Surveillance and Analytics

Combine IP cameras with intelligent monitoring capabilities. The system uses video analytics to automatically detect security incidents, enhance surveillance coverage, and provide real-time alerts for improved site security management.

Please review all requirements. Your solution must meet all ๐Ÿ”ด mandatory requirements to qualify.

S/No.
Requirements

3.01๐Ÿ”ด

Does your solution enable on-site monitoring through IP-enabled Video Camera?

3.02๐Ÿ”ด

Does your solution provide video search function to speed up surveillance footage review?

3.03๐Ÿ”ด

Does your solution provide at least three of the following real-time video analytics functions on the edge? It is mandatory to include the core functions (i) and (ii) indicated below: i. [CORE] Intrusion Detection Module โ€“ Allows defining of high security zones, and triggers automated alerts to the command centre operative when intruders are detected, which is useful for night guarding. ii. [CORE] Camera Tampering Module โ€“ Ensures that cameras are working by alerting if views are blocked or out of focus to ensure 24/7 surveillance. iii. Loitering Detection Module โ€“ Detects loitering activities by tracking the amount of time visitors spend within an area, e.g. security sensitive areas. iv. People Counting Module โ€“ Count the number of people that walk in and out of premises such as retail mall, office or industrial site, so as to ascertain the number of people in buildings for fire or crowd management. v. Crowd Density Module โ€“ Measure the crowd level and track overall activity level within an area. This enables the command centre operative to detect anomaly events across multiple screens. vi. Face Indexing Module โ€“ Analyse video for human faces captured and stored according to time and duration. This enables automated data collation and helps in investigative work. vii. Occupancy / Trip Wire Counting Module โ€“ Allows limiting the number of visitors in an area and alerts command centre operative if it has exceeded. viii. Human Traffic Flow Module โ€“ Track people movement (activity) across different regions to gather footfall traffic patterns. ix. Audience Profiling Module โ€“ Identifies age, gender and whether the target is smiling, to help the command centre operative understand the crowd profile. x. Queue Counting Module โ€“ Analyse video to detect and count the number of people in a queue. xi. License Plate Recognition Module โ€“ Analyse video for license plates captured and stored according to the date and time of entry. xii. Face Recognition Module โ€“ Face Recognition involves identifying individual human faces in digital images. This enables automated data collation and helps in investigative work. Please specify included functions in the comment section.

3.04๐Ÿ”ด

Does your solution send out real-time alert triggered by pre-defined video events?

3.05๐Ÿ”ด

Does your solution support Secure Sockets Layer (SSL) or other Encrypted Communication Layers between the Video cameras and the Video camera Gateway?

3.06๐Ÿ”ด

Does your solution allow for cloud based, mobile based and/or web-based usage?

3.07

Does your solution automate immediate deployment of resources to manage an incident detected through the surveillance system?

3.08

Does your solution come with machine learning / analytics capability across multiple video camera feeds for risk / threat detection / prediction? If yes, please elaborate in the comment section on the threat detection / prediction that your solution can do.

3.09

Does your solution provide hardware sub-system(s) deployed on-site to enable a decentralized architecture and remote surveillance?

3.10๐Ÿ”ด

Has your company engaged a qualified 3rd party to conduct a security vulnerability assessment of your solution in the last 12 months? If Yes, please indicate the name of the 3rd party assessor and date of the assessment test in the comment field, and also submit the assessment test report as supporting document. If you are a reseller of the solution, please verify with your product principal that they have conducted a security vulnerability assessment of their solution by a qualified 3rd party in the last 12 months. Note: [1] Qualified 3rd party include assessors appointed under IMDA GoSecure Programme; Cybersecurity companies accredited under Accreditation@SGD Programme; and CREST-Certified companies or companies with equivalent certifications.

Preparing for submission?

Your submission should contain screenshots and write-ups that clearly demonstrate compliance with each mandatory requirement sub-point. Contact us if you need help.

Last updated