Contact Us
Language

Matrox MuraControl video wall management software for C-Series | Security News

tagsHdmi Video Splitter

Climax launches hybrid safety system

Hikvision 4G solar kit can realize remote security

Dahua panoramic pan-tilt WizMind network camera

Climax Technology launched the GX-DT35B intelligent care medical alarm to ensure the safety of the elderly

Vanderbilt protects a hospital in Ireland with an integrated access control solution

ASSA ABLOY's code handle protects Fylab physiotherapy practice through a secure PIN operating handle

Dahua Technology uses AI to install high-definition CCTV cameras with intelligent analysis functions to ensure the iconic Battle of Britain bunker

The changing trend of operation center and control room in 2021

5 steps to build resilience in the 2021 physical security plan

Critical Incident Management: Digital Transformation of Safety and Security

Seize new opportunities with computer vision and video analytics

Cloud inevitability

How to use license plate reader technology to improve perimeter security

Solve access control challenges in healthcare

The role of access control in returning to the workplace safely

Matrox® Graphics recently announced that its popular Windows® and iPad®MuraControl™ video wall management software now supports two models of Matrox C-Series™ multi-display video cards, the C900 has 9 outputs and the C680 has 6 outputs. These graphics cards can also be used in conjunction with Matrox Mura™ IPX series 4K capture cards and IP encoder and decoder cards to display external signal sources on the C Series powered video wall.

The expanded Matrox video wall product portfolio enables OEMs and system integrators to easily, cost-effectively and efficiently install various small and medium-sized video walls. Support for the Matrox Network API has also been extended to the C series, allowing ISVs to expose new functions in their software. The complete Matrox video wall product series will be in

(June 8-10, Las Vegas) at Booth N2047.

MuraControl for Windows is a feature-rich single-license software that allows users to create, save and edit video wall layouts offline or in real time, so that their content can be displayed exactly where and how they want it. MuraControl for iPad is a free application that provides a touch panel control interface for remote video wall management. These applications provide AV integrators with all the basic controls needed to deploy video walls for digital signage, corporate and control room applications.

Matrox Network API is a command-level API that can be transmitted from any network computer (including PCs, smartphones and tablets) and can be used via Telnet, RS-232 and HTTP/HTTPS. It allows ISVs to easily control and manipulate Matrox-powered video walls through their own applications, and can access advanced features such as layout management, source management and compositing using alpha blending, color keying, and text and image overlays. For the Mura MPX platform, applications that have been coded with the Network API will automatically support the C series platform.

Said Fadhl Al-Bayaty, Matrox Graphics product manager.

Matrox C series multi-display video cards have excellent performance, stability and usability, and can power video management systems and small display walls in control rooms, digital signage, enterprise, industrial, security, A/V and embedded system applications. Matrox C900 is the world's first single-slot graphics card, which can drive nine 1920x1200 displays for 3x3 and 9x1 configurations. Matrox C680 supports up to six 4K/UHD displays.

The Matrox Mura IPX series of 4K capture and IP encoder and decoder cards enable OEMs and AV system manufacturers to provide advanced video wall controllers with high-quality, low-bit-rate, multi-channel 4K or HD based on standard IP Encoding and decoding functions. Mura IPX is designed to work with Mura MPX video wall capture and display cards and Matrox C-series multi-display graphics cards to package 4K capture and high-density encoding and decoding functions into a single PCIe® card to simplify integration and reduce installation costs.

