Arecont Vision created the category of multi-sensor panoramic cameras back in 2006. Now the market is taking off, and many manufacturers now offer panoramic cameras. I recently spoke with Jeff Whitney, Arecont Vision’s Director of Marketing, on the current market for panoramic cameras, and also about some other hot topics – from cybersecurity to making the installer’s job easier.

SourceSecurity.com: Where do you see the category of multi-sensor panoramic cameras going from here, and how does Arecont Vision continue to differentiate itself as the market becomes more crowded?

Jeff Whitney: When Arecont Vision launched the industry’s first multi-sensor panoramic cameras, we knew we had something that would disrupt the industry. A single panoramic camera can cover 180 or 360 degrees for outstanding video coverage, indoors and out, enhancing situational awareness, and reducing the number of required cameras all at the same time. Legacy PTZ technology can’t compete with that, being expensive, including many moving parts that can fail and require maintenance, and unable to cover the entire scene uninterrupted.

It was a lonely effort to bring that message to customers 10 years ago, but many manufacturers have now copied the idea – and in some cases our designs – with varying levels of success. Competition is always good for any industry, including security. Other vendors are now picking up our message about the benefits of multi-sensor cameras, spreading the word across the industry with a louder voice than one company alone can deliver.

"Other vendors are now picking
up our message about the
benefits of multi-sensor cameras,
spreading the word across the
industry with a louder voice than
one company alone can deliver"

Arecont Vision remains the leader in this space and remains easy to differentiate from all the copies. We are in our 5th generation of the SurroundVideo 180- and 360-degree four-sensor panoramic camera series, with multiple generations of new technologies and features incorporated into each series. Our competitors remain early-generation products.

In 2014 we ramped up the SurroundVideo family even further, introducing the multi-sensor omnidirectional family of products. SurroundVideo Omni offers four independent sensors on a 360-degree track, which can be pointed individually in just about any desired direction. This makes an Omni ideal for intersections –  indoor hallways or outside covering streets –  or any open space indoors or out that needs to cover an area for enhanced situational awareness. In 2015 we introduced SurroundVideo Omni G2, which adds remote focus sensors.

SourceSecurity.com: End user customers want great images and dependable systems, but integrators want systems that are easier to install. How are Arecont Vision’s product designs evolving to make the integrator’s job easier?

JW: All of Arecont Vision’s camera families offer remote focus capability, and where appropriate, remote zoom as well. These features can reduce dramatically the integrator’s time at the job site. They can hang the camera quickly, point the sensor in the general area to be covered and then remotely focus the camera at their leisure over the network. The installer no longer has to balance a laptop or tablet computer while perched atop a ladder or lift in order to focus a camera.

Arecont Vision also bases our megapixel camera designs on our FPGA (field programmable gate array) technology. We load our firmware, with all the options and features included in the camera, onto the FPGA, instead of having to add additional circuit boards and components that take up space. The result is that our cameras are typically much more compact that those of our competitors, and easier for installers to handle. When we combine that with multiple generations of experience in reducing camera size, cameras like our SurroundVideo Omni G2 are much smaller than our closest copies made by competitors, and while all our cameras are quite rugged, they are often lighter than those of our competitors as well.

"Arecont Vision’s camera
families offer remote focus
capability, and where
appropriate, remote zoom
as well"

Our efforts to help the integrator have also focused on our designs. We are using more magnets in our dome camera designs, including our MegaDome® 4K series. The installer screws a base plate in place, then slips on the rest of the camera enclosure which is held in place magnetically while he screws it in. Similarly, the dome is held in place magnetically until screwed down. While this may sound simple, the light weight of the camera, the remote focus capability, and the use of magnets during installation all can dramatically simplify and speed up installation for the integrator. This allows less time to be spent at the job site, reducing labour costs.

SourceSecurity.com: Cybersecurity is suddenly a big issue in our market. What is Arecont Vision’s take on cybersecurity, and how are you making sure your cameras are safe from cyber-threats? What are you hearing from customers about their need for cybersecurity?

Arecont Vision megapixel cameras are uniquely protected from many types of cyberattack. We have incorporated features like 16-character ASCII passwords into all our recent designs and provide education of cybersecurity risks and best practices through our Arecont Vision University free of charge to our systems integrators. We also go much further.

The September 2016 Distributed Denial of Service (DDoS) attack on French hosting firm OHV and on Krebsecurity.com has been reported to have used over 140,000 network cameras and DVRs that were turned into robots (or bots). That was followed on Oct. 21, 2016, by a major DDoS attack that lasted for 11 hours and is estimated to have resulted in 100 million U.S. dollars of lost revenue.

Arecont Vision cameras were not used in any of these cyberattacks. The reason is the FPGA (field programmable gate array) chip at the heart of all our cameras. This is a custom-designed integrated circuit (IC) on which we run our proprietary firmware “bare metal.” We do not use common operating systems like Linux, which is commonly used in network cameras, DVRs, NVRs, computers, and many other electronic devices. This is an important point, because operating systems like Linux have security vulnerabilities that can be used to gain root access to the device and make a cyberattack possible.

Operating systems like Linux
have security vulnerabilities
that can be used to gain root
access to the device and make
a cyberattack possible

Should a hacker gain access to one of our cameras or somehow obtain the ID and password, they could access the camera just like any other device. They could access the setup menu, and make adjustments or shut the camera down. However, without a common operating system like Linux, the attempt would fail to turn the camera into a bot or launch cybersecurity attacks on other cameras or devices across the network and the Internet. Our cameras are best at combining ease of installation and use while securing them from becoming a participant in cybersecurity risks.

The industry overall needs to continue to grow its cybersecurity awareness. Cameras from many manufacturers need to be redesigned to eliminate the risk of being used in cyberattacks for the benefit of those well beyond the security and surveillance industry. Arecont Vision has embarked on a programme to increase cybersecurity for all of our own camera designs, and I have become a member of the Security Industry Association’s Cybersecurity Advisory Board specifically to help educate and move the industry forward in awareness and adoption of best standards.

SourceSecurity.com: How is Arecont Vision responding to the trend toward commoditisation of video cameras?

JW: Analogue and standard resolution IP cameras continue to play a role in the consumer and low-end professional surveillance market. There is risk of commoditisation in those areas as price rules over features and capability.

The mid- to high-end professional surveillance market remains quite different. There is still considerable growth potential across the board for megapixel cameras. The technology is continuing to be developed, improved, and upgraded, and thus commoditisation really only rears its head in the lower range of camera offerings around 2-3MP based on price. Customers in this space focus on price and “good enough” cameras that often would not match the quality of more expensive competitive versions.

The reality of lower-priced cameras only becomes clear when an integrator or customer takes the time to evaluate cameras side-by-side. Then it is usually quite evident that cameras that claim to offer the same resolution don’t always offer similar image clarity, correct colours, low light performance, or any of a host of other issues.

Arecont Vision continues to invest heavily in R&D to add new features and capabilities, while coming up with new designs. We believe our products’ performance, reliability, and features will continue to make a difference in the marketplace.

Download PDF version

Author profile

Larry Anderson Editor, SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Where is it inappropriate to install video cameras?
Where is it inappropriate to install video cameras?

Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”

Development of integrated thermal imaging technology into evolving market verticals
Development of integrated thermal imaging technology into evolving market verticals

Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so.  Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.

Highlighting the importance of security integrations and alliances
Highlighting the importance of security integrations and alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organisations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emerging components to make their products and services even stronger. Oftentimes, a key aspect necessary to build a comprehensively robust solution involves finding like-minded partners that share a common goal and are willing to work together to create an integration that increases insight and intelligence.The interoperability between systems, devices and different types of applications should be intuitive and fast Key factors for security integrations A basic factor in a partnership is openness. For an integration to perform seamlessly for the end user, the platform through which the technologies converge must follow standard protocols, easily operate with other platforms, allow freedom and customisation, and provide adaptability. The interoperability between systems, devices and different types of applications should be intuitive and fast, enabling more time to be spent on analysing critical data and responding to security events. The puzzle of a complete security solution contains many pieces, and it's often necessary to fuse together aspects from various providers to create a best-in-breed technology offering. When organisations collaborate, the end result is a simplified solution with an increased level of value. As threats become more severe and complex, customers demand solutions that combine different security and business elements into a single interface that can address a wide variety of risks. A unified security system requires a strong collaboration between technology providers and integrated solutions Interconnected security devices Users used to only look at specific security devices - such as cameras or door alarms - as each having a strong, autonomous purpose, but now, every device plays an important interconnected role. And the progression of the Internet of Things (IoT) has made this transition even easier, as maintaining a consistent and uniform communication and interconnectivity between devices has now become the norm. The IoT has also made it so that partnerships must not only exist between manufacturers, but also within the customer's organisational structure. Although exceptionally beneficial, the IoT brings with it an increased amount of cyber vulnerabilities. As security systems are networked to increase flexibility, the door is opened to a number of potential threats that could compromise the entire enterprise. This risk highlights the need for an internal partnership and knowledge sharing between a company's physical security professionals and its IT team. IT experts should be pulled into security decisions and positioned as collaborative partners to assist with software updates, data safety protocols and solving complex network challenges, ultimately leading to a more cyber secure solution.Partnerships are beneficial to both the companies involved and their customers Knowledge sharing and learning Aside from cybersecurity, the latest prominent security attacks and events have focused primarily on soft targets, such as schools, concerts or shopping malls. This has caused many technology providers to venture into different vertical markets, and strong partnerships streamline this crossover. Innovators can extend their geographic reach and purpose through integrations with other like-minded manufacturers or integrators to add new levels of functionalities. Of course, a partnership cannot operate properly and to the best of its ability without a core component: learning. In today's evolving business and risk environment, knowledge is critical. A shared knowledge base can open up new opportunities and lead to the strengthening of security across many levels. A truly powerful, unified security system requires a strong collaboration between technology providers and integrated solutions. Partnerships are beneficial to both the companies involved and their customers, and the results created through these alliances can reach far beyond a user's expectations, offering enhanced flexibility and extensive safety options.