SlideShare ist ein Scribd-Unternehmen logo
1 von 12
www.axis.com
City Surveillance as
a Service.
Andrea Sorri
www.axis.com
Internet
Video Surveillance as a Service (VSaaS) for Safe City
> IP surveillance can be provided also as a cloud
service
> System management and storage can be handled
remotely from professional technicians and security
specialist, in geographically distributed datacenters
and without any investment in hardware
> City Surveillance as a Service will be one of the
cases
For sustainable and scalable system – Private and Public cooperation
www.axis.com
City Surveillance as a Service – Architecture
Internet
Centralized
> access management
> network security management
> storage
Distributed
> secure access to live and saved video
> results from advanced applications
> access from any device, mobility support
> regulated law enforcement direct access
Video installation
> any size
> any locations
> any connectivity
> intelligent video applications
www.axis.com
City Surveillance as a Service – Edge features
> Easy to install and deployable cameras
– in any locations, from one to many
– any connectivity, from fibre to LTE
> The unique One-Click feature makes it easy to add
cameras to the system
– Enables to connect private cameras to public security
platform
> Analytics at the edge running on the camera platform
– Tampering, EIS
– Activity, tracking, sound, LPR
www.axis.com
> The video streams from each camera reach the
centralized network infrastructure through an highly
secure encrypted communication channel
> Here are performed the core functionalities of the
solutions as
– Video recording
– Access and network security management
– Backup
– System management
– Analytics for forensic
City Surveillance as a Service – Centralized features
www.axis.com
> All the functionalities can be accessed from different
control rooms, any device, time and place and with a
native mobility support for smartphone and tablet
> The user of the solution have granted a secure access to
live and saved video, can receive the results from
advanced applications for further integration or for direct
usage
> Moreover is possible to assure regulated law
enforcement direct access to the videos when needed
City Surveillance as a Service – Distributed features
Benefits of VSaaS for
City Surveillance
www.axis.com
> Scalability and flexibility, covering any future needs is just a
matter of service options
> Protection from technological obsolescence, no hardware
investment in software license, disks and servers. More convenient
camera upgrade
> Centralized IT and networking management means no needs to
have an in-house staff of top professionals for a once-in-a-while
job
> Availability of advanced and up-to-date features and
applications that usual budget concern prevent to have
> Without huge upfront costs the town can have a flexible and
scalable surveillance network, always up-to-date, always
available
Benefits at town level
www.axis.com
> The integration among different video sources is by-design,
overcoming any interoperability, data retrieval and format
conversion problems
> No more missing videos due to delay in fetch them, obsolete
hardware recorders or inadequate maintenance
> Facilitated timeline reconstructions and any forensic activities
using advanced applications
> Video management always aligned with legal requirements and
procedures
> Any citizen that want to collaborate is able to provide quickly and
effortless the best information available
Benefits for police
www.axis.com
> Citizens can be part of the network, granted the permission to
access to they recordings when needed for investigative
purposes
> Citizens can collaborate also with videos from mobile phones
and other sources
The centralized infrastructure will provide the same
management quality and accessibility functionalities regardless
the source
> Secure and professionally managed video access means an
effective answer to citizens’ privacy concern, avoiding the legal
responsibility of a private owned and management infrastructure
Benefits for citizens
www.axis.com
> Trusted long term solution provider
– Municipal company?
– Utility?
– Ministry of interior?
> Power and connectivity
– Flexibility, robustness and connectivity might be a
constrain
> Private contribution
– Define a model to allow private to join the system to
allow access to police to pull video in case of need
Challenges
www.axis.com

Weitere ähnliche Inhalte

Was ist angesagt?

CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfshyedshahriar
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security ArchitectureCisco Canada
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security ProfessionalHatem ElSahhar
 
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease Kellton Tech Solutions Ltd
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSAcourses
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdfPencilData
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations CenterSiemplify
 

Was ist angesagt? (20)

CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdf
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Building your Cloud Strategy
Building your Cloud StrategyBuilding your Cloud Strategy
Building your Cloud Strategy
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional
 
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdf
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 

Andere mochten auch

Hombres iguales por naturaleza
Hombres iguales por naturalezaHombres iguales por naturaleza
Hombres iguales por naturalezalucas zvala
 
Marcel Kornacker, Software Enginner at Cloudera - "Data modeling for data sci...
Marcel Kornacker, Software Enginner at Cloudera - "Data modeling for data sci...Marcel Kornacker, Software Enginner at Cloudera - "Data modeling for data sci...
Marcel Kornacker, Software Enginner at Cloudera - "Data modeling for data sci...Dataconomy Media
 
Coursera neuromarketing 2015
Coursera neuromarketing 2015Coursera neuromarketing 2015
Coursera neuromarketing 2015Ines Solari
 
Hadoop bangalore-meetup-dec-2011-hadoop nextgen
Hadoop bangalore-meetup-dec-2011-hadoop nextgenHadoop bangalore-meetup-dec-2011-hadoop nextgen
Hadoop bangalore-meetup-dec-2011-hadoop nextgenInMobi
 
історичний розвиток органічного світу
історичний розвиток органічного світуісторичний розвиток органічного світу
історичний розвиток органічного світуltasenko
 
Understanding Analytics With Twitter
Understanding Analytics With TwitterUnderstanding Analytics With Twitter
Understanding Analytics With TwitterChidi Okereke
 
Compliance plus presentation slide share
Compliance plus presentation slide shareCompliance plus presentation slide share
Compliance plus presentation slide shareAndy Brooks
 
Sortem repite experiencia en Funergal
Sortem repite experiencia en FunergalSortem repite experiencia en Funergal
Sortem repite experiencia en FunergalSortem
 
"Source Code Abstracts Classification Using CNN", Vadim Markovtsev, Lead Soft...
"Source Code Abstracts Classification Using CNN", Vadim Markovtsev, Lead Soft..."Source Code Abstracts Classification Using CNN", Vadim Markovtsev, Lead Soft...
"Source Code Abstracts Classification Using CNN", Vadim Markovtsev, Lead Soft...Dataconomy Media
 
AI and Big Data For National Intelligence
AI and Big Data For National IntelligenceAI and Big Data For National Intelligence
AI and Big Data For National IntelligenceSonal Goyal
 
Предиктивная аналитика
Предиктивная аналитикаПредиктивная аналитика
Предиктивная аналитикаMOBILE DIMENSION LLC
 
[Elite Camp 2016] Stacey MacNaught - Nobody Pays the Bills in "Social Shares"...
[Elite Camp 2016] Stacey MacNaught - Nobody Pays the Bills in "Social Shares"...[Elite Camp 2016] Stacey MacNaught - Nobody Pays the Bills in "Social Shares"...
[Elite Camp 2016] Stacey MacNaught - Nobody Pays the Bills in "Social Shares"...CXL
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big DataRommel Garcia
 
Choppers and cycloconverters
Choppers and cycloconvertersChoppers and cycloconverters
Choppers and cycloconvertersSHIMI S L
 
InfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss PreventionInfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss PreventionSimon Perry
 

Andere mochten auch (17)

Hombres iguales por naturaleza
Hombres iguales por naturalezaHombres iguales por naturaleza
Hombres iguales por naturaleza
 
Marcel Kornacker, Software Enginner at Cloudera - "Data modeling for data sci...
Marcel Kornacker, Software Enginner at Cloudera - "Data modeling for data sci...Marcel Kornacker, Software Enginner at Cloudera - "Data modeling for data sci...
Marcel Kornacker, Software Enginner at Cloudera - "Data modeling for data sci...
 
Coursera neuromarketing 2015
Coursera neuromarketing 2015Coursera neuromarketing 2015
Coursera neuromarketing 2015
 
Hadoop bangalore-meetup-dec-2011-hadoop nextgen
Hadoop bangalore-meetup-dec-2011-hadoop nextgenHadoop bangalore-meetup-dec-2011-hadoop nextgen
Hadoop bangalore-meetup-dec-2011-hadoop nextgen
 
Asanid hajar
Asanid hajarAsanid hajar
Asanid hajar
 
історичний розвиток органічного світу
історичний розвиток органічного світуісторичний розвиток органічного світу
історичний розвиток органічного світу
 
Understanding Analytics With Twitter
Understanding Analytics With TwitterUnderstanding Analytics With Twitter
Understanding Analytics With Twitter
 
Compliance plus presentation slide share
Compliance plus presentation slide shareCompliance plus presentation slide share
Compliance plus presentation slide share
 
Sortem repite experiencia en Funergal
Sortem repite experiencia en FunergalSortem repite experiencia en Funergal
Sortem repite experiencia en Funergal
 
"Source Code Abstracts Classification Using CNN", Vadim Markovtsev, Lead Soft...
"Source Code Abstracts Classification Using CNN", Vadim Markovtsev, Lead Soft..."Source Code Abstracts Classification Using CNN", Vadim Markovtsev, Lead Soft...
"Source Code Abstracts Classification Using CNN", Vadim Markovtsev, Lead Soft...
 
AI and Big Data For National Intelligence
AI and Big Data For National IntelligenceAI and Big Data For National Intelligence
AI and Big Data For National Intelligence
 
Предиктивная аналитика
Предиктивная аналитикаПредиктивная аналитика
Предиктивная аналитика
 
Streaming Outlier Analysis for Fun and Scalability
Streaming Outlier Analysis for Fun and Scalability Streaming Outlier Analysis for Fun and Scalability
Streaming Outlier Analysis for Fun and Scalability
 
[Elite Camp 2016] Stacey MacNaught - Nobody Pays the Bills in "Social Shares"...
[Elite Camp 2016] Stacey MacNaught - Nobody Pays the Bills in "Social Shares"...[Elite Camp 2016] Stacey MacNaught - Nobody Pays the Bills in "Social Shares"...
[Elite Camp 2016] Stacey MacNaught - Nobody Pays the Bills in "Social Shares"...
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
 
Choppers and cycloconverters
Choppers and cycloconvertersChoppers and cycloconverters
Choppers and cycloconverters
 
InfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss PreventionInfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss Prevention
 

Ähnlich wie Ppt citysurv as_a_service_en_slideshare

Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
 
Secure internet a6
Secure internet a6Secure internet a6
Secure internet a6niallmmackey
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Turvallisuus2013
 
Cloud video surveillance
Cloud video surveillanceCloud video surveillance
Cloud video surveillancePete Fernando
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draftenergyvijay
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Extreme Secure Automated Smart Factory
Extreme Secure Automated Smart FactoryExtreme Secure Automated Smart Factory
Extreme Secure Automated Smart FactoryExtreme Networks
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2cSaurav Aich
 
Tapsoft network solutions
Tapsoft network solutionsTapsoft network solutions
Tapsoft network solutionsSagarDabhade1
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Serviceksholes
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingSaraPia5
 
Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Axis Communications
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
Sistem me terintegrasi for high rise building Hotel Apartemen Mall
Sistem me terintegrasi  for high rise building Hotel Apartemen MallSistem me terintegrasi  for high rise building Hotel Apartemen Mall
Sistem me terintegrasi for high rise building Hotel Apartemen MallA H M A D I (madi)
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochurewilnet40
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2thidisbogus
 
Axis Intelligent Video
Axis Intelligent VideoAxis Intelligent Video
Axis Intelligent Videocnssources
 

Ähnlich wie Ppt citysurv as_a_service_en_slideshare (20)

Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 
Secure internet a6
Secure internet a6Secure internet a6
Secure internet a6
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013
 
Cloud video surveillance
Cloud video surveillanceCloud video surveillance
Cloud video surveillance
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draft
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Surveilance ppt
Surveilance ppt Surveilance ppt
Surveilance ppt
 
Extreme Secure Automated Smart Factory
Extreme Secure Automated Smart FactoryExtreme Secure Automated Smart Factory
Extreme Secure Automated Smart Factory
 
Flyer axis agentvi_jvp_en_1505
Flyer axis agentvi_jvp_en_1505Flyer axis agentvi_jvp_en_1505
Flyer axis agentvi_jvp_en_1505
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Tapsoft network solutions
Tapsoft network solutionsTapsoft network solutions
Tapsoft network solutions
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
Sistem me terintegrasi for high rise building Hotel Apartemen Mall
Sistem me terintegrasi  for high rise building Hotel Apartemen MallSistem me terintegrasi  for high rise building Hotel Apartemen Mall
Sistem me terintegrasi for high rise building Hotel Apartemen Mall
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochure
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2
 
Axis and Intelligent Video
Axis and Intelligent VideoAxis and Intelligent Video
Axis and Intelligent Video
 
Axis Intelligent Video
Axis Intelligent VideoAxis Intelligent Video
Axis Intelligent Video
 

Mehr von Axis Communications

I principali benefici della soluzione per la protezione anti-intrusione
I principali benefici della soluzione per la protezione anti-intrusioneI principali benefici della soluzione per la protezione anti-intrusione
I principali benefici della soluzione per la protezione anti-intrusioneAxis Communications
 
Infografica: perchè scegliere l'audio di rete?
Infografica: perchè scegliere l'audio di rete?Infografica: perchè scegliere l'audio di rete?
Infografica: perchè scegliere l'audio di rete?Axis Communications
 