Network Security-Nedap Security Management

2N access unit M-smart reader with mobile access function

What will you enable? | NVT Phybridge Interpreter Video | IP made simple

When 150,000 video surveillance cameras were hacked, this was big news. Even the main reason for hacking is to point out an important point. Even if the main consequence is bad publicity for video companies (and even the entire video surveillance industry). The target of the hacking was Silicon Valley startup Verkada, which has collected a large amount of security camera data from its 150,000 surveillance cameras in hospitals, companies, police stations, prisons and schools. In the past, Verkada was known for its aggressive sales methods and its intention to disrupt the traditional video market. The data breach was completed by an international hacker organization and was first reported by Bloomberg. According to reports, the reason for the hacking was "out of curiosity, fighting for freedom of information and intellectual property rights, a lot of anti-capitalism, anarchist hints, and doing so is too interesting." Bloomberg Tesla (Tesla) Among those affected, the "fun" included visiting a video showing the interior of a hospital in Florida, in which eight hospital staff captured a man and fixed him to the bed. In the Massachusetts Police Department, the officer was seen asking a man in handcuffs. A picture inside a Tesla warehouse in Shanghai, China shows workers on the assembly line. Inside the Massachusetts Police Department, the police were seen asking a man in handcuffs. Verkada even saw the scene on a Verkada security camera in Sandy Hook Elementary School in Connecticut. In 2012, a gunman killed more than 20 people. Verkada said in a "security update" statement: "Our internal security experts are actively investigating this matter. Out of prudent consideration, we have taken other security measures to restrict account access and further protect our customers." Bloomberg reported that due to built-in Function, hackers may be used by hackers. Hacking groups can gain "root" access on the camera, which means they can use the camera to execute their own code. Hackers told Bloomberg that obtaining this degree of camera access does not require any other hacking activities. With this access, they can transfer and gain access to the wider company network of Verkada customers, or hijack cameras and use them as A platform for launching future hacking activities. . Gaining this degree of camera access does not require any other hacking methods because it is a built-in function. Elisa Costante, vice president of research at the cybersecurity company Forescout, called the hackers of the Verkada security camera "shocking." She said: “Connected cameras should provide additional security for the organization that installs them. However, as Verkada’s security cameras show, the situation is quite the opposite. [The worry is that the attack did not happen” or even not very much. It is complex and does not involve exploiting known or unknown vulnerabilities. Bad actors simply use valid credentials to access data stored on cloud servers. "Super administrator account can access all cameras. Hackers accessed Verkada through a "super administrator" account to view the cameras of all their customers. They found the username and password of the administrator account that was publicly displayed on the Internet, according to Bloomberg. After Bloomberg contacted Verkada, hackers could not access video feeds and archives. Hackers could not access video feeds and archives after Bloomberg contacted Verkada. Costante said the results could be worse. It seems that they can only resort to footage taken by these cameras. But, just as Our own research team has discovered that if they choose to do so, they may cause more damage. By using unencrypted video streaming protocols and conducting man-in-the-middle attacks, we are able to intercept, record and replace real-time footage in smart cameras This effectively provides criminals with a virtual invisibility cloak that can be physically accessed in the actual environment and cause serious damage." The impact on the broader video surveillance industry is a widely-concerned cyber attack on broader video surveillance The impact of the industry is also worthy of attention. "As an industry and as a physical security manufacturer, we cannot take it lightly." said Christian Morin, Genetec's chief technology officer and vice president of integration and cloud services. "The potential wide-ranging impact of these hackers on physical security systems, including the provision of beachheads to facilitate lateral movement to the network, leading to the destruction of data and privacy or access to critical assets and infrastructure is self-evident. In the development, distribution and deployment of video surveillance systems, it is the responsibility and obligation of our technology users to prioritize data privacy and network security." Widespread use by governments and medical institutions Verkada cameras are widely used in governments and medical institutions. The company's most important industry to date. Verkada website promises to take privacy seriously. Verkada's hybrid cloud security camera series combines edge-based processing with cloud computing capabilities, which is a secondary vertical area for them. Cameras can analyze events in real time, while using computer vision technology to gain insights, thereby bringing speed and efficiency to events and investigations. Verakda's Web-based centralized platform Command provides users with access to the materials they need. Motion detection, personnel analysis and vehicle analysis enable the search of the entire organization to find relevant material. The Verkada website promises to take privacy seriously: "We are passionate about developing products that enhance the security and privacy of organizations and individuals. We believe that a well-built, user-friendly system can make it easier to respect personal privacy while ensuring personal safety. Manage and protect the physical environment."

