IQinVision Cameras Deployed To Combat Store Robberies In The Netherlands

IQinVision recently announced that upwards to 20 downtown Rotterdam shops, in the Netherlands, have deployed IQeye megapixel cameras to combat store robberies.

IQeyes cameras were chosen over other leading IP camera makers for image quality. UTS (Unisoft Total Services) is responsible for the overall technological application and installation.

For the Rotterdam-Rijnmond Police and the area’s shopkeepers, this is the latest weapon against thieves and other bad guys. The new IQinVision smart megapixel camera system follows a series of other measures taken in response to an increase in robberies in this commercial district. The security camera installation signals that police want to send a clear message: no robbery will be tolerated in the Rotterdam-Rijnmond region. The Rotterdam-Rijnmond Police won a prestigious Dutch innovation award for the deployment of the IQeye surveillance camera system.

The Tobacco Shop Vivant in City Rotterdam Mathenesserweg (West District) was the first store to install IQeyes. From there in late 2008, 17 more stores in Vreewijk and the Prince's Square districts installed the smart megapixel camera system. The surveillance solution will be evaluated over a period of several months to see if it delivers the desired results for both the retailers and the police. Should the results be favorable, the retail surveillance system could potentially be deployed to hundreds of shops in the area.

The IQinVision camera feeds are directly connected with Rotterdam Police Dispatch through Milestone Systems XProtect video management software.

When a shopkeeper experiences a robbery attempt or perceives trouble, he presses a button that activates the strategically placed megapixel cameras and a live feed is directly transmitted to the police control room. The robbers are filmed in high resolution providing razor sharp images. In addition to the live feed feature, the IQeye 702s are continuously recording to a 16 GB CF memory card in the camera itself using IQrecorder software, so the shopkeeper has a record of all incidents.

"Here is a highly innovative system deployed across multiple shops that all benefit from superior IQeye megapixel camera images transmitted at the touch of a button to the police,” said Ramon Grado, CPP, IQinVision managing director for EMEA. “This security camera solution is designed for cost-effective scalability and can be easily expanded to other shops. We anticipate the deterrent effect will be impressive."

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3