Event-driven video surveillance platform

November 2016 Surveillance, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

A centrally managed video surveillance platform has been unveiled by Keystone Electronic Solutions, a South African electronics research and development company. Dubbed ‘Project V’, the system differentiates itself from others in that it is built around the central concept of event triggering, whereby it performs video streaming upon specific events/alarms, in addition to providing a video-on-demand interface.

At a launch event at the Pretoria Country Club on 13 October, John Eigelaar, Keystone director and co-founder, introduced the local security industry to the features and benefits of the solution. “We are extremely excited about Project V. As far as we are aware, there are no other products available today that can match this technology. We have had a dedicated team work on this project over the past few months and have had a few field trials with select customers. Project V can overcome a number of challenges for our customers – it makes security and surveillance much easier and more effective, and thus creates a huge cost saving,” he commented.

The solution comprises remote site equipment in the form of Keystone’s Remote Site Monitoring (RSM) unit, and a surveillance platform deployed in a central data centre. All user access to the central platform is provided through a web interface which is accessible via a standard web browser without the need to install or maintain any user applications.

The ‘stream on trigger’ video platform is not only able to provide digital video recording (DVR) archiving on the central Project V server, but also at remote sites. Integration with customer systems, such as network management systems, access management systems, trouble ticket management and reporting tools, can be provided through an open application programming interface (API).

Certain video triggers can be set up to either start or stop the video recording and streaming, while real-time streaming makes it possible for security teams to determine how to respond to a security incident. For example, in the event of intruder detection alarm, security teams will be alerted and will be able to see live video, allowing them to more effectively judge how to respond to the situation.

Project V integrates with any IP camera, and any I/O interface that a camera might provide (such as zone or movement triggers) can be integrated as part of the site security profile. The RSM unit is permanently connected to the cameras and will pull available audio visual (AV) streams from the cameras depending on the alarm/event triggered. Streams can be stored locally or pushed to the central server for remote recording or live viewing.

To make allowance for differing data bandwidth access across a full range of applications and site infrastructures, bandwidth can be selected on each onsite unit. Depending on this setting, the AV video will either be streamed to the Project V server or recorded locally on the unit. In both cases the alarm events will be transmitted across the CnE (command and event pipe) over the network. Operators can also request AV streams/recording from the web graphical user interface. The platform allows for the backhaul of the CnE pipe and the AV streams, either across an Ethernet WAN interface or the onboard 3G GSM modem.

Project V was designed to be highly scalable from an interface point of view, and the number of I/Os available to the system is easily scaled from a standalone device to a large installation by adding further RSM I/O modules.

For more information contact Keystone Electronic Solutions, +27 (0)12 460 4135, [email protected], www.kses.net.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
AI for retail risk management
Surveillance Retail (Industry) AI & Data Analytics
As businesses face mounting challenges in a volatile economic environment, Ares-i remains an essential tool for proactively identifying, assessing, and mitigating risks that threaten operational stability and customer satisfaction.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Six key security technology trends in 2025
Axis Communications SA Surveillance
Axis Communications examines some new trends for the security sector in 2025, as well as some new, old trends that are once again highlighted because of their benefit to the end user in the race to obtain optimal value from technology installations.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Integration is the key to smarter surveillance
Duxbury Networking Surveillance
According to recent market projections, the local security industry is expected to grow by more than 10% annually through 2029, reflecting the increasing demand for smarter, more proactive security solutions.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...