Calgary, Canada Uses IP Video Technology In Centralized Surveillance System

IndigoVision’s IP video technology is at the heart of a ground breaking ‘Data Warehousing’ and surveillance system for the City of Calgary, Canada.

Data streams from different city operations are integrated into a centralized Oracle database. This powerful tool allows the city authority to analyze an amazing array of data. For example, for any area of the city a map can be pulled up showing crime statistics, including the number of crimes, what kind of incident it was and any associated video clips that have been imported from the IP Video system.
 
When Owen Key, the city’s chief security officer and manager of corporate security joined five years ago he was faced with an unmanageable surveillance system.

As he explains, networking was the solution.

“The city had many ‘islands’ of video from disparate inaccessible analog systems,” Key said. “As most of the metropolitan area is managed centrally, we soon realized that a networked environment was the only answer. IndigoVision’s excellent IP Video compression technology has allowed us to realize this vision and is one of the key factors in achieving the system we have today.”
 
Calgary is the largest city in the Province of Alberta and the fourth largest Census Metropolitan Area (CMA) in Canada. Unlike most cities, the municipality manages all aspects of the city with over 700 sites spread across 2,000 square miles.
 
Since 2007, nearly 550 PTZ and fixed cameras have been connected to the network, many retained from the original analog systems. IndigoVision’s system now monitors 30 different departments around the city, including parks and recreation, transit centers, water utilities, fire, emergency response, road crews and parking authority. The city has also developed three mobile security vehicles, which are equipped with laptops that can access live or recorded surveillance video from any camera over the 3G mobile network.
 
“Another reason for choosing IndigoVision is ‘Control Center’, their Video Management Software,” Key said. “The usability is excellent, with great drag and drop features for cameras, interactive maps and individual profiles for each user to restrict access to certain cameras or features, as required. However, it’s the flexible licensing of the software that has been the most benefit. ‘Control Center’ is licensed on an unrestricted basis within the cost of IndigoVision’s hardware; this means we can deploy video workstations where we need them for no extra cost. In addition to the main Command Center we have workstations located in many different departments with currently 154 different users.”
 
It’s the non-centralized architecture of the IndigoVision system that allows ‘Control Center’ workstations to be distributed around the network. IndigoVision’s NVRs are also distributed around the edge of the network close to the cameras, to reduce the bandwidth. Dual streaming is used on many cameras allowing 15fps video to be streamed across the WAN and full framerate 30fps video to be locally recorded. A 14 day archive of all video is maintained.
 
The system is continually growing and evolving. The next major phase is to incorporate the Lenel access control into the whole data control progression, including full integration with the surveillance system across the IP network.

This is achieved by using one of IndigoVision’s many integration modules. Events and alarms from access control points can trigger actions and create logs in the IP Video system, producing a complete audit trail. For example, an illegal entry alarm can instantly move a camera to a pre-configured position and display the video of the entry area to an operator. This tight integration helps to improve incident response.
 

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3