Skip to content

訊連科技推出FaceMe® Security 7.0 智慧安控軟體重大升級 大幅強化安控視訊管理及錄影能力,更可【以圖搜人】

【2021年12月10日,台北訊】— AI人工智慧領導廠商訊連科技(5203.TW)推出智慧安控軟體 FaceMe® Security之7.0版重大升級,提供全新設計之VMR Add-On附加套件,可讓保全人員透過樓層配置圖及圖庫檢視等多種方式,於單一檢視畫面快速預覽高達九路IP攝影機之視訊畫面。全新的「以圖搜人」功能則可讓用戶透過單張臉部相片,搜尋場域中同一位人士之所有紀錄。FaceMe® Security更全面支援H.265視訊格式,可大幅節省錄影空間,並支援DIDO數位訊號控制模組,串接電子門鎖、燈光等設備,可於偵測人員進入時自動開啟。

訊連科技推出FaceMe® Security 7.0 智慧安控軟體重大升級 大幅強化安控視訊管理及錄影能力,更可【以圖搜人】

FaceMe® Security為一款專為智慧工廠、辦公室、建築等場景設計的智慧安控軟體,提供身份辨識、門禁管理、健康偵測(口罩偵測及體溫量測)、即時監看、通知示警等多種智慧功能。FaceMe® Security可相容於現行IP安控架構,僅需增加部分邊緣運算裝置進行臉部偵測及特徵擷取,即可在現行安控架構下,快速導入人臉辨識相關應用。

FaceMe® Security的全新功能包括:

VMR Add-On – 即時視訊監看、錄影及回放

VMR Add-On – 即時視訊監看、錄影及回放

VMR Add-On (原Monitor Add-On)為FaceMe® Security中的視訊管理軟體,可安裝於保全式之一般個人電腦,讓保全人員即時預覽多個來自IP攝影機的影像串流,接收黑名單、VIP等特定人物之即時示警訊息,並可回放特殊事件、人物之視訊錄影片段。

全新版的VMR Add-On大幅強化了介面,提供樓層配置圖及圖庫檢視兩種模式,可讓保全人員更直覺地進行多路IP攝影機之視訊監看。全新的樓層配置圖模式,可讓保全將視訊畫面拖曳於樓層圖上,並可依需求調整視訊預覽視窗之位置及尺寸,圖庫檢視模式則可同時預覽最高九路之視訊。保全人員可於VMR Add-On中,設置多組樓層配置圖或圖庫檢視頁面,並快速切換,大幅提升即時監看的易用性。

FaceMe ® Security Central 管理介面 – 以圖搜人及客製化角色、群組

FaceMe ® Security Central 管理介面 – 以圖搜人及客製化角色、群組

FaceMe® Security Central為安裝於場域自建伺服器上的套件,可透過網頁瀏覽器進入管理介面,觀看訪客紀錄、事件列表,進行臉部資料庫管理、IP攝影機和工作站的系統設置等。於全新的7.0版中,FaceMe® Security Central新增了以圖搜人功能,可透過匯入單張臉部相片,來找尋特定人士(例如竊賊)於各路攝影機錄影存檔中出現的紀錄。此外,此新版本也提供更多的群組及角色功能,例如將公司各部門設置為不同群組,及設定主管、員工、外聘人員等不同角色,進而管理各類群組、角色進出特定場域之門禁管理。

全面支援H.265視訊格式

H.265是新一代的影像壓縮格式,相較於H.264格式,H.265於相同畫質下,檔案尺寸僅H.264之50% 至 75%。對IP安控來說,意味著可以大幅減少 NVR影像儲存設備的儲存空間,也因此支援H.265之IP攝影機。近年市面上主流的IP攝影機已大量普及,透過Intel CPU的Quick Sync 或Nvidia GPU,FaceMe® Security 7.0版可全面支援H.265視訊格式,包含RTSP串流、即時臉部偵測、特徵擷取、視訊錄製及回播等。

支援DIDO 數位訊號控制模組 – 可串接電子門鎖、燈光等設備

FaceMe® Security現可支援研華電腦(Advantech)之特定型號DIDO數位訊號控制模組,透過程式化設置,可於特定人員(如:員工)出現鏡頭前控制電子門鎖開啟、或進行特定區域(如:倉庫、機房)之人員門禁管理,此外,也可串接燈光系統,於人員進出時自動開關場域之燈光系統。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

What’s New Pandora FMS 759

What’s new in the latest Pandora FMS release, Pandora FMS 759

Let’s take a look together at the features and improvements included in the new Pandora FMS release: Pandora FMS 759.

NEW FEATURES AND IMPROVEMENTS

State change thresholds based on percentage

It is an improvement that many users had requested. It allows a module changing status to be specified based on a percentage change in the value of the last data received. That way, it is more intuitive to define the situations in which you consider that a module goes into WARNING or CRITICAL status.

New trend modules 

These new modules compare the current average with the average of the previous period and return the difference in absolute value or as a percentage. They are useful to express in a simple way that, for example, the use of your network is currently 25% higher than last week, or that the temperature is 2ºC above normal if you compare it to the previous month.

Capacity planning modules

It makes predictions based on the time frame specified by the user, assuming a more or less linear performance of the target module. This type of predictive module allows you to find out how many days you have left until the disk is completely full, or the number of requests to the database you will have within a month if you continue as before. These modules replace the old prediction modules.

Network Configuration Manager

We improved the NCM features. Now in addition to being able to execute commands manually on different devices, firmwares can be uploaded, configuration changes can be verified and backups can be scheduled.

More IPAM improvements

Following in the wake of the previous release, we added some additional features to our IPAM such as defining SITES, isolated islands that allow duplicate addresses. We also added the possibility of defining a location of a previous list, ordering the lists, editing from the supernet browser and more improvements have also been incorporated.

Editor of special days in Metaconsole

The special days editor has been added and the way to assign special days to alert definition has been improved, making it more intuitive.

Policy auto-enforcement by group 

A system of automatic application of policies has been designed so that groups can be assigned policies and when a new agent is added to the group, the associated policies are applied automatically. This improves current auto-provisioning operations and enables large amounts of agents to be handled quickly.

Metaconsole inventory

Inventory display feature has been added to the Metaconsole.

Secondary IP macros in network components and plugins

From now on, through the _address_n_ macro you may use any of the secondary (or successive) IPs of an agent in network modules or remote plugins.

New alert action history report

It complements the existing event or alert reports, offering the details of each action (send email, SMS, log) for each alert launched on an agent/module. It is based on events (which now save that information when an alert is fired).

If you have to monitor more than 100 devices, you may also enjoy a Pandora FMS Enterprise FREE 30-day TRIAL. Installation on Cloud or On-Premise, you choose!! Get it here!

Last but not least, remember that if you have a reduced number of devices to monitor, you can use Pandora FMS OpenSource version. Find more information here.

Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Industry on The Edge: 3 Use Cases That Show How Industry is Putting Edge Computing to Work Today

Industry watchers have signaled Edge Computing as one of the major IT trends to watch over the next decade. What many people don’t fully appreciate is that Edge Computing is not yet one more over-hyped, future-state technology, but rather something that is being embraced in a number of industries today. And perhaps most surprisingly, it’s being embraced in many staid ‘old-school’ industries such as steel manufacturing, brick-and-mortar retailers, and even container shipping that one might not typically associate with the bleeding-edge.

The term ‘Edge Computing’ simply refers to the paradigm of bringing computation and data storage closer to the location where it’s needed as a way to improve response times and mitigate bandwidth constraints. A new generation of Edge Computing platforms can literally be held in the palm of your hand, can be placed practically anywhere since they have no special cooling or power requirements, and can be easily scaled by simply connecting them into clusters to quickly bring more compute and storage resources online as needed.