Come proteggere i piccoli esercizi dagli attacchi informatici
Come proteggere i piccoli esercizi dagli attacchi informatici Come proteggere i piccoli esercizi dagli attacchi informatici
Come proteggere i piccoli esercizi dagli attacchi informatici Axis Communications
 
I principali benefici della soluzione per la protezione anti-intrusione
I principali benefici della soluzione per la protezione anti-intrusioneI principali benefici della soluzione per la protezione anti-intrusione
I principali benefici della soluzione per la protezione anti-intrusioneAxis Communications
 
Cybersecurity axis webinar_smallbusiness_it
Cybersecurity axis webinar_smallbusiness_itCybersecurity axis webinar_smallbusiness_it
Cybersecurity axis webinar_smallbusiness_itAxis Communications
 
10 Tendencias tecnológicas que marcarán el 2018
10 Tendencias tecnológicas que marcarán el 201810 Tendencias tecnológicas que marcarán el 2018
10 Tendencias tecnológicas que marcarán el 2018Axis Communications
 
Infographie des 10 tendances technologiques 2018
Infographie des 10 tendances technologiques 2018Infographie des 10 tendances technologiques 2018
Infographie des 10 tendances technologiques 2018Axis Communications
 
I 10 trend tecnologici che definiranno il mercato della sicurezza nel 2018
I 10 trend tecnologici che definiranno il mercato della sicurezza nel 2018I 10 trend tecnologici che definiranno il mercato della sicurezza nel 2018
I 10 trend tecnologici che definiranno il mercato della sicurezza nel 2018Axis Communications
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018Axis Communications
 
Smart City 44 use cases for IP video
Smart City 44 use cases for IP videoSmart City 44 use cases for IP video
Smart City 44 use cases for IP videoAxis Communications
 
Flyer Axis Lte4G_Sierra_Wireless_1505
Flyer Axis Lte4G_Sierra_Wireless_1505Flyer Axis Lte4G_Sierra_Wireless_1505
Flyer Axis Lte4G_Sierra_Wireless_1505Axis Communications
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecityAxis Communications
 
Ppt axis smart_city_iot_slideshare
Ppt axis smart_city_iot_slidesharePpt axis smart_city_iot_slideshare
Ppt axis smart_city_iot_slideshareAxis Communications
 

Mehr von Axis Communications (20)

I principali benefici della soluzione per la protezione anti-intrusione
I principali benefici della soluzione per la protezione anti-intrusioneI principali benefici della soluzione per la protezione anti-intrusione
I principali benefici della soluzione per la protezione anti-intrusione
 
Infografica: perchè scegliere l'audio di rete?
Infografica: perchè scegliere l'audio di rete?Infografica: perchè scegliere l'audio di rete?
Infografica: perchè scegliere l'audio di rete?
 
Illuminazione ad infrarossi
Illuminazione ad infrarossi Illuminazione ad infrarossi
Illuminazione ad infrarossi
 
Come proteggere i piccoli esercizi dagli attacchi informatici
Come proteggere i piccoli esercizi dagli attacchi informatici Come proteggere i piccoli esercizi dagli attacchi informatici
Come proteggere i piccoli esercizi dagli attacchi informatici
 
I principali benefici della soluzione per la protezione anti-intrusione
I principali benefici della soluzione per la protezione anti-intrusioneI principali benefici della soluzione per la protezione anti-intrusione
I principali benefici della soluzione per la protezione anti-intrusione
 
Cybersecurity axis webinar_smallbusiness_it
Cybersecurity axis webinar_smallbusiness_itCybersecurity axis webinar_smallbusiness_it
Cybersecurity axis webinar_smallbusiness_it
 
Satisfaction survey_Italy
Satisfaction survey_ItalySatisfaction survey_Italy
Satisfaction survey_Italy
 
10 Tendencias tecnológicas que marcarán el 2018
10 Tendencias tecnológicas que marcarán el 201810 Tendencias tecnológicas que marcarán el 2018
10 Tendencias tecnológicas que marcarán el 2018
 
Infographie des 10 tendances technologiques 2018
Infographie des 10 tendances technologiques 2018Infographie des 10 tendances technologiques 2018
Infographie des 10 tendances technologiques 2018
 
I 10 trend tecnologici che definiranno il mercato della sicurezza nel 2018
I 10 trend tecnologici che definiranno il mercato della sicurezza nel 2018I 10 trend tecnologici che definiranno il mercato della sicurezza nel 2018
I 10 trend tecnologici che definiranno il mercato della sicurezza nel 2018
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018
 