As a result of the COVID-19 pandemic, fewer people gather for outdoor activities. However, the number of congestion incidents will surge sooner or later, and vehicle attacks may cause the danger of injury or death. Although the frequency of conflicts has decreased and the traffic volume is generally at a fairly low level, there is still the threat of vehicular violence. Preparing for such situations is still a top priority, and agencies are seeking to adopt a preemptive posture to prevent major incidents from happening. Vehicle safety barriers Even in the pandemic, the manufacturers of vehicle barriers have not had a significant impact on their sales. "Half of the fight against the aggressor's vehicle attack is planned in advance," said Greg Hamm, Delta Scientific's vice president of sales and marketing. He said that Delta Air Lines is fortunate to be able to establish long-term trusting relationships with many institutions established in the past 46 years. "We are very pleased to see that the demand for vehicle safety barriers has not changed much. Customers are preparing for the future, when the crowd will appear again, and the number of people may be larger than ever." Jackson's Fencing Nationwide Added Stuart Glen, sales manager. "Many councils are using downtime to install or upgrade security around towns and downtowns. This is promising." Physical structures such as bollards, barriers and roadblocks may prevent vehicles from entering high-foot traffic areas. Portable obstacles can be deployed in temporary locations. "We are very pleased to see that the demand for vehicle safety barriers has not changed much." The first thing that a fully automated system must consider is the level of safety required for a specific location. Parking lots in foreign embassies or federal court buildings require much stricter security measures than parking lots in shopping malls. Other major factors to consider include the frequency of vehicles entering and exiting and whether there is a vehicle inspection or a fully automated system at the entrance. Glenn said: "The key challenge in protecting people from vehicle attacks is to ensure public safety, but don't worry or be overly aware of any risks." "People should feel protected and be able to move freely. Such as bollards. Prudent measures are ideal because they do not restrict pedestrian traffic, but are very effective in the case of hostile vehicle attacks." The use of vehicles as a sabotage tool to trigger future attacks has become one of the top concerns of security experts because of crowds There are so many events and sports venues that are likely to be targets of attack, so protection needs to be strengthened. Glenn said that, unfortunately, places of worship are another target that deserves extra protection. The use of vehicles as sabotage tools has become one of the biggest concerns of safety experts. Regardless of ideology, this strategy has become more and more popular and is especially shocking when used in conjunction with the accessibility of cars. In many places, individuals only need a valid driver's license to rent a truck. News about specific attacks encourages or encourages others to use the same forms of violence forever. Unfortunately, as more reports follow these tragedies, this creates a feedback loop that may trigger future attacks. Simple security solutions There are direct security solutions to protect customers in the event of a vehicle crash. Delta Scientific offers more than 100 product designs, focusing on preventing and destroying obstacles to attack vehicles. Delta Air Lines’ obstacle avoidance levels range from PU50 to K54, and include advanced control systems that can provide customized and optimized functions. The control system adopts the latest and most advanced protection technology. The early warning system can enable the built-in active safety measures in Delta products and the alert function to on-site safety personnel. Governments, armed forces, federal agencies, private companies, and other industries widely use Delta Scientific's "High Security Protection and Barrier System". Jackson's range of fencing solutions includes fencing, bollards, barricades and gates. They have been tested in accordance with the PAS 68 standard and can prevent a 7.5-ton vehicle from driving at a speed of 50mph (80km/h). The product has a 25-year warranty. The eye-catching timber appearance they provide up to M50 collision rating, and includes automatic barriers and passive bollards. In addition, its unique Linebacker PNR system is a cable crash barrier, which is installed in wooden posts and railing fences to provide a completely discreet and efficient vehicle safety barrier with an attractive wood appearance. Delta Scientific's Hamm said that facilities that require daily employees and civilians to pass through need to install permanent solutions to prevent daily terrorist threats. Solutions include wedge-shaped guardrails, bollards, beams, and sliding doors with high duty cycle, excellent reliability, and appropriate crash levels. Local fairs and festivals, parades, conventions, sports and vaccination venues all use movable barriers, which can be dragged to the appropriate position and set up within 30 minutes. They offer the highest collision rating of M50 and include automatic obstacles and passive bollards. They can be plugged into a local 120v power supply and provide a portable solution that allows vehicles to pass through at the push of a button. Vehicles attacked the Jackson Fencing Team's Glenn said that both temporary and permanent barriers are very effective. Temporary barriers can be deployed quickly and eliminated when threats occur (for example, events like the London Marathon, where large crowds gather), while permanent measures are used in locations that are always high-risk targets. Glenn said that temporary barriers usually also have a more dominant appearance and wider coverage. Permanent measures are used for sites that are always high-risk targets. Before permanent measures are taken, a temporary barrier can be used immediately after the risk assessment considers a vehicle attack as a threat to the site. They can help determine the ideal location for permanent obstacles-usually a trial and error situation before you can find a solution that suits your specific needs. The United States Department of Homeland Security (DHS) has provided certification under the 2002 Anti-Terrorism Act by Enacting Effective Technology Support ("Security Act"). Access Control Products This certificate minimizes the insurance risk for organizations deploying authorized Delta vehicle access control products. Prevent terrorists and wrong drivers. Dating back to 1984, all certified products will receive traceability protection and are now authorized to print the SAFETY Act Designated logo. By minimizing the insurance risk of deploying an authorized Delta vehicle entry system, the certification enables customers to feel comfortable knowing that they have the full trust and support of the Department of Homeland Security. When designers choose uncertified barriers or roadblocks, common planning flaws occur. When designers choose uncertified barriers or roadblocks, common planning flaws occur. The certified equipment has been tested and proven to work under extreme conditions so that planners can use them with confidence. For the selection process of vehicle obstacles, no area is more critical than testing. Without proper testing, there is no guarantee that the barrier will resist the threat. Independent testing company Testing is usually carried out by independent testing companies or government agencies (for example, the State Department (DOS) and ASTM). A comprehensive report of the test results will be issued and can be obtained from the testing agency or manufacturer. A common misunderstanding among the public is that obstacles are "ugly", but this is usually caused by the appearance of temporary obstacles, which are installed for testing purposes, and then it is decided to take permanent measures. Temporary obstacles usually take up a lot of space because they have no foundation and can be very noticeable. In fact, there are many cautious and attractive permanent solutions, such as barricades and stainless steel columns, which can flexibly control access and safety, and can be quickly started.

Small and medium-sized enterprises (SMB) have made great contributions to the overall economy. Considered individually, they may not be as big as companies in the corporate market, but they have high requirements in terms of security. SMEs also present unique challenges to security manufacturers and integrators seeking to meet their needs. We asked at this week's expert panel roundtable: What are the security challenges of protecting small and medium-sized enterprises (SMB)?

Lenel Smart Dual Reader Controller (LNL-2220)

ASSA ABLOY Aperio®: Integrate security doors into access control systems at a low price

Hikvision 2MP infrared bullet network camera joins the range of Easy IP solutions

Vanderbilt SPC Connect mobile application for remote monitoring, management and maintenance of SPC panels

Omnicast 4.7, the latest version of Genetec IP video surveillance system

SoftwareHouse®C·CURE®9000 security and event management system developed in consideration of system integration

e2v launches dual-line ELiiXA + line scan camera

Surveon NVR failover solution enhances bank monitoring

Promise Technology's Apollo personal cloud device is available for purchase on the Apple Store and Apple.com

follow us

SourceSecurity.com-make the world safer

Copyright © Notting Hill Media Limited 2000-2021, all rights reserved

Our other sites:

Browsing from America? Looking for our US version?

View this content on SecurityInformed.com, our dedicated portal for American audiences.