Call us for free site survey: 0800 689 1643
Quick Contact   |   Log a support request support.gif

Answers to your Requirements

Applications & IP Systems

The assets, staff and the public can be considered an important facet to any organization and as such require specialised integrated security systems to prevent acts of terrorism, sabotage and vandalism. Traditional stand alone electronic security systems comprising of Access Control, CCTV, Perimeter Protection, Fire Detection can now all be integrated into a single integrated system providing users with an intelligent system allowing pro-active security policies and procedures to be implemented eliminating legacy re-active policies and procedures.

HDPRO Security Systems, have successfully implemented there integrated systems for various clients in the UK from an entry level stand alone system to an enterprise multi site solution. Through our network of international suppliers we are able to offer complete and technically advanced solutions that meet the demanding requirements of securing and protecting various properties.

A HDPRO Security System specifically designed for each need will protect the premises, assets and staff alike from different threats of terror, theft and vandalism. It has the capabilities of integrating various subsystems together into one comprehensive security system, operated and monitored by main and local security centres. The following sub systems can form part of the solution:

  • Access control entries and exits
  • Automatic number plate recognition
  • Perimeter protection
  • General access control within the premises
  • CCTV cameras
  • Intelligent CCTV recording in a digital format
  • Video Analytics
  • Intrusion detection and threat analysis
  • Comprehensive communication systems
  • Integrated control and command centres
  • Integration with 3rd party applications

HDPRO Security Systems can provide the necessary level of security for any premises, create a highly safe and fully secure location, and operate as a user friendly, modern and sophisticated security system.

IP video surveillance systems offer many advantages over traditional analogue technology that many fail to consider, this brief write-up aims to demonstrate these advantages:

Efficient: IP systems can easily send alerts using live video or snapshots to your email account that can be accessed via laptop or even smart-phones for immediate review. Non security applications can also make use of this functionality such as for customer service, deliveries, work-flow monitoring and much more.

Business Intelligence – IP video systems can be equipped with integrated processors and software that can analyze events in real-time, alerting you about suspicious activity while overlooking unimportant activities more commonly known as Video Analytics.

Integrated Systems – IP video systems can easily integrate with your existing alarm systems, lighting and access control.

Secure Transmission – IP video systems encrypt the data to ensure complete privacy thus eliminating the need for expensive fiber-optic cable.

Reliablilty and Redundancy – IP video systems are diverse enough to offer video storage at multiple locations to provide security against disasters and theft. IP systems leverage technical evolution over the decades to deliver proven reliable solutions.

No Long Distance – IP video systems can be accessed, managed and recorded from across the room or across the world via the internet.

Reduced Installation Costs – IP video systems can transmit Audio, Video, Power, PTZ controls on a single network cable. Network cable is less expensive and typically already wired in the building resulting in significant cost-savings.

Higher Resolutions - IP video systems consist of mega-pixel cameras that boast of resolutions that are 3 to 4 times higher than standard analog cameras. IP cameras are digital end-to-end and use progressive scanning to make full use of camera images. Higher resolution means less cameras needed to cover the same area.

Futureproof – IP video systems are very similar to computer systems, where they can be easily upgraded as new capabilities and compatibility with new technolgies.

Simplicity – Computer savvy users can easily learn to use IP video systems with minimal learning time, as most of the software interface is similar to commonly used softwares.

As with any new technology there is a learning curve to taking the leap to IP. HDPRO Security Systems Ltd is here to assist your organization in taking this leap with minimal risk.

We are an education based systems integrator with services that range from custom design, installation, project planning, training & maintenance.

VIDEO ANALYTICS

Video analytics, also referred to as automated video content analysis, enable organizations to enhance security in both public and private spaces by detecting perimeter or area breaches, unattended objects, and atypical activity more rapidly and consistently. The software will detect camera tampering in real time and also promotes more proactive system maintenance by alerting staff to camera obstructions or changes in camera positioning that may otherwise go unnoticed. Live or archived video can be used to highlight customer service issues (e.g. unacceptable wait times), or the effectiveness of merchandizing based on customer traffic patterns. Incidents such as blocked aisles or fire exits can also be detected and addressed quickly to meet regulatory compliance.

Video Analytics

Initiates an alarm or action when…

Occupancy Detection

the number of people in a scene equals or exceeds a set figure

Area Obstruction Detection

an area within a scene is blocked for longer than a set time

Intelligent Scene Verification

a camera field of view is altered or obstructed beyond set thresholds

People Counting

people enter and/or exit a targeted area within a camera scene

Perimeter Protection

a person or object crosses a defined line or boundary within a field of view

Loitering Detection

a person remains in a camera scene for longer than a set time

Facial Detection

a clear facial image is detected within a camera field of view

Queue Length Monitoring

a line of people within a scene extends further than a set length

Camera Tampering Alarm

changes in a camera field of view exceed a set tolerance level

Camera Alignment Detection

the entire camera moves from its fixed field of view

Fall Detection

a person falls to the ground within a camera scene

Traffic Flow Monitoring

more than a defined number of people enter a scene within a set time

Panic Alarm

multiple people move rapidly through a camera scene

Left Object Detection

an object of defined size remains in a camera scene for longer than a set time

Speed Monitoring

a person or vehicle moves through camera scene faster than a set speed

Wrong Way Detection

a person or vehicle moves through a scene in an invalid direction

PTZ Auto Tracking

a moving person/vehicle is detected, enabling a VideoSphere PTZ cam­era to then track the person/vehicle and record video automatically

The above mentioned analytics could be deployed to combat perimeter breach, container tracking and location, movement in sensitive areas, unauthorised objects entering restricted areas, vehicle, people or object counting, trip wires, unauthorised movement by direction, etc.

Command and Control

VMS (Video Management Software) is a network-based software framework that provides a highly flexible and extensible event and system management environment for security, emergency management and other operational functions. It can take full advantage of the integration and event management capabilities of

This framework becomes the infrastructure for developing sophisticated policies, processes, protocols and operational procedures for meeting dynamic and evolving event or system management challenges.

It is this “learning process” characteristic of VMS that makes it a particularly powerful technology for extremely large and complex system implementations in which the ultimate operational objectives are unknown or, indeed, unknowable at the beginning of the project.

Starting with a simple, generic structure, VMS can be adapted in situ as the requirements, the technology and the environment become fully characterized and understood. This same adaptability permits the VMS to continue to evolve as new requirements and technologies are added to the environment.

VMS enables command decisions made at the highest levels to be implemented at all appropriate points of presence of the system. Appropriate information from each VMS client is automatically relayed to an VMS Information Framework for situational awareness and higher-level command and control functions. VMS operates on a philosophy of layered information.

VMS is implemented with two or more layers of information with each layer containing more detailed information. The top view provides an executive overview that shows the status of all of the organization’s facilities. The second and third layer provide more detailed status and event information regarding the facility (or facilities) experiencing the event.

Individual client systems, end points, are connected to a management framework through existing TCP/IP networks. End points can be connected by VPNs within local Ethernet LANs, within dedicated WANs, or across the Internet. Each client system provides both an integration point for local sensors and systems and, if desired, a human interface for local operations and control.

ACCESS CONTROL

It is assumed that gates and entry/exit points are one of the most crucial elements on any premises as thousands of vehicles, container trucks, trains and visitors seek admission to the premises on a daily basis. Each of these must be examined individually and access granted to authorized vehicles and pedestrians. The access control procedure needs quick and efficient and strict procedures followed at every point, at no time should access control cripple the day to day operations of the premises.

Personnel identification will be achieved by means of personal proximity cards which could also be utilised for photo identification. In sensitive areas a bio-metric reader can also be deployed. It is suggested that a local processing centre be present at all major entry/exit points which would process all visitors and grant access to areas where needed.

The restricting of access may be further enhanced through the introduction of turnstiles, interlocking access booths and vehicle barriers.

PERIMETER PROTECTION

An integrated perimeter protection system can be installed along all new and existing fences and walls and will guard against intrusion by creating alarms and warning operators of an impending breach. This can be achieved by either using advanced analytical thresholds, inherent in the proposed CCTV systems and/or by using integrated vibration detection technologies.

Once a threat is detected cameras in the same vicinity can be programmed to zoom in and identify the specifics of the threat and if required track the person or vehicle. If a vehicle the CCTV system can also automatically capture the number plate and compare it against a database of flagged or black listed vehicles.

PANIC ALARMS

A panic alarm is an electronic device designed to assist in alerting somebody in emergency situations where a threat to persons or property exists.

A panic alarm is frequently but not always controlled by a concealed panic alarm button. These buttons can be connected to a monitoring center or locally via a silent alarm or an audible bell/siren. The alarm can be used to request emergency assistance from local security, police or emergency services. Some systems can also activate closed-circuit television to record or assess the event.

Many panic alarm buttons lock on when pressed, and require a key to reset them.

  • A button in a critical system used to quickly activate an extreme measure to mitigate an emergency situation.

  • A red button integral to key fobs which activates a car alarm.

  • A device given to elderly individuals in order to maintain their independence outside of an Aged Care Facility, while still affording them a means of summoning help should they require it (ie a medical emergency that renders them immobile, like a fall, injury or illness). Such a device can also be referred to as an Emergency Medical Alert (EMA) button and can be fitted as either a pendant or bracelet to be worn by the user. MAB's are usually wirelessly connected to a call centre. When the alarm is raised, an operator will call the individual's home to ensure a false alarm has not occurred; if there is no answer, the operator will alert either family members, emergency services, or both.

  • A button similar to the above, which is used indoors in self-sufficient houses for elderly people, where it alerts someone inside the house, who will then first check for a false alarm by phoning the person, and if there is no false alarm, will enter the person's flat to check what is the problem.

  • A button used in convenience stores, gas station, or other establishments staffed with a single employee during late hours. It can also be used in Spa's or gymnasiums and is often located under the counter near the cash register or safe, the button can be pressed in times of distress (Such as robbery, disruptive or threatening behavior, or a situation which may warrant assistance), triggering a silent alarm. If the button alarms a private security company, a fee may be charged for each time the button is used. This prevents mis-use, and often aids in the employees judgment of the situation; whether or not it warrants the fee to have help to deal with the situation.

PUBLIC ADDRESS SYSTEMS

We will custom design a Public Address System for announcements and emergency voice evacuation as per the requirements and needs of the client.

In essence, the system primarily comprises of head-end equipment, distribution equipment and reception equipment.

The public address system comprises of equipment capable of ensuring even distribution of voice to various areas of the building with equal clarity. Public address components are provided with graduated priority.

Although commonly used for general announcements or "paging" staff, the system is sometimes integrated with the Fire Alarm Systems through necessary interfaces. Each floor constitutes a zone with selective floor-wise isolation facility.

Head-end equipment in a PA system is divided into two elements namely, source and amplification. Source equipment includes microphones for public address. Additionally, message/alarm tone generators are used for emergency calls and evacuation.

We select microphones of professional grade offering superior performance characterized by high sensitivity, minimum noise distortion and low sensitivity to feedback.

The distribution equipment primarily comprises of line attenuators equipped with line transformers and rotary/digital controls.

The reception equipment comprises primarily of speakers of varying types depending upon area allocation and usage. We carefully select the speakers for its designated use and the specific area of installation based upon our large experience of designing such systems and our close interaction with the end user/s.