Smart City 44 use cases for IP video
Smart City 44 use cases for IP videoSmart City 44 use cases for IP video
Smart City 44 use cases for IP video
 
How safe is your city?
How safe is your city?How safe is your city?
How safe is your city?
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
Axis deployable 4G/LTE solution
Axis deployable 4G/LTE solutionAxis deployable 4G/LTE solution
Axis deployable 4G/LTE solution
 
Case studies Safe Cities
Case studies Safe CitiesCase studies Safe Cities
Case studies Safe Cities
 
Flyer Axis Lte4G_Sierra_Wireless_1505
Flyer Axis Lte4G_Sierra_Wireless_1505Flyer Axis Lte4G_Sierra_Wireless_1505
Flyer Axis Lte4G_Sierra_Wireless_1505
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Ppt axis smart_city_iot_slideshare
Ppt axis smart_city_iot_slidesharePpt axis smart_city_iot_slideshare
Ppt axis smart_city_iot_slideshare
 
Axis Encoder Infographic
Axis Encoder InfographicAxis Encoder Infographic
Axis Encoder Infographic
 

Kürzlich hochgeladen

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Kürzlich hochgeladen (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Ppt citysurv as_a_service_en_slideshare

  • 1. www.axis.com City Surveillance as a Service. Andrea Sorri
  • 2. www.axis.com Internet Video Surveillance as a Service (VSaaS) for Safe City > IP surveillance can be provided also as a cloud service > System management and storage can be handled remotely from professional technicians and security specialist, in geographically distributed datacenters and without any investment in hardware > City Surveillance as a Service will be one of the cases For sustainable and scalable system – Private and Public cooperation
  • 3. www.axis.com City Surveillance as a Service – Architecture Internet Centralized > access management > network security management > storage Distributed > secure access to live and saved video > results from advanced applications > access from any device, mobility support > regulated law enforcement direct access Video installation > any size > any locations > any connectivity > intelligent video applications
  • 4. www.axis.com City Surveillance as a Service – Edge features > Easy to install and deployable cameras – in any locations, from one to many – any connectivity, from fibre to LTE > The unique One-Click feature makes it easy to add cameras to the system – Enables to connect private cameras to public security platform > Analytics at the edge running on the camera platform – Tampering, EIS – Activity, tracking, sound, LPR
  • 5. www.axis.com > The video streams from each camera reach the centralized network infrastructure through an highly secure encrypted communication channel > Here are performed the core functionalities of the solutions as – Video recording – Access and network security management – Backup – System management – Analytics for forensic City Surveillance as a Service – Centralized features
  • 6. www.axis.com > All the functionalities can be accessed from different control rooms, any device, time and place and with a native mobility support for smartphone and tablet > The user of the solution have granted a secure access to live and saved video, can receive the results from advanced applications for further integration or for direct usage > Moreover is possible to assure regulated law enforcement direct access to the videos when needed City Surveillance as a Service – Distributed features
  • 7. Benefits of VSaaS for City Surveillance
  • 8. www.axis.com > Scalability and flexibility, covering any future needs is just a matter of service options > Protection from technological obsolescence, no hardware investment in software license, disks and servers. More convenient camera upgrade > Centralized IT and networking management means no needs to have an in-house staff of top professionals for a once-in-a-while job > Availability of advanced and up-to-date features and applications that usual budget concern prevent to have > Without huge upfront costs the town can have a flexible and scalable surveillance network, always up-to-date, always available Benefits at town level
  • 9. www.axis.com > The integration among different video sources is by-design, overcoming any interoperability, data retrieval and format conversion problems > No more missing videos due to delay in fetch them, obsolete hardware recorders or inadequate maintenance > Facilitated timeline reconstructions and any forensic activities using advanced applications > Video management always aligned with legal requirements and procedures > Any citizen that want to collaborate is able to provide quickly and effortless the best information available Benefits for police
  • 10. www.axis.com > Citizens can be part of the network, granted the permission to access to they recordings when needed for investigative purposes > Citizens can collaborate also with videos from mobile phones and other sources The centralized infrastructure will provide the same management quality and accessibility functionalities regardless the source > Secure and professionally managed video access means an effective answer to citizens’ privacy concern, avoiding the legal responsibility of a private owned and management infrastructure Benefits for citizens
  • 11. www.axis.com > Trusted long term solution provider – Municipal company? – Utility? – Ministry of interior? > Power and connectivity – Flexibility, robustness and connectivity might be a constrain > Private contribution – Define a model to allow private to join the system to allow access to police to pull video in case of need Challenges