The systems at every step in the chain need to be secured. This is a major advantage, especially in today’s insecure digital scenario, says Matthew Brecher, General Manager, Cathexis
Question 1. What role do you foresee surveillance systems playing in the overall security scheme of the organizations, going forward in the future?
Answer: I think, internationally, there’s a growing need for general security systems, especially surveillance systems. In most large enterprises and even mid-level and small companies – in South Africa as well as in the Middle East – some form of security is required, usually built around CCTV surveillance. One of the interesting things about surveillance and security among enterprises these days is the growing inter-connectivity between technologies. This means surveillance systems play an increasingly important role in not only protecting infrastructure and resources, but also in gathering security information for things like retail information, time, and attendance systems, as well as access control. So that’s where I see surveillance growing.
Question 2. Are there any solutions that allow businesses to upgrade their existing surveillance setup?
Answer: Yes, of course. We started in the analog era 15 to 20 years ago and had to upgrade our own infrastructure to digital. In doing so, we have carved out a path for upgrading ourselves and other people from older systems to more modern ones. To do this we allow for the use of our own and third-party hardware encoders and components. The fact that we are an open system means we can run on any Windows, or Ubuntu Linux, system. This means that systems can easily be upgraded to CathexisVision.
Question 3. In an era of smart everything powered by IoT, how will surveillance systems become smarter?
Answer: One of the ways we approach it is with our rather powerful API, which allows other products to pull information from our software to use in their software. On the other hand, we integrate third-party products into our software, which involves taking their APIs, just in case, and building their information into our software. This includes access control to weighbridges, fire panels, alarm systems, automatic number plate tracking, analytics, facial recognition, all of that. And this allows us to be the central hub for Internet of Things. That really is multi-way communication: fire alarm panels talking to access control systems with us in the center or of things, using those external triggers to perform general video management such as recording video and sending alarms. Basically, our software can be triggered to perform any of its many advanced functions based on an external trigger from an integrated piece of hardware or software.
Problem 4. What features must businesses consider when selecting a surveillance system for their organization?
Answer : In building any surveillance system for the company, you need to first identify your needs. You constantly choose features or functions based upon what you think will work. In general, you can start with the basics and then move on from there to add things such as analytics or advanced features based on identified needs.
Question 5. Could you tell us about your innovations and what you’re showcasing at Intersec this year?
Answer : There are a number of innovations we are showcasing at Intersec this year. One of the most interesting ones is that we’ve started working with neural networks and machine learning in our analytics. To this end, we’ve added a system that can detect or classify an object, so it can distinguish between a dog or a person. And then, you’ll further be able to add events to the software using that. For instance, if you see a car or a person and then send an alarm, and if it turns out to be a dog, dismiss the alarm. On top of that we have completed the circle of encryption in our software. And we have what I like to call beginning-to-end encryption now. Yes. Starting at the camera, the connection from the camera to the server is encrypted, control of the camera is encrypted, server itself and communication between its components is encrypted, and client connection to the server is encrypted. So, at every step in the chain, the systems need to be secured. This is a major advantage, especially given today’s insecure digital scenario.