Digital Security Industry Chain Development
Led Outdoor Bollard Light,Solar Led Bollard,Led Garden Bollards,Pillar Light Ningbo Royalux Lighting Co., Ltd. , https://www.royaluxlite.com
The application tends to be subdivided. From 2002 to 2006, the situation of the theft of urban rail facilities in Beijing was very serious. “The missing cable is enough to re-lay a Line 13â€. Later on the monitoring system, the situation has been well controlled.
Now, Beijing's subway operations have evolved from simple security precautions to intelligent monitoring and analysis, and then to metro service operations. From the perspective of the development of urban rail transit, monitoring is being integrated into networks, digitization, high-definition, intelligence, and business integration, and applications are becoming more and more detailed.
For the metro, the first thing that monitoring must meet is the need for safe operation and explosion-proof.
The subway has a large passenger flow, complicated personnel, individual passengers carrying suspicious items, and passengers jumping off the platform. In addition, the subway is an underground space with closed, opaque, and unfavorable ventilation. In the event of an accident, such as a fire or explosion, the impact will be very large. Therefore, it is necessary to intercept suspected explosives, including liquids, solid explosives, and toxic gases. Take full precautions. The development needs of subways and the operation and management of subway networks also require a networked monitoring system for subways.
In addition, security applications also include high-definition and intelligent requirements. For example, in the event of a passenger jumping off the platform, if the video is clear enough, it can be judged by video, whether the passenger jumped off the platform for their own reasons.
Li Jinling of the Industrial and Commercial Bank of China Operation Center also stated that in banking supervision in the financial industry, different places have very different applications. Even if the application requirements of the same place are complex, for example, the user area of ​​the business office requires monitoring of security and suspicious targets, but in the employee area, in addition to monitoring security, we must also see whether the business process of the employees is standardized and the employees serve the users. Situation and so on. Moreover, there are different requirements in special areas of banks, such as senior management areas, computer rooms, gateway centers, and vaults.
Integration of IT and security for new changes in the user market, Liao Xudong said: "IT changes monitoring, monitoring will be integrated into IT." With the integration of IT, the traditional security monitoring system will become a business carried on the network. In other words, in the future video services will not be confined to the security category, and will be monitored purely for monitoring purposes. Combining with other IT services will also be the future trend.
The change in application has also touched the fundamental shift in traditional departmental monitoring. Lu Xuejun, a researcher at the Institute of Geography of the Chinese Academy of Sciences, said that at home, the monitoring of these two words is often associated with crime or public order; while in the West, IT-based security monitoring is actually a command, and the real purpose is for the business. service.
With the advent of convergence, more changes will emerge. The first is the change of user groups. In the past, security monitoring was only a special product for government agencies and important business units. It may now also have security in a small store. Changes in user groups will also bring about changes in business models. Users will purchase, install, and maintain their own equipment. They will only need to pay monthly rental fees and turn security from engineering to leasing.
Industrial chain is forming IT-based security applications and is making fundamental changes in the entire industry chain.
In the past, many security products have not undergone any technological changes for more than 10 years, but the IT industry will never have such a situation. Business models and application changes bring about changes in collaboration between manufacturers. “Many manufacturers used to do a lot of security products before, but now the security industry chain is too long, it is not possible for a company to finish all, but also at the high speed of the Internet. Today's development, it is very difficult for a company to be able to do fine and strong in one aspect."
“From a technical point of view, security application systems have been clearly divided into front-ends, management platforms, communication exchanges, storage management, etc., and have also produced many industry-oriented application management platforms that are integrated with the business,†said Chen Long.
These more obvious divisions also provide opportunities for new and old companies entering security.
Wu Gang, general manager of Great Britain, Great Britain, said that for the entire security industry, the two phases of acquisition and storage applications are unprecedented opportunities. Take the example of storage monitored by the gaming industry in Macau, a casino has a storage capacity of 2000TB.
In terms of management platform and video analysis, Tong Jianjun, technical director of the behavior identification division of Hanwang Technology Co., Ltd., said that security has become a service network, and the industrialization and customization of video intelligent analysis management will bring new opportunities to manufacturers. Chen Long also said that although engineering, product manufacturers, integrators and other links are still in the game stage, it is not yet clear who will play a decisive role in the future, but the integration and application of IT and security are inevitable due to network and intelligence. of.