Storage - Expert commentary

Data-at-rest Encryption: At The Center Of The Security Circle
Data-at-rest Encryption: At The Center Of The Security Circle

The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced Approach To Data Security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analyzed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The Importance Of Data-At-Rest Encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring Drives To Be Common Criteria Compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing An Additional Layer Of Security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries In Need Of Data-At-Rest Encryption Healthcare organizations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its partSMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing Every Hardware And Software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialog and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.

The Many Faces Of Today's Facial Recognition Technology
The Many Faces Of Today's Facial Recognition Technology

The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticized by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights.  The Rise In Knife Crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, while the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police Systems Benefiting Crime Investigations This is where facial recognition can offer up additional intelligence. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognize an individual and see only data, not gender, age or race. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognize and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling Addiction And How Facial Recognition Can Help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry.   Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers   Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilizing Facial Recognition At Airport Security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources.   Facial recognition allows officers to identify an individual faster and more accurately than the human eye While some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings.  At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. While the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – while ignoring everyone else.

Preparing For Cyber-attacks: The Intersection Of Cybersecurity And Physical Security
Preparing For Cyber-attacks: The Intersection Of Cybersecurity And Physical Security

Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it.     Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security   Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognized that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact. It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on itBoth are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognized.  On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone.  Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected.   Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas.   Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops).  Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organization. It’s far broader and deeper than most.  Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge differenