More

    Bosch launches Video Management System 7.0

    TechnologyCamerasBosch launches Video Management System 7.0

    Bosch has just released its Video Management System 7.0 software (Bosch VMS 7.0), which will empower security operators to effectively manage high-resolution video streams in their day-to-day work.

    At the rate that video cameras are evolving, keeping track of an ever-growing amount of high-resolution video data is becoming even more challenging. In places like metro stations and airports where many cameras are needed, the burden on a workstation is very high. If a workstation is overloaded, the client application will often lag.

    This is a great obstacle for security operators who need to view many cameras at once in order to maintain a complete and uninterrupted overview of a location, such as an airport terminal.

    With the new Bosch VMS 7.0, however, the user is able to keep multiple UHD (Ultra High Definition) cameras open without having to worry about slowing down the application. Bosch VMS 7.0 uses the technology “streamlining”. This technology automatically shows the optimal video resolution on the screen. If an operator needs to view many cameras simultaneously, the Bosch VMS 7.0 automatically uses a lower-resolution stream. When enhanced pictures are required to zoom in or view on a full screen, for instance, a higher-resolution stream is automatically chosen. This feature uses the multi-stream capabilities available on Bosch IP video cameras and runs on existing workstations.

    Another new feature of Bosch VMS 7.0 is the encrypted communication between Bosch cameras and the Video Management System. A security manager can choose to encrypt all control communications and videos through a secure HTTPS connection, reducing the risk of the system being hacked.

    Bosch VMS 7.0 also offers customers an IT security guide which explains how to set up a secure system. The document describes how to configure Bosch VMS for Windows operating systems and how to secure video cameras against unauthorized access.

    Related Posts