A large proportion of a physical security solution continues to be the surveillance solution. The edge devices in the form of Analogue or IP CCTV cameras are image capturing devices that form the back-bone of surveillance systems.
HCL Security offers a widest range of analog CCTVs, IP CCTV, NVR, DVR, and other products to suit your requirement. Once the system is in place the stream of signal produced by cameras is processed using Video Analytics software that runs on high performance servers located at the Central Command & Control Center. This facilitates automatic real-time detection of threats, raising alarms and activating designated response mechanisms to neutralize threats.
- Can capture images in daylight and pitch dark conditions
- Can be controlled to monitor any designated location
- Can be networked to cover large areas and monitored centrally
- Can be integrated with Video Analytics module featuring heuristic intelligence capabilities to track and detect various threats
HCL Security provides the following essential components of the Video Surveillance system:
These camera systems are either analog, IP based or hybrid. They are available in different mechanical mounting configurations like Pan-Tilt-Zoom (PTZ), Fixed or Dome mounted. They are further graded by their spectral responses to cover visible spectrum and also Infra-red spectrum for night vision thermal imagery.
DVR (Analog) / NVR ( IP)
These devices are used to record the continuous data stream from CCTV cameras. While the DVR used to record from analog sources needs to be connected to each camera output, the NVR used for recording from IP sources can be directly plugged into the network and assigned an IP address.
Intelligent Video Analytics
This is a highly specialized software component that forms the heart of a modern video surveillance network. The incoming video data from cameras are processed in real time to detect any unusual objects, unusual movements or anomalies in camera images. This software is also capable of matching objects detected on camera with records in suspicious object database to identify weapons etc.
Monitoring & Command Station
This forms an effective human interface to a predominantly automated video surveillance environment. Within this category, we provide:
- Monitors – Video Walls, Large Screen Displays
- IT Components – Servers, Storage Devices, Switches
- Communication – Wireless, Copper Cable, Optical Fiber
Other forms of Security & Surveillance Systems
Surveillance done with a bird’s eye view is the most effective form since it offers a complete picture of the activity area & its surroundings. Aerial Surveillance is such a solution that will offer a complete view of the designated location precisely thereby helping the authorities to take decisions that are more effective & informed.
Our offering includes a wide variety of aerial surveillance solutions that can add value to security & surveillance measures
Typical deployments of Aerial Surveillance include:
- Unmanned Aerial Vehicles
- Camera mounted Balloons
Perimeter Intruder Detection & Protection Systems
This solution utilizes a specialized array of active or passive (PIR) infrared sensors & motion sensors to detect intrusion accurately. The electrical fencing systems can be clubbed with this to offer higher level of security by making it more difficult for the intruder from entering the premises. Installation of day-night cameras along the perimeter can add further value by enabling visual monitoring of activities around the perimeter.
Perimeter protection systems essentially are outdoor deployments. Hence they are subject to vagaries of weather. They need to be robust in construction and must be designed to avoid false and nuisance alarms on account of extraneous factors not related to actual threats. Several types of sensors are employed which can either be visible or lend itself to covert installations. The vulnerability of these sensors to damage due to manhandling or vandalism also need to be taken into account.
Perimeter security sensors are available with two distinctive operational attributes, Line-of-sight (LOS) or Volumetric. Volumetric sensors are usually terrain following in nature and are extremely difficult to defeat. Some typical examples are Megnetometric, Ported Cable and Bistatic Microwave sensors.
Perimeter surveillance technologies normally use:
- Buried Cables
- Seismic Transducers
- Active or Passive Infra-red
- Taut Wire
- Electric Fencing
- Bistatic Microwave
- Ported Coaxial Cable or Fiber Optic Cable
- Video Motion Detectors
Intrusion Alarm System
This is a specialized solution that can be brought into play where a certain area or an object is critical. Whenever someone tries to force his/her way to reach it, an alarm goes off, thereby indicating the detection of intrusion. Alarms can be in form of sound/sms/email etc., thereby inciting the response system if it is integrated to a state-of-the-art command & control center like HORIZON.
Under Vehicle Surveillance Solution (UVSS)
These are advanced solutions that scan vehicle’s bottom chassis for hidden explosives & modifications. They utilize superior imaging & processing algorithms that will help in detecting modified components in the bottom chassis of the car. It also incorporates an x-ray system that can scan the boot space of the vehicle for hidden weapons, explosives or narcotics. The solution can take tonsof weight and are designed to withstand harsh environments, rugged terrain, and extreme temperatures. Likewise, cameras and lighting are encased in sturdy, weatherproof housings.
Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR) or License Plate Recognition (LPR) Systems as it is often called is a surveillance solution that uses optical character recognition on images to read the license plates on vehicles. This is mostly used at borders to identify vehicles, and check it with the list of vehicles database to provide actionable intelligence in case of vehicle theft etc., if it’s integrated with appropriate databases.
Electronic Article Surveillance
This is a technological method for preventing theft of objects like laptops, PDAs and other valuable assets. Special tags are fixed to such articles and these tags are removed or deactivated while taking them out of premises once the item is authorized. Or else, at the exits, a detection system sounds an alarm or otherwise alerts the staff when it senses active tags.