More crowded aisles and productive conversations continued to set the tone on the second day of ISC West in Las Vegas. No big technology breakthroughs have surfaced, but there is plenty of interest, and some degree of curiosity, about whether (and when) the recent hype about artificial intelligence (AI) and deep learning will translate into usable products.

Vertical Market Solutions

Yesterday we saw a tremendous amount of traffic in the booth, and today is more of the same,” said Miguel Lazatin, Director, Product and Channel Marketing, Hanwha Techwin America. The layout of the Hanwha Techwin booth is different this year, although the “footprint” is the same size. “We lessened the number of kiosks within the booth, which allows for better flow, and the ability to accommodate more customers and do the demonstrations more effectively and focus more on product solutions,” Lazatin adds.

We are introducing products in new categories for Hanwha Techwin,” Lazatin says. “We have new thermal cameras, new stainless steel cameras, new multi-sensor cameras, as well as new mobile products. We are expanding our product set to address new applications and new markets.” The new products are tailored and specific solutions for those new markets, which include food processing plants, oil refineries and areas where Hanwha Techwin has not played in the past.

Although there is a lot of talk about deep learning and artificial intelligence at this year’s show, there don’t appear to be a lot of actual products being introduced in those categories. Companies of all shapes and sizes are embracing the new buzzwords, leaving some attendees unsure how these new ideas — or marketing concepts? — fit into the “real world.”

Hanwha's new products are tailored and specific solutions for those new markets, which include food processing plants and oil refineries
 Hanwha Techwin America lessened the number of kiosks within the booth, which allows for better flow

Meeting Customer Needs With AI

A key to leveraging the value of new technologies such as AI and deep learning is to get beyond the buzzwords and position the new capabilities in the context of actual end user benefits such as operation efficiency and automation, says Stuart Rawling, Director of Global Business Development, Pelco by Schneider Electric. “The customer doesn’t care about buzzwords, he just wants to know what are the benefits? What solutions are we offering?” At the show, Pelco announced a new alliance with IBM that will leverage Big Blue’s advanced knowledge of deep learning and analytics, and combine it with Pelco’s VideoExpert video management system (VMS). “We have a version of that integration at the show, but the real news is that we are merging our development plans to solve specific use case problems,” says Rawling.

Video Analytics In The Cloud

Cloud applications are also gaining traction, including the Avigilon Blue cloud platform. “It allows integrators to manage everything from one easy, central site,” says Willem Ryan, Avigilon’s Vice President, Global Marketing and Communications. “They can respond quicker and with knowledge of what the system is doing.” Video analytics are built in as an inherent part of our solution. Any IP cameras — Avigilon or ONVIF-conformant — become equipped with analytics when they are connected to the Blue platform. A new announcement at the show is Avigilon’s ACC System Health Monitoring, a new service added to the Blue platform. Health monitoring enables integrators to be more proactive in their service and keep systems running smoothly.

Cloud allows you to scale how you can manage systems and service systems rather than having to go on site to upgrade systems,” says Ryan. “People think it’s a buzzword, but really it’s a means to an end to make systems more secure, more efficient, more responsive. We’re putting a lot of investment in it.”

Avigilon also continues to upgrade its Appearance Search product to enable faster review of stored video
A new announcement at the show is Avigilon’s ACC System Health Monitoring, a new service added to the Blue platform

Building RMR For Customers

The cloud also enables integrators to build more recurring monthly revenue (RMR). A cloud approach that encompasses products and ongoing service ensures that an integrator continues to “touch” customers. “For us, they can package this around service in a new way,” says Ryan. “The customer doesn’t have to worry about a large capital expense in the beginning. And as new capabilities come along, they can be added. So it becomes a way to sell a package around their company, service and products; but less about the products and more about a platform that allows them to sell their [integration] company in a new way. What we’re hearing is, it’s a change in mindset, and you need buy-in from the top of the organization. And the sales people have to get used to selling in a different way. It’s going to take time, and our industry needs to evolve. Customers love the flexibility. And integrators need stickier customers and better profit margins.”

Avigilon also continues to upgrade its Appearance Search product to enable faster review of stored video. Now a search for video related to an investigation can begin with a physical description of a person (rather than using a reference image as a starting point in the search).

There’s one more day for attendees to roam the aisles of ISC West in search of new and useful technologies. Foot traffic historically drops off on the final day, but that just leaves more quality time for interaction among those staying until the bitter end. Count me among that group, and I will have much more to report after the show ends.

Download PDF version

Author profile

Larry Anderson Editor,

An experienced journalist and long-time presence in the US security industry, Larry is's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Highlighting The Importance Of Security Integrations And Alliances
Highlighting The Importance Of Security Integrations And Alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organizations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emerging components to make their products and services even stronger. Oftentimes, a key aspect necessary to build a comprehensively robust solution involves finding like-minded partners that share a common goal and are willing to work together to create an integration that increases insight and intelligence.The interoperability between systems, devices and different types of applications should be intuitive and fast Key Factors For Security Integrations A basic factor in a partnership is openness. For an integration to perform seamlessly for the end user, the platform through which the technologies converge must follow standard protocols, easily operate with other platforms, allow freedom and customization, and provide adaptability. The interoperability between systems, devices and different types of applications should be intuitive and fast, enabling more time to be spent on analyzing critical data and responding to security events. The puzzle of a complete security solution contains many pieces, and it's often necessary to fuse together aspects from various providers to create a best-in-breed technology offering. When organizations collaborate, the end result is a simplified solution with an increased level of value. As threats become more severe and complex, customers demand solutions that combine different security and business elements into a single interface that can address a wide variety of risks.  A unified security system requires a strong collaboration between technology providers and integrated solutions Interconnected Security Devices Users used to only look at specific security devices - such as cameras or door alarms - as each having a strong, autonomous purpose, but now, every device plays an important interconnected role. And the progression of the Internet of Things (IoT) has made this transition even easier, as maintaining a consistent and uniform communication and interconnectivity between devices has now become the norm. The IoT has also made it so that partnerships must not only exist between manufacturers, but also within the customer's organizational structure. Although exceptionally beneficial, the IoT brings with it an increased amount of cyber vulnerabilities. As security systems are networked to increase flexibility, the door is opened to a number of potential threats that could compromise the entire enterprise. This risk highlights the need for an internal partnership and knowledge sharing between a company's physical security professionals and its IT team. IT experts should be pulled into security decisions and positioned as collaborative partners to assist with software updates, data safety protocols and solving complex network challenges, ultimately leading to a more cyber secure solution.Partnerships are beneficial to both the companies involved and their customers Knowledge Sharing And Learning Aside from cybersecurity, the latest prominent security attacks and events have focused primarily on soft targets, such as schools, concerts or shopping malls. This has caused many technology providers to venture into different vertical markets, and strong partnerships streamline this crossover. Innovators can extend their geographic reach and purpose through integrations with other like-minded manufacturers or integrators to add new levels of functionalities. Of course, a partnership cannot operate properly and to the best of its ability without a core component: learning. In today's evolving business and risk environment, knowledge is critical. A shared knowledge base can open up new opportunities and lead to the strengthening of security across many levels. A truly powerful, unified security system requires a strong collaboration between technology providers and integrated solutions. Partnerships are beneficial to both the companies involved and their customers, and the results created through these alliances can reach far beyond a user's expectations, offering enhanced flexibility and extensive safety options.

What Are The Security Challenges Of The Hospitality Market?
What Are The Security Challenges Of The Hospitality Market?

Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?

How SecuriThings Boosts Cybersecurity Across Multiple IoT Devices
How SecuriThings Boosts Cybersecurity Across Multiple IoT Devices

As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.