There’s a new big player – and familiar household name – coming into the security marketplace with the announcement of Motorola’s intent to acquire Canadian video manufacturer Avigilon Corporation, provider of video surveillance and analytics. Motorola Solutions points to an “avalanche of video in public and private sectors” as a motivation for the acquisition.

 

Motorola Solutions’ dominance in the public safety market – where the Chicago company supplies police technologies, radios and other products – will provide new opportunities for Avigilon in a realm where it previously has not been dominant. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings.

Meanwhile, Avigilon will “bring [its] advanced video surveillance and analytics platform to [Motorola’s] rapidly evolving public safety workflow,” according to Motorola, and enhance the larger company’s portfolio of “mission-critical communications technologies.” Avigilon’s end-to-end security and video surveillance platform includes cameras, analytics, video management and video storage.

Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings

The Broader Solution

Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as “a natural extension to global public safety and U.S. federal and military” applications, according to the company.

The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt. Not a bad price considering Avigilon’s stock price has traded as low as $13 a share in the last year. Avigilon has 1,200 employees with locations in Vancouver and Richmond, British Columbia, and Dallas and Plano, Texas. Revenue was $354 million in 2016. The transaction is expected to be completed in Q2 of 2018.

Deploying Pre-engineered Solutions

As an innovator in the security market, Avigilon has spearheaded an end-to-end solutions approach. Their success has even prompted some component manufacturers to expand their proposition into a broader “solutions” sale. Led largely by Avigilon, the industry pendulum has swung toward the simplicity of deploying pre-engineered end-to-end solutions. Open systems integrated using best-in-breed components from several manufacturers still have their devotees, and are needed in some situations, but Avigilon has made a strong case for the end-to-end alternative. Others have followed.

Avigilon’s stock price has traded as low as $13 a share in the last year
The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt

Avigilon has also lately been a leader in implementing artificial intelligence and deep learning, including Appearance Search technology that can locate a vehicle or person from video across a site. Avigilon’s video surveillance platform seeks to transform video from reactive – looking back at what has taken place – to proactive, issuing alerts in real time. Avigilon also recently introduced Avigilon Blue cloud service platform to enable video system users to manage more sites with fewer resources.

Investing And Building

Motorola would presumably continue Avigilon’s licensing program, but rules-based video analytics patents’ importance may fade

Motorola is not a completely new name to the security market. Old-timers will remember Motorola Indala, a previous presence in the RFID access control market that was sold to HID Corp. in 2001. More recently, Motorola Solutions has invested in Vidsys, a provider of converged security and information management (CSIM) software and has implemented Vidsys CSIM through its Protect Series unified platform that aggregates and analyses information from multiple inputs for military and federal government properties.  Motorola is also known as the inventor of the Six Sigma quality improvement process - and commitment to quality plays well among security integrators and end users.

Avigilon owns 750 U.S. and international patents, including some covering basic underlying principles of video analytics, for which several video companies currently pay license fees. Motorola would presumably continue the licensing program, although the importance of rules-based video analytics patents may fade as new deep learning and artificial intelligence (AI) approaches to video analytics emerge.

Channel Conflict

A possible concern surrounding the acquisition is the issue of channel conflict. When it comes to larger end user customers, Motorola has embraced a direct-to-user approach that could be problematic in the eyes of Avigilon’s 2,000 resellers. Among the benefits Motorola says they bring to the table is the ability to “leverage [their] direct enterprise safes force for large deals.” They also say they “complement Avigilon’s channel with [Motorola’s] channel network.

The security industry has a spotty history of larger companies entering the market to buy existing businesses. Some have been a good fit, while others have not. The entrepreneurial spirit of more than one successful security company has suffered under larger corporate ownership, sometimes withering as new corporate overlords cut costs and stifle R&D. The more successful recent large acquisitions in our market – notably Canon’s acquisition of Milestone Systems and Axis Communications – have worked well because the acquired companies have retained some degree of independence and preserved the existing corporate culture.

In the case of Motorola and Avigilon, obviously, time will tell.

Download PDF version

Author Profile

Larry Anderson Editor, SecurityInformed.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Drawbacks Of PenTests And Ethical Hacking For The Security Industry
Drawbacks Of PenTests And Ethical Hacking For The Security Industry

PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organizational level within businesses, they also value PenTesting under the premise that it allows them to identify security vulnerabilities before cyber criminals can. There are some regulatory requirements like PCI-DSS that require penetration assessments as part of their PCI compliance. However, many organizations have come to over-rely on PenTesting, thinking that if all the issues were identified in a PenTest, they’re good to go. Not only is this not helping them improve their security posture, it is also leaving them with a false sense of security. A penetration test is a simulated, live attack on your environment by a white-hat hacker What Is PenTesting? A penetration test is a simulated, live attack on your environment by a white-hat hacker, customized to address specific problem areas, such as web-based applications, mobile applications and infrastructure services like border VPNs and firewalls. The PenTest may include different types of attacks based on the requested scope from an organization so that the tester attempts to come at each system from all sides, the way a cyber-criminal would. The goal is to identify which systems and data the tester was able to access and how an organisation can address the vulnerabilities that allowed them to get in. The Limitations Of PenTesting There is great value in performing periodic PenTests, which is why PCI DSS and other security standards mandate them. However, PenTesting has three significant limitations: PenTesting does not provide solutions Let’s be honest: No one likes reading technical reports, but typically, that's the only deliverable provided by a PenTester. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability. The tester may miss some things, or not clearly convey their findings. Additionally, a PenTest is a snapshot in time and the PenTester could miss changes in the systems, configurations, attack vectors and application environments. Even if your system “passes” a PenTest, will it crumble in the face of a brand new, more powerful attack vector that emerges a week later? The worst type of “PenTest report” consist of an analyst producing nothing more than the results of a vulnerability scan. Even if the PenTester produces a well-written, comprehensive report filled with valuable, actionable information, it’s up to your organization to take the action, which leads to the next limitation of PenTesting. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability PenTesters only exploit vulnerabilities and do not promote change PenTesting does not highlight the missing links in your organisation's technology stack that could help you address your security vulnerabilities. This is often in the guise of being agnostic to the technologies that exist because their expertise is only offensive security – unless, of course, the performing company has “magic software” to sell you. PenTests also do not help to develop your organizational processes. Additionally, they do not ensure that your employees have the knowledge and training needed to treat the identified fixes. Worst of all, if your in-house expertise is limited, any security issues that are identified during a PenTest aren't validated, which leads to a misrepresentation of their magnitude and severity while giving your team a false sense of security. PenTesters are self-serving Too often, PenTesting pits the assessment team against the organization; the goal of the assessment team is to find the best way to "shame" the business into remediation, purchasing the testing company’s “magic software”, then call it a day. Once the PenTesters find, for example, a privilege escalation or a way to breach PII, they stop looking for other issues. The testers then celebrate the success of finding a single “flag”. In the meantime, the business is left in a precarious situation, since other unidentified issues may be lurking within their systems. Shifting The Paradigm Of PenTesting The goal of PenTesters is to find the best way to "shame" the business into purchasing the testing company’s “magic software”, then call it a day Penetration testing can uncover critical security vulnerabilities, but it also has significant limitations and it’s not a replacement for continuous security monitoring and testing. This is not to say that all PenTesting is bad. PenTesting should be integrated into a comprehensive threat and vulnerability management program so that identified issues are addressed. The purpose of a mature vulnerability management program is to identify, treat and monitor any identified vulnerabilities over its lifecycle. Vulnerability Management Program Additionally, a vulnerability management program requires the multiple teams within an organisation to develop and execute on the remediation plan to address the vulnerability. A mature threat and vulnerability management plan takes time and is helpful to partner with a managed security services provider (MSSP) to help you in the following areas: Improve your cyber-risk management program so that you can identify and efficiently address vulnerabilities in your infrastructure, applications and other parts within your organisation’s ecosystem on a continuous basis; Perform retests to validate any problems identified through a vulnerability scan or a PenTest assessment; Ensure that your in-house staff has the knowledge, skills and tools they need to respond to incidents. Cyber risk management and remediation is a "team sport." While periodic testing conducted by an external consultant satisfies compliance requirements, it is not a replacement for continuous in-house monitoring and testing. To ensure that your systems are secure, you must find a partner who not only performs PenTesting but also has the engineering and development experience to assist you in fixing these types of complex problems in a cost-effective manner and ensuring that your systems are hardened against tomorrow’s attacks.

Intelligent Video Surveillance And Deep Learning Dominate MIPS 2018 Agenda
Intelligent Video Surveillance And Deep Learning Dominate MIPS 2018 Agenda

Milestone Systems is embracing artificial intelligence and deep learning in a big way at this week's yearly Milestone Community Days (MIPS 2018) in Las Vegas. The Danish company's theme is "Creating an Intelligent World," and Milestone's stated goal is to make "the Milestone community part of every surveillance installation in the world."   Science Fiction Becomes Reality In a presentation on opening day, Milestone CSMO Kenneth Hune Petersen pointed to the 2002 movie The Minority Report as highlighting a variety of gadgets and systems that seemed futuristic at the time but are now perfectly possible, and in some cases outdated. Movies have previously highlighted gadgets and systems that were futuristic, but are now perfectly possible, or outdated "If we dare to dream together we can make this a better world," says Petersen. "Through AI and machine learning, we can help define tomorrow. There's no doubt about it: There is a massive business opportunity for us in artificial intelligence." Despite all the talk about artificial intelligence, only about 0.5 percent of all the data in the world has currently been analyzed or used, says Peterson. "Our open platform technology is the foundation for intelligent video systems and our partners have the expertise and infrastructure needed to reach the next frontier in intelligent video solutions," said Bjørn Skou Eilertsen, Milestone Systems CTO. "Together, we can provide unlimited solutions for our customers." Deeper Integration And Broader Coverage Expanding the Milestone community this year has included the addition of 1,000 new models of supported hardware devices; there are currently more than 7,000 models supported. Milestone is also pursuing broader coverage of installations through their partners, with deeper integration of functionality, and by deepening existing relationships with customers. ‘Creating an intelligent world’ includes deep learning and lots of video systems, says Milestone at their annual conference Under new agreements, hardware partners such as Dell EMC and BCDVideo now provide XProtect Essential+ software pre-loaded on servers they sell. The focus at MIPS 2018 on AI included a presentation by Tanmay Bakshi, the "world's youngest IBM coder" and TED Talk speaker, at 14 years old. The prodigy, who has been coding since the age of 4, has worked with IBM and other companies on a variety of AI-related projects. Using deep learning with video is currently limited because so much video is unlabelled and unstructured In his MIPS 2018 keynote speech, Bakshi traced the development of AI through high-profile events, such as IBM's development of the "Watson" computer, which successfully competed on Jeopardy!, and Google's development of AlphaGo, a program that successfully plays the complex ancient board game, Go. Data Demands Deep-Learning Bakshi focused on security and healthcare as two disciplines where deep learning can potentially have a big impact. Using deep learning with video is currently limited because so much video is unlabeled and unstructured. Still, projections are that there will be a billion cameras worldwide by 2020, providing an over-abundance of data that demands the use of deep learning to make sense of it all. "There is a misconception that AI is meant to replace us, to make humans obsolete. AI is not replacing us. It is created by humans to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently," said Bakshi. He suggested that AI is equivalent to IA; Bakshi's abbreviation meaning "intelligence augmented." Johnmichael O’Hare (left) of the Hartford Police Department, and Tanmay Bakshi (right) discusses key security issues of the modern day The ability to scale AI applications using "distributed deep learning" and graphics processing unit (GPU) hardware is paving the way for greater use of deep learning in video applications. Adam Scraba, Global Business Development Lead at NVIDIA, outlined the trends that are making the current "Big Bang" of deep learning possible. He said it is "the most exciting time in tech history," with "software that can write its own software" now among the tools that make previously unsolvable problems now solvable. AI-driven intelligent video analytics can now achieve "super-human" results, he said. An Intelligent World To Combat Crime Instead of sitting for hours staking out a suspected drug dealer alone, entire investigations now take hours instead of days A success story about the game-changing capabilities of video data was supplied by Hartford, Conn.'s Capital City Crime Center (C4). The Hartford police department uses video data in a "predictive policing" approach. They have created an "intelligent world with smart policing to combat drug trafficking," according to C4 Supervisor Johnmichael O'Hare of the Hartford Police Department. Instead of sitting for hours staking out a suspected drug dealer, for example, video of a site can be analyzed to determine areas with higher levels of foot traffic that indicate drug buys. The result is investigations that take hours instead of days. Hartford incorporates several technologies, including ShotSpotter gunshot detection, Briefcam video synopsis and other systems, all tied together using the Milestone platform. More than 700 attendees make MIPS 2018 the largest such event ever, and exhibits by around 60 Milestone partner companies attest to the continuing expansion of the Milestone community. [Main image:Tanmay Bakshi (left) and Johnmichael O’Hare of the Hartford Police Department (right) discuss key security issues of the modern day]

Has The Gap Closed Between Security Fiction And Security Reality?
Has The Gap Closed Between Security Fiction And Security Reality?

Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?