Panasonic delivers secure video evidence capture
Posted on 23 May 2012.
Bookmark and Share
Panasonic introduced its Wearable Video Camera system. The new solution, designed for law enforcement officers in the field, will provide agencies with a comprehensive system that captures and stores tamper-proof audio video evidence, delivering an accurate and unbiased record of officer engagements.

In the digital age, where social media is ubiquitous, video evidence capture is vital to an agency’s reputation and the safety of its officers.

According to the U.S. Bureau of Justice, in 2011 60% of police departments and 66% of sheriff's offices now use video solutions in their vehicles. Adopting body-worn video solutions is a natural complement to in-car platforms providing video directly from the officer’s vantage point.

Designed as a standalone solution, or able to be integrated with the Toughbook Arbitrator SafeServe software version 7.4 slated for release in the Fall of 2012, the Panasonic WVTW310 wearable camera features a recording capacity of up to 32 hours using H.264 compression and a battery life of approximately five hours in pre-event continuous record mode or longer without. Delivering extremely wide angle views, the camera is optimized for both day and night usage.

“With the adoption of wearable cameras, public safety agencies can achieve total situational awareness and a comprehensive and seamless digital camera evidence capture solution, from the field to the courtroom,” said Greg Peratt, director of digital video products, Panasonic. “This single camera platform will provide agencies with a wide-angle audio and video record of important officer engagements while ensuring the integrity of the chain of custody, delivering significant time and cost savings in the acquisition, management and review of recorded evidence.”

In the United States, the Panasonic WVTW310 wearable camera systems will be available in July 2012 from authorized Panasonic mobile video resellers starting at a suggested retail price in the $1000 range.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //