 

Similar to INTERNET PROTOCOL VIDEO SURVEILLANCE (20)

IPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security ServicesIPVS Solutions from Layer3 Security Services
IPVS Solutions from Layer3 Security Services
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015Ploughshare overview slideshare 2015
Ploughshare overview slideshare 2015
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alam
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

INTERNET PROTOCOL VIDEO SURVEILLANCE

  • 1. Dario L. Santana Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 www.layer3securityservices.com dario@layer3securityservices.com INTERNET PROTOCOL VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 2. 6/30/2010 2Confidential Key Topics • Video Surveillance moving from traditional (analog) CCTV to IP Video Surveillance (IPVS) • The benefits of IP Video Surveillance • Layer3 Security Services • Video analytics
  • 3. 6/30/2010 3Confidential Trend to IPVS Started Earlier in Decade • First saw trend from Analog CCTV to IPVS while leading Tyco Fire and Security Latin America ’02-’06: – ADT: Residential – Sensormatic: Retail and Commercial – SimplexGrinnell: Industrial Convergence of Physical Security and Internet
  • 4. 6/30/2010 4Confidential My Experience with Convergence • Pay TV/Digital TV – General Instrument/Motorola • Video Streaming – Aerocast • Buzztime – Digital Signage Disruptions Lead to Opportunities
  • 5. BENEFITS OF IP VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 6. 6/30/2010 6Confidential The Benefits of IPVS • More Detail – MegaPixel, fewer devices needed • Intelligence – Video Analytics • Plug and Play (IP) Systems – Promotes innovation • Significant ecosystems – Protect your investment • Best of breed – Reliable, Available • Ease of support – Just another IT application • Objections: bandwidth, network impact, costs ROI, Ease of Support, Lower TCO IQinVision
  • 7. 6/30/2010 7Confidential Field of View with Forensic Detail Courtesy of IQinVision VGA = 16’ HD720p = 32’ HD1080p = 48’ 3Mpix = 51’ 5Mpix = 64’ 640/40 1280/40 1920/40 2048/40 2560/40 Best AnalogRecognition of human face or auto license plate requires 40 pixels/foot! PIXELS ON TARGET
  • 8. 6/30/2010 8Confidential Enterprise Class – IP VMS* System *Video Management S/W features: • Central Management • Multi-site support • High Availability – fail over Courtesy: Milestone Systems • Multicast and streaming • COTS servers, storage
  • 9. LAYER3 SECURITY SERVICES Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 10. • Site Survey and System Design • Product Selection • System Integration • Installation and Training • On-going Maintenance and Support • Related solutions: Partnerships in IT, Infrastructure and Physical Security Knowhow, Tools and Processes 106/30/2010 Layer3 – IPVS Integration Services
  • 11. • Industrial • Business campuses • Hospitals • Distribution Centers • K-12 Schools and Universities • Government agencies 6/30/2010 11 Common Goals: Assets Protection and People Safety Layer3 Solutions for the Enterprise
  • 12. 6/30/2010 12Confidential Layer3’s KEY Partners • Milestone Systems – Video Management Software • Axis Communications – IP video cameras • IQinVision – IP MegaPixel cameras • Mobotix – 180/360 IP video cameras and more • The Siemon Company – Infrastructure • Cisco – Networking Products Best of Breed Components
  • 13. 6/30/2010 13 Layer3 Knowhow CA License GI General Instrument Experience, Training, Certification, Licensing Engineering Networking
  • 14. 6/30/2010 14 CA License GI General Instrument Engineering Networking Capabilities 1. Physical Security 2. IP Networking 3. Project Execution, Infrastructure Three Disciplines, One Goal – YOUR SECURITY Visit: www.layer3securityservices.com Knowhow Makes Layer3 Unique
  • 15. VIDEO ANALYTICS Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY
  • 16. 6/30/2010 16Confidential Video Analytics (VA) Defined • Video motion detection - VA or NOT VA? • Most common VA applications – Perimeter violation; trip wire – License plate recognition – People counting (biz app) • Other applications include – Direction of travel – Dwell time – Items left behind…. Generate Alerts for Recording and Response
  • 17. 6/30/2010 17Confidential Big Debate: Where does VA Belong? Courtesy: Milestone Systems At the edge? .. save on B/W Centralized? ... capability “Depends on the application”
  • 18. 6/30/2010 18Confidential Issues with Video Analytics • False alerts – organizational impact • System maintenance – calibration • Cost of System - $300 to $500 per channel • Unrealistic expectations have been set: “VA eliminates human interaction” There is a place for VA; makes traditional solutions (Guards etc.) more effective
  • 19. Dario L. Santana Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 www.layer3securityservices.com dario@layer3securityservices.com INTERNET PROTOCOL VIDEO SURVEILLANCE Physical Security, IP Networks, Project Execution Three Disciplines, One Goal – YOUR SECURITY