Back to the Future

Edge Computing represents another swing of the pendulum in the decades-long journey that has shaped the way IT resources are consumed and delivered – from the highly centralized mainframe computing paradigm to distributed models of client-server and the Cloud and now, we are seeing organizations shift the heavy lifting of compute and storage back on-site.

According to a September 2020 forecast report by IDC, the worldwide Edge computing market will reach $250.6 billion in 2024 while Gartner predicts that by 2025, three-quarters of enterprise-generated data will be created and processed at the edge – outside a traditional centralized data center or cloud (up from just 10% in 2018)

There are a number of reasons why we are seeing a renewed interest in moving IT systems closer to home base. Among the most salient benefits, Edge offers greater resiliency, flexibility, and simplified management. And as more businesses introduce new IoT devices and sensors into their environment that produce a high volume of data, the ability to process and feed this data back into local systems can be a major driver of innovation.

Three Edge Use Cases in the Real World

What follows are three use cases from the manufacturing, retail, and shipping industries that showcase how they are applying Edge Computing to not just simplify and improve the efficiency of the IT operations, but also show how Edge is enabling innovation.

1. Manufacturing at the Edge: Uniting Atoms and Bits in Real-Time

While the manufacturing industry has readily embraced automation and other technologies to boost productivity and improve efficiency, many manufacturers continue to struggle under the weight of having to manage complex and unwieldy systems. However, the extreme simplicity of a hyperconverged infrastructure makes it most beneficial in use cases where IT staff is limited – which is often the case for the tens of thousands of small and mid-sized manufacturing businesses operating across the U.S. And many are now investing in the Edge to optimize the performance of their plant machinery.

One needs to look no further than Harrison Steel, an Indiana-based manufacturer of engineered steel castings. Founded over a century ago, Harrison is an industrial manufacturer that operates several massive electric arc furnaces alongside other precision machinery across more than 650,000 square feet of its sprawling factory floor. Because their facility is so large, networking these machines together was cost prohibitive, forcing their IT staff to spend a good portion of their day transferring machine data back on USB drives for analysis. With a small cluster of hyperconverged machines, they were able to put a system in the middle of their shop floor and collect all of this machine data at regular intervals to keep their systems and machines fully calibrated.

2. Retail at the Edge: When Downtime is Not an Option

Traditional retailers across all categories are under increasing pressure to apply technology that improves the customer experience and most importantly, . Unfortunately, the legacy IT architecture typically found in brick-and-mortar – Point of Sale terminals, servers that collect transactions and track inventory — is often rigid, convoluted, and slow.

Jerry’s Foods, a regional chain of 50 retail, grocery, liquor and hardware stores, is one example of how traditional retail is being transformed by the Edge. With 50 storefronts dispersed across three states and no IT staff available within their store locations, the complexity of their IT systems had become a source of persistent disruption that was negatively impacting their customer’s experience. With a centralized IT staff of five supporting all of their branch stores, the majority of their time was spent remotely troubleshooting issues. Implementing an Edge computing strategy has enabled them to deploy hyperconverged clusters within each store, improving the reliability of their existing systems, allowing them to be managed remotely, and in the event of a disruption, seamlessly failover to keep critical applications online.

3. The Edge at Sea: An Extreme Edge Scenario

The global shipping industry represents one of the most important links in the global supply chain, transporting roughly 90 percent of the world’s goods from port to port on a daily basis. While the ships themselves are towering husks of steel and diesel – IT and the specialized applications that they run, are the orchestration engine that make it all work.

Until only recently, once a ship left port, it was more or less isolated from communication with resources at shore. And since these ships are limited by connectivity and don’t typically have an IT expert aboard, when a pivotal IT component goes offline on a ship hundreds of miles from shore, redundancy and resiliency become all the more critical.

