ISS releases SecurOS 9.0

February 2017 Editor's Choice, Surveillance, Integrated Solutions

Intelligent Security Systems (ISS) has announced the release of its new video management system (VMS), SecurOS 9.0. The system has been updated with a host of new features, including various add-ons for video analytics.

According to Eugene Kayat, MD of ISS Africa, SecurOS has been designed to support surveillance systems from small shops and businesses through to the largest enterprises and even city surveillance projects.

As a software company, ISS ensures that its VMS can easily integrate with almost any third-party solutions. The company has a team of developers constantly developing new integration software for products, and third parties are able to access the SecurOS software development kit (SDK) to develop their own integrations.

In addition to the core VMS, add-ons such as facial recognition, automatic number plate recognition, traffic monitoring, container recognition and more can be added to the system, depending on the customer’s needs. One of the benefits of purchasing SecurOS, according to Kayat, is that ISS only charges a once-off licence fee.

New features

Of the various new features in SecurOS 9.0, Kayat highlighted a few that are worth noting.

First, the new Computer Vision subsystem supports a variety of video analytics modules, including the ones designed to increase the situational awareness of SecurOS operators. This currently includes the Tracking Kit III plug-in, which offers:

• Crowd Detector – designed to detect potentially dangerous groups of people.

• Object Left Behind Detector – designed to detect abandoned objects.

• Intrusion Detector – designed to detect objects entering a forbidden area (crossing forbidden zone border).

• Loitering Detector – designed to detect people loitering and moving in the same area for some time.

• Running Detector – designed to detect people who move faster than is considered normal.

• Object Counter – designed to count objects (people, vehicles) crossing a line in each direction.

The new Emergency Service module reports incidents detected by SecurOS to external emergency service centres. When an incident occurs, the operator creates a report by completing the Emergency Ticket form. This includes the address, time and type of incident, and the operator can add comments if necessary. The ticket is then transferred as a package of metadata, which includes URLs to access the SecurOS video archive from an external monitoring centre.

The SecurOS media client also allows operators to save bookmarks to the video archive when an incident or even a suspicious activity occurs. Bookmarks can be added to a single frame or to an archive interval. Users can also search for bookmarks and alarms in the archive, filtering by time range, camera ID etc.

To improve the quality of live monitoring in situations where the network is poor or congested, the viewing frames per second (fps) can be set to a maximum. In addition, the native Dewarper has been updated and is now calibrated for most major fisheye/360-degree cameras. The following camera models have been added in this release: OnCam EVO-05-xxx, OnCam EVO-12-xxx, Hikvision DS-2CD6362F-xxx4, and Mobotix Q24M-Secure. Kayat says more cameras will be added in future updates – ISS sends out updates every four months.

The Event Viewer GUI has also been updated and now allows operators to switch between two operation modes: Monitoring mode (which shows live events) or Event Search mode (which allows users to search for events in a log). The Event Viewer is more interactive, with existing right-click controls to view event video in the media client, send a ticket to emergency services, and an upcoming feature to acknowledge alarms.

In addition, ISS is empowering Android smartphones or tablets to support the security operation, not only with the ability to view video, but as an additional sensor. For automatic number plate recognition, for example, the app allows users to take a picture of a number plate via their Android device, from where it can be compared to a database of suspicious vehicles. In future, this will be expanded to include facial recognition.

ISS has over 100 000 deployments of its technology in 53 countries. The products are implemented in banks, office, industrial and manufacturing sites, retail locations, petrochemical processing facilities, casinos, hospitals, schools etc. ISS Africa is responsible for sales and support to the African continent.

For more information contact ISS Africa, +27 (0)83 330 8767, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...