When most people think of the term artificial intelligence, science fiction films both old and new tend to come to mind. Whether it’s the military network Skynet becoming self-aware in The Terminator and wiping out the majority of mankind with nuclear weapons, or the hosts in Westworld developing consciousness and turning against their human masters, Hollywood tends to paint a grim picture of this area of technology.

The reality is that artificial intelligence – or AI for short – is not simply some fatalistic abstract concept destined to wreak havoc on a futuristic society, but rather a currently available technology that stands poised to revolutionize a number of industries, including security.

Robots Replacing Humans

While it may be hard to believe now, robots that leverage AI will, at some point in the near future, perform many jobs that are done by humans today. In a recent interview with Quartz, Microsoft founder Bill Gates suggested that the government should tax robots as a way to keep automation from replacing human workers too quickly.

“Right now, the human worker who does, say, $50,000 worth of work in a factory, that income is taxed and you get income tax, social security tax, all those things. If a robot comes in to do the same thing, you’d think that we’d tax the robot at a similar level,” Gates told the publication.

Naturally, there is a bit of healthy skepticism on the part of security end users about yet another new technology that promises to transform the industry. They have been burned in the past by things such as video analytics in its early days, which overpromised and under-delivered. However, while still in its infancy stages, robots for security enhancement are being actively evaluated by a number of high-profile Fortune 100 companies.

Artificial Intelligence In Security

By now, most people have at least read about, or have a vague idea what AI is, but there is also a lot of confusion about some of the various terms that are used in conjunction with it; for example, machine learning, deep learning, neural networks, etc. All of these terms essentially refer to the capability of software programs to recognize patterns by analyzing large amounts of collected data. These pattern recognition algorithms all produce an output that falls under the umbrella category of artificial intelligence.

Narrow AI focuses on executing
certain defined tasks, such as
object recognition in the case of
video analytics or navigation
for a security robot

While the aforementioned science-fiction movies all deal with ideas surrounding general AI, which involves machines being able to perform any intellectual task that a human could, the technology being developed for the security industry would fall under the category of narrow AI, which focuses on executing certain defined tasks, such as object recognition in the case of video analytics or navigation for a security robot.

Speaking of video analytics, this will be one of the first major domains within the security industry that will be radically transformed by AI. The rules-based analytics of old, such as virtual tripwire, wrong-way motion detection and object left behind, will soon be rendered obsolete by AI, which completely eliminates the need for pre-programed algorithms. In fact, sensor technology available today can capture an amount of metadata on people in real time that some privacy advocates would consider downright scary, including their identity, gender and age. With such capabilities already within reach, the video analytics of tomorrow will be able to do much more than just alert users when a person, animal or vehicle has crossed an invisible barrier.

Robotics And AI

Although video analytics may be the first security technology to leverage AI to the greatest extent, it is clear that the potential for robotics in the industry is vast and we have only begun to scratch the surface of what it is capable of. However, the use of robotics in security would not be practical without artificial intelligence technology. AI is, in fact, the driver of the two main technologies that security robotics – be it unmanned ground vehicles (UGVs) or unmanned aerial vehicles (UAVs), more commonly known as drones – leverage, including intelligent navigation and advanced object recognition.

These pattern recognition algorithms all produce an output that falls under the umbrella category of artificial intelligence
Both UGVs and UAVs are going to have a significant impact on facility protection moving forward

One of the limitations of most currently available UGVs is that they are limited in the types of terrain they can cover; however, other robots are being built to traverse more rugged landscapes and intelligent navigation, which incorporates GPS data and deep learning via machine vision technology, will be paramount in helping them secure the facilities they are assigned to protect. It will provide said robot with the logic to travel around various obstructions that cross their path in an efficient manner.

The second component of the equation, advanced object recognition, is actually what enables a robot to become an effective part of the enterprise security team. Leveraging AI, robots, similar to their human counterparts, will be able to identify, at range, when a human or vehicle is approaching a perimeter and then execute a set of standard operating procedures in line with the organization’s goals.

Future Of Robots In Security

Undoubtedly, both UGVs and UAVs are going to have a significant impact on facility protection moving forward – and while the combination of humans and robots is ideal for most locations, there are a variety of so-called “dangerous, dirty and dull” jobs where it would indeed be preferable to use a robot over a human guard.

For example, it would be unfair and perhaps unreasonable to post a human at a critical utility site that is hundreds of miles away from the nearest population center. However, because of the importance of the site to the nation’s power grid or water supply, it may be necessary to have an enhanced security presence there and a robot would be a perfect fit. There are also numerous toxic-waste dumps scattered about the country, many of which are managed by states, which need to be protected. This is a mundane and potentially hazardous job that would be another ideal application for robots.

Security has traditionally been seen in the corporate world as a cost center rather than as a business unit that adds value to the bottom line. While the use cases for artificial intelligence and robotics are still being fleshed out, it is clear that the technology presents a way for security departments to justify their existence beyond “guns, guards and gates.” Only time will tell how successful organizations will be in leveraging the capabilities offered by AI, but the future looks very bright indeed.

Download PDF version

In case you missed it

Has The Gap Closed Between Security Fiction And Security Reality?
Has The Gap Closed Between Security Fiction And Security Reality?

Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?

The Five Questions Bank Security And IT Leaders Need To Answer About Cybersecurity
The Five Questions Bank Security And IT Leaders Need To Answer About Cybersecurity

Organizations across the world face a new risk paradigm: one that encompasses cyber and physical threats. We’ve heard the stories associated with ATM skimming, identity theft, data breaches, scams, and phishing. Large financial services organizations are often the victim of hackers looking to steal corporate information and transactional data or funds, and criminals continue to become more sophisticated in their approach. Growth In Cyber-Attacks Additionally, cyber-threats have taken a front seat in the line-up of primary risks facing financial institutions today. And it is no surprise why: according to Cybersecurity Ventures, the amount of money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion overall for 2015, and this substantial amount is expected to double by 2021. Cyber-attacks are becoming more prevalent, more complex and harder to address The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, with that also comes an increased risk to dangerous threats. In today’s environment, banks, credit unions, and financial organizations of all types are primary targets for hackers. But it’s not just the monetary loss that these businesses need to be concerned about — there is also a threat to the brand, customer trust, and employee safety. All of these challenges and complexities open the door to new conversations and risks. Here are the top five critical questions today’s bank leaders need to be ready to answer. Should We Collaborate To Mitigate These Threats Effectively? Over the last decade, the emergence of the Internet of Things (IoT) and a demand for more mobile capabilities has changed the way people and businesses connect. But as the need for connectivity increases, so too does the need for increased security for physical assets, networks, and valuable corporate data. As a result, a dialog between IT and physical security is necessary to help leaders gain a greater knowledge of how to best collaborate to ensure complete protection. Leaders must communicate closely to drive strategies that help identify vulnerabilities in a more proactive manner. The result of these conversations: a truly comprehensive approach to security intelligence. It’s not just the monetary loss that banks need to be concerned about – there is also a threat to customer trust and employee safety How Can I Pinpoint The Important Data For Addressing Cyber Threats? To maintain a high level of security and ensure business continuity around the globe, companies seek solutions that help predict and identify threats in real time. But often, there are too many alerts generated by too many systems, and none of this raw data is actionable. Linking cyber and physical security together transforms alerts into actionable intelligence, which helps users connect the pieces of any situation and present a unified risk scenario to the appropriate analysts and operators. By capturing and analyzing data in real time, enterprise organizations gain a visual representation of risks across the business while accessing information related to the most critical events happening at any given time. Not only does this unified process enable a higher and more proactive level of protection, but it also helps facilitate a plan of action based within a common, unified security operations center. How Can I Inform Of The Importance Of Cybersecurity? Security leaders in banks need to feel prepared by staying updated, looking at common vulnerabilities, understanding the malware and challenges, and testing the environment. And collaboration is key to mitigation: Traditional security and fraud teams must work in conjunction with cyber teams to effectively handle all aspects of a cyber-attack. Additionally, CISOs need to “sell” cybersecurity to CEOs and the board by outlining the importance of protection through emphasising the impact of a potential cyber-attack on the business. Ensure you can verbally address the most critical risks to your senior leadership, including recent botnets, scams, and cyber gangs, to receive the support, and budget you need to address these threats head on. Is My System Secure? It is critical that you are knowledgeable about the steps you can take to protect your security and network infrastructure from cyber-attacks. A firewall is useful to prevent hackers from accessing critical data on internal networks and computers Changing default passwords should be a first step, as some scams target devices with hard-coded factory defaults. Ensure software and firmware is up to date because updates often include fixes for potential vulnerabilities. These updates keep your devices and network more secure and increase overall system uptime. A firewall is useful to prevent hackers and unauthorized programs from accessing the critical business information and resources on internal networks and computers. Also, minimize potential risk by closing network ports and disabling services you don’t need. With all of these instances, it is best to work closely with your integrator partner and chosen vendor to ensure that your system is as secure as it can possibly be. What Solutions Are Best To Help Mitigate Risks? Technology is a great force multiplier. Security — both cyber and physical solutions — helps secure an entire branch footprint, alleviates risk, ensures operational compliance, and improves fraud investigations. Video surveillance systems, analytics, threat management platforms and more can provide organizations with intelligence and unprecedented protection from fraud, all while enhancing the customer experience. Overall, there are significant benefits to collaborating to gain comprehensive risk intelligence. By bringing various leaders, departments, technologies and strategies together, we can more effectively identify threats, develop trends and quickly access important data to ensure security and safety goals are realized.

BCDVideo Signs OEM Deal With Dell EMC: Positive Impact For Surveillance Storage
BCDVideo Signs OEM Deal With Dell EMC: Positive Impact For Surveillance Storage

In a significant move for the video security market, BCDVideo has announced that it is set to become Dell EMC’s OEM partner in the video surveillance space. For nearly a decade, the Chicago-based company has been known as a key OEM partner of Hewlett Packard Enterprise (HPE), providing storage and networking technology to security integrators on a global scale. This latest partnership will allow BCDVideo to take their offerings to the next level. BCDVideo Vice President Tom Larson spoke to SecurityInformed.com to discuss the reasoning behind the deal, and how the program will benefit partners, integrators, and end-users alike. Expanding BCDVideo's Product Offering For BCDVideo, the HPE OEM program has been widely acknowledged as a success, allowing the company to leverage a globally recognized brand and provide high-quality, reliable solutions across video networking and access control. Nevertheless, explains Larson, HPE server solutions are primarily suited to large-scale enterprise projects, and are therefore unable to accommodate for the growth in small- and medium-sized surveillance applications. The global collaboration with Dell EMC will allow BCDVideo to open up a broader product offering, building on success in the larger enterprise market to offer tailored solutions to SMEs. Our aim is to look at all best of breed technology to serve the video surveillance marketplace, and that means multiple partnerships” Support For Integrators By leveraging Dell EMC’s sophisticated digital storage platforms, BCDVideo will now be able to offer a more cost-effective solution to integrators, without sacrificing the resilience and IT-level service that BCDVideo is known for. With access to Dell EMC’s expansive global sales and technical teams, the company hopes to expand its reach, all-the-while providing partners with around-the-clock technical support and a five-year on-site warranty. Customers should be reassured that BCDVideo will continue to offer HPE platforms, service, and support. “Our aim is to look at all best-of-breed technology to serve the video surveillance marketplace, and that means multiple partnerships,” says Larson.  “The addition of Dell EMC to our portfolio is a major win for BCDVideo, for Dell EMC, and for our integrators.” The global collaboration with Dell EMC will allow BCDVideo to open up a broader product offering Meeting Surveillance Market Demands At the technology level, assures Larson, Dell EMC’s server offering is well suited to handle the increasing video resolution and growing camera count demanded by the surveillance industry. At the larger end of the spectrum, the company’s Isilon Scale-Out NAS solution can handle tens of petabytes of data, making it ideal for large-scale security applications such as city-wide surveillance and airport security. Dell EMC storage solutions are already proving successful at major international airports including Dubai and Abu Dhabi, each with a camera count in the 1000s.Dell EMC and BCDVideo together are ensuring our customers get the right solutions designed for the surveillance market” For Dell EMC, the new partnership means the ability to expand on this success in the enterprise market, leveraging BCDVideo’s surveillance expertise and high-level customer service to offer tailored solutions for lower-volume applications. Since its inception, BCDVideo has differentiated itself in the security space by providing a high level of IT service to integrators making the transition to IP systems. By combining resources, the partners will be able to service VMS and analytics companies, software vendors, and access control providers, as well as traditional business integrators. Ken Mills, General Manager Dell EMC Surveillance, explains: “Surveillance storage is not just about capacity, it is also about performance and reliability. Dell EMC and BCDVideo together are ensuring our customers get the right solutions designed for the surveillance market.” Accomodating For Growth BCDVideo is well placed to accommodate this anticipated growth. Last year, the company opened a new 51,000-square-foot global headquarters in Illinois, home to 90 separate stations within their Innovation Center where each system is customised according to integrator needs. The new facility allows for expanding business with new and existing partners in the security market.