Intelligent Integration

Thermal cameras offer different approaches to networks

Modern security networks are a complex collection of thermal cameras, CCTV cameras, fence sensors, video management devices and myriad other technologies. Most of these network elements are made by different suppliers who have given little, if any, thought to how all these components will communicate together to offer an integrated solution. Getting unrelated equipment to work together can be an integration nightmare.

Today’s thermal security cameras offer a different approach, with the creation of intelligent sensor networks. Unlike a typical network, where cameras, sensors and peripherals communicate with a central server, in an intelligent sensor network, each component handles its own communication with other network elements.

The backbone of this revolution is Nexus middleware. This technology is embedded in all of the latest thermal cameras from FLIR Systems. Nexus brings connectivity technology, not just cameras, to the entirety of a modern security network. Thermal cameras are no longer just physical devices but smart sources of information that interact with other sensors.

Nexus adds connectivity, compatibility and capabilities to thermal cameras and to any other sensor or appliance in a security system.

Connectivity
Nexus improves a device’s connectivity following an open architecture approach. Sensors that include Nexus do not use proprietary communications protocols. Rather, they include tools that are compatible with a vast array of pre-existing communications standards. These standards include plug-and-play protocols for discovery from Linux or Windows clients, Web standards for remote configuration and firmware uploads, video standards like MPEG-4 video streaming and interfaces to video management solutions.

Nexus technology makes any FLIR camera, or other third-party sensor or device, plug-and-play compatible between each other and with security management systems. In effect, it’s like building intelligence into each element in your network, be it a camera or any other device managed by a Nexus server. This distributed architecture-based network environment is more efficient, reliable and effective than having a wide disparity of sensors and systems that depend on one central server for communication between themselves and with network clients.

Compatibility
Intelligent sensor networks, like those based on Nexus middleware, make everything plug-and-play compatible. For instance, thermal security cameras can be made to interact with a variety of other sensors like CCTV cameras, nDVRs, video analytics, radars and fence sensors. They also can work seamlessly with third-party devices like video management solutions, recorders and displays.

Such a high level of compatibility also allows security managers to upgrade existing networks with the latest cameras and sensors. This seamless integration into legacy networks includes standard CCTV interfaces and communications protocols like Pelco.

Nexus also helps security managers easily handle issues with sensor obsolescence, as the cost and downtime required for changes and upgrades are eliminated.

A final benefit of the compatibility possible with this innovative intelligent sensor network approach is drastically simplified operation. Because the camera or sensor contains up-to-date drivers, cameras and sensors of differing generations and of unique manufacturers can have a common user interface. This reduces training costs and helps with adoption of a unified security system architecture within wide corporate environments, allowing clients to choose state-of-the-art sensor devices for each location and developing a common user interface on top of it.

Capability
Sensors and cameras integrated within a Nexus environment have value added beyond the capability of the camera or sensor itself. They become “smart” sensors that collaborate to create an intelligent sensors network.

Sensor and camera elements within a Nexus environment can be individually geo-referenced so each camera or sensor knows its location. Each camera or sensor is able to accurately geo-locate targets in latitude and longitude coordinates independently. These smart sensors do not need an extra centralized server to store this information or to perform the geo-location calculations.

An ISN environment operates with multiple user control sensors. Cameras and sensors have a token mechanism managed by each network element so they can be shared by multiple users in a coordinated way. Like those operating within a Nexus environment, ISN reduces the integration and development costs incurred when setting up new networks or expanding legacy networks. Because sensor integration is plugand- play, operating in a Nexus environment obviates the need for proprietary software development, maintenance and support.

Taking all of these pieces together, Nexus networks take complicated, expensive network elements and make them easier to use, more effective and less expensive in the long run.

Software that can be embedded to make cameras and other sensors smarter is the wave of the future. The complexity of modern security networks, let alone that of their individual components, makes the establishment or modification of even the most uncomplicated network a complex undertaking. The lack of an industry-wide standard for communication between network elements of different natures only serves to further complicate the issue.

Intelligent sensor networks, like those enabled by Nexus middleware, address all of these problems. Nexus makes every network element’s software—whether from thermal and CCTV cameras, radars, fence sensors or video management systems—plug-and-play compatible, regardless of manufacturer or generation, and easier to maintain, upgrade and operate

This article originally appeared in the issue of .

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”