IP Security and Access Control
Boot up your PC , send an email, bid on eBay, obtain cash from an ATM, make a long distance phone call, pay a restaurant bill and 'IP' makes it all happen.
This is in contrast to the established security industry which, since the early days, has relied on proprietary methods of communication between devices. If we take CCTV for example, the technology used in 90% of current installations in the UK to transmit and view images is analogue basically 500 line television.
A truly 'digital' system, being able to take advantage of 'IP' connectivity, comprises the following:-
"An 'IP' based camera with integral web server, a powerful CPU and software able to scan the camera's Megapixel image sensor progressively. The image is fully digitised at this point and doesn't have to be converted from analogue to digital. The image, or image stream, is then recorded onto a hard disk device on the network and retains its original clarity and definition".
Often organisations that say they have "switched to digital" mean they have replaced an old video cassette recorder with a DVR. This allows the management and retrieval of stored images to be conducted in a matter of seconds rather than an operator having to trawl through a batch of tapes — but is it really a digital solution?
Any organisation thinking of just replacing tapes with DVRs should think again. The technology used in the majority of CCTV installations is derived from TV using a method of interlacing the scanned lines from the camera's image sensor at an interleave ratio of 2:1. This can often result in the stored image being blurred when retrieved from a tape or a DVR. So even though the system can be classed as being digital, via the DVR, in reality the image quality from the cameras hasn't improved and it is still a 'closed' system.
Only by considering all elements of the solution can a system deliver true digital images and that's where J Brand comes in. With a history of IP integration, J Brand is ideally placed to manage the introduction of a complete digital security solution and provide a vendor independent offering to meet all budgets and scopes.