Surveillance and Analytics
Combine IP cameras with intelligent monitoring capabilities. The system uses video analytics to automatically detect security incidents, enhance surveillance coverage, and provide real-time alerts for improved site security management.
Please review all requirements. Your solution must meet all ๐ด mandatory requirements to qualify.
3.01๐ด
Does your solution enable on-site monitoring through IP-enabled Video Camera?
3.02๐ด
Does your solution provide video search function to speed up surveillance footage review?
3.03๐ด
Does your solution provide at least three of the following real-time video analytics functions on the edge? It is mandatory to include the core functions (i) and (ii) indicated below: i. [CORE] Intrusion Detection Module โ Allows defining of high security zones, and triggers automated alerts to the command centre operative when intruders are detected, which is useful for night guarding. ii. [CORE] Camera Tampering Module โ Ensures that cameras are working by alerting if views are blocked or out of focus to ensure 24/7 surveillance. iii. Loitering Detection Module โ Detects loitering activities by tracking the amount of time visitors spend within an area, e.g. security sensitive areas. iv. People Counting Module โ Count the number of people that walk in and out of premises such as retail mall, office or industrial site, so as to ascertain the number of people in buildings for fire or crowd management. v. Crowd Density Module โ Measure the crowd level and track overall activity level within an area. This enables the command centre operative to detect anomaly events across multiple screens. vi. Face Indexing Module โ Analyse video for human faces captured and stored according to time and duration. This enables automated data collation and helps in investigative work. vii. Occupancy / Trip Wire Counting Module โ Allows limiting the number of visitors in an area and alerts command centre operative if it has exceeded. viii. Human Traffic Flow Module โ Track people movement (activity) across different regions to gather footfall traffic patterns. ix. Audience Profiling Module โ Identifies age, gender and whether the target is smiling, to help the command centre operative understand the crowd profile. x. Queue Counting Module โ Analyse video to detect and count the number of people in a queue. xi. License Plate Recognition Module โ Analyse video for license plates captured and stored according to the date and time of entry. xii. Face Recognition Module โ Face Recognition involves identifying individual human faces in digital images. This enables automated data collation and helps in investigative work. Please specify included functions in the comment section.
3.04๐ด
Does your solution send out real-time alert triggered by pre-defined video events?
3.05๐ด
Does your solution support Secure Sockets Layer (SSL) or other Encrypted Communication Layers between the Video cameras and the Video camera Gateway?
3.06๐ด
Does your solution allow for cloud based, mobile based and/or web-based usage?
3.07
Does your solution automate immediate deployment of resources to manage an incident detected through the surveillance system?
3.08
Does your solution come with machine learning / analytics capability across multiple video camera feeds for risk / threat detection / prediction? If yes, please elaborate in the comment section on the threat detection / prediction that your solution can do.
3.09
Does your solution provide hardware sub-system(s) deployed on-site to enable a decentralized architecture and remote surveillance?
3.10๐ด
Has your company engaged a qualified 3rd party to conduct a security vulnerability assessment of your solution in the last 12 months? If Yes, please indicate the name of the 3rd party assessor and date of the assessment test in the comment field, and also submit the assessment test report as supporting document. If you are a reseller of the solution, please verify with your product principal that they have conducted a security vulnerability assessment of their solution by a qualified 3rd party in the last 12 months. Note: [1] Qualified 3rd party include assessors appointed under IMDA GoSecure Programme; Cybersecurity companies accredited under Accreditation@SGD Programme; and CREST-Certified companies or companies with equivalent certifications.
Last updated