Check Valve Series,Swing Check Valve,Wafer Check Valve,Lifting Check Valve Wenzhou KAIZHENG Valve Technology Co.,LTD. , https://www.kazevvalve.com
The financial industry is also a focus of security work, including banking, postal services, and certificates. As an important daily work in the financial industry, security guarding is of great importance to the normal operation of the enterprise and achieving good economic and social benefits. The implementation and implementation of security protection in the financial industry is an important foundation for the development of the financial industry. one.
Remote centralized monitoring is a manifestation of the networked development trend of the security industry in recent years. Through remote centralized monitoring, it can effectively improve the ability and efficiency of on-site monitoring of important sites, and plays an important role in ensuring the production safety of enterprises and promoting the stable and sustainable development of enterprises.
Taking a provincial-level financial institution as an example, the ultimate goal of the project is to use professional monitoring and networking software combined with digital monitoring technology to implement centralized remote monitoring of decentralized business outlets and production departments. For the production, treasury and business premises under the jurisdiction of cities, counties and districts, the need for unified remote centralized monitoring and control is realized, and the monitoring video resources of various cities can be concentrated on provincial platforms for access and invocation.
But now there are still many problems:
Regional deployment, low level of networking
At present, business outlets and ATM self-service banks are basically equipped with traditional video surveillance systems. However, the traditional digital-analog monitoring system is usually based on local monitoring and local storage. That is to say, all network points establish a complete monitoring system, and the lack of monitoring information between the network and the parent organization is an organic link. Although this basically completed the main functions of the security monitoring system, due to the lack of a unified planning and a unified design, the systems are independent of each other and cannot be effectively supplemented, resulting in passive security work and difficult management. There is no way to share information such as surveillance images and anti-theft alarms between outlets and higher authorities. Once a network emerges from an emergency, higher authorities cannot fully grasp the situation in a timely manner.
System design standards are not uniform
Due to the long-term lack of uniform standards that can be followed in the field of financial security, and because the construction time of the system is long overdue, the monitoring systems of business outlets that have been completed so far are quite different in terms of technical systems, equipment selection, product brands, and agreements. From the collection and transmission of front-end signals, to the exchange and control of central points, to the display and storage of back-end signals, there are certain differences in degrees, which is not conducive to the realization of unified management, image networking, remote control and intelligent alarm. deal with.
The system basically belongs to passive monitoring, intelligent program is not high
At present, the local monitoring systems or network monitoring systems that have been established at various outlets cannot really get rid of the limitations of passive monitoring. There are still many problems with the human factors in the use of the system. Such as whether the staff on duty can normally use the equipment and software, whether it can use the system to actively monitor the system in accordance with the regulations, take the initiative to deal with problems, and whether they can actively search or record. The existing video system and alarm system are not highly integrated and the system is not intelligent enough for use with the system. For example, when a subordinate has a police report, the superior handler usually needs to manually open the live image, find the location of the alarm, the person in charge, contact information, make an artificial call, and deploy the police force.
Internal control supervision is not enough and the teller operation is not standardized
At present, the work supervision and assessment methods for the tellers in the business office are mainly periodic inspections. There are many omissions in this supervision and inspection mechanism, real-time supervision cannot be guaranteed, and the reminder and record cannot be guaranteed at the first time when there are problems or hidden troubles. It is urgently necessary to further regulate the daily work of tellers through remote visual supervision and management and business assessment.
External security precautions are not sound and the response is not timely
ATM self-service bank has not yet completely centralized and unified visual networking, and can not effectively implement remote intercom guidance, alarm upload and intelligent alarm preplans and other management. Crimes against ATMs are relatively high. If ATMs are implemented with 24-hour remote real-time linkage monitoring and voice intercom alerts, they will effectively contain ATM crimes.
Although the security monitoring in the current business hall has basically reached the requirements for localized alarm deployment and linkage, the degree of intelligence is not enough. In addition, the alarm information cannot be centralized and reported to the superior, and it cannot be handled well with the 110 alarm center. At present, the treasury generally maintains the library for the local two-mankeeper mode, and there are certain internal risks.
The transfer point of the armored car at each business network is a high security hidden trouble zone. However, the current escort management system has a certain regulatory blind spot for the management and handover process of the escort personnel. At the same time, there are abnormal circumstances and emergencies surrounding the handover point environment. The speed of response and other issues.
The financial industry is characterized by the diversification and complexity of the monitoring equipment used and the individualized requirements of security applications. It is an intelligent prevention and control digital system with highly integrated, external defense internal control, operational services and management supervision. Different from *, the financial industry focuses on alarm information, such as ATM alarms, business network alarms, and vault alarms. Moreover, the alarm volume of alarms is very large. Therefore, the alarm processing capability of the security system is a test. In addition, there are detailed classifications for the handling of alarms, including early warning, normal alarm, important alarm, and emergency alarm. For the handling of alarms, linkage of alarms (linked access control systems, linkage IP intercom systems, linkage video surveillance systems, etc.).
The financial industry has its own specialized business network. The early video surveillance systems used the business network sharing model, making the financial industry only use low-resolution video in the CIF format due to the limitation of network bandwidth. The monitoring center only serves as a real-time preview of the screen. Now that the financial institution's network has begun to gradually transform, but the network still can not be compared with the video private network, which is generally 4M-8M bandwidth, so the video surveillance system is required to have media distribution functions.
In view of the special network conditions in the financial industry, storage also has corresponding strategies. It adopts the centralized storage of important parts of alarm records in distributed storage centers. The front end uses hard disk recorders such as DVRs or NVRs, and is equipped with industrial-grade hard disks that guarantee 30-day storage. The monitoring center is equipped with dedicated storage servers and disk arrays to back up important alarm videos. Time can be saved for up to six months or more. Long.
Different monitoring areas in the financial industry require some business customization features such as:
Business hall, counter
The daily monitoring services that these places will involve include: digital superposition of counter cash registers, statistics of people flow, analysis of abnormal behaviors of staff, spot checks of working conditions of staff (wind construction), etc.;
treasury
Now that more and more banks are using unattended treasuries, they will need to have different security functions. For video surveillance systems, access control systems, and technical anti-alarm systems, a complete solution is needed.
Self-service bank, departure ATM
The self-service bank will involve the analysis of abnormal behaviors: scuffles, installation of illegal stickers, installation of card readers, multi-face withdrawals; voice intercom at the time of the case, surveillance center deterrence, front-end alarm bell linkage, self-banking access control Wait.
monitoring Center
Staff turnover management, risk event management, multi-level alarm management, GPS electronic maps and other linkage management. It can be found that the financial security monitoring platform adopts advanced data monitoring technology, software technology, multimedia technology, and network communication technology. It fully integrates the financial system business applications, and is stable, reliable, secure, and covers all outlets and various self-service banks, treasuries, and other key points. Site monitoring system.
Conclusion
Of course, security has a leap forward in various fields, such as education, communications, energy, and so on. I would like to take this opportunity to discuss with you the next development of the security industry will have how the development of security monitoring system platform will be how to change, and hope to witness the 2012 Chinese security boom.
Financial Monitoring Should Be Closer to Active Monitoring