Telford Offshore, an international offshore service provider to the oil and gas industry, operates a fleet of vessels that require 24/7 availability — and must do so in some of the world’s most extreme environments. Without reliable Internet connectivity, Telford’s IT leadership understood that significant cost and operational efficiencies would be realized by unifying their IT infrastructure into a single appliance and could be stationed on each individual vessel in its expanding fleet. Now if there is a system failure, they don’t need to spend tens of thousands of dollars to fly an IT support staff to swap out a simple part.

Technology innovations continue to make our world smaller, more connected, and consequently, more vulnerable to disruption when one of those links becomes disconnected. As demonstrated by some of the examples above, bringing converged infrastructure back to local operating environments where more and more data is being generated, and making it easier and more cost-effective to manage, is creating a wealth of new opportunities for innovation. And unlike so many other over-hyped technologies, it’s already here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

What is Configuration Management?

Configuration management is an essential foundation for a successful technology platform. Leaders in the tech space will want to know what it takes to implement it. If that’s what you are searching for, we will discuss some important points in this article:

Continue reading

Malware: Learn How to Identify the Threat Quickly

But along with the efficiency ofIn a completely digital world, it is normal for all sensitive data of a person or company to circulate and be stored on computers or mobile devices. Whether through websites, folders or applications.

 control and information disclosure, risks also came along. In different corners of the Internet, there are hidden threats that can steal personal data and cause a tremendous headache to any user.

Among these most common threats in everyday virtual life, we can highlight malware, short for malicious software.

What is Malware?

Malware is a type of computer program designed to infect a person’s device and harm them in many ways. It has various means of infecting computers and mobile devices, and it can also take many forms.

Spyware, viruses, worms, and Trojans are among these threats. Viruses are perhaps the most well-known type of malware and so are called because they are able to replicate various forms of themselves and spread across the network.

Each of them has a different “function”. Spyware, for example, copy and transmit personal information such as credit card numbers. Therefore, being well disguised in any corner of the Internet, the user must know how to identify them to protect themselves in every way.

Looking for more protection for your network? Then visit our website and request a demo of our services!

How to Identify Malware

Malware can manifest itself in many different ways on devices. Paying attention to these signs is important to be able to neutralize any threat right away.

  • Reduced operating system speed, when browsing the internet or using local applications;
  • System shutdown, crash, or Blue Screen;
  • System and antivirus update failures;
  • Sudden appearance of new toolbars, extensions, or plugins;
  • Mysterious loss of disk space;
  • Change of browser homepage without permission or links that lead to unwanted destinations on the Internet;
  • Excessive ads in pop-up windows on the screen of devices;
  • The high usage of system resources and the computer’s fan working at a fast pace.

Nevertheless, even if everything is working normally on the devices, it does not mean everything is fine. A more powerful malware can hide on the computer and perform illegal activities without awakening any system alerts, managing to steal passwords or sensitive files.

How is The User Infected with Malware?

There are many ways in which a user can be tricked, infected by malware, and put their system and data at risk. The two most common ways it can access your system are on the Internet and through email.

Anything downloaded from the Internet to a device that does not have a quality anti-malware security application can pose risks to the user. The most common ways by which this can happen are:

  • Browsing on compromised websites;
  • Downloading infected music files;
  • Installing new toolbars from an unknown provider;
  • Clicking on game demos;
  • Configuring software from a risky source;
  • Opening suspicious email attachments.

But some can also hide in legitimate apps, especially when downloaded from websites or via messages, rather than through an app store.

Therefore, it is recommended to always use reliable sources of mobile apps or install apps from reputable providers, always downloading directly from the provider and never from other websites.

Even if a user installs something from a reputable source, failing to pay attention to requests for permission to install other program packages at the same time could end up installing unwanted software.

But there are much simpler ways to come across malware. Just visiting a malicious website, for example, or viewing a page and/or an infected ad, a malware download can take place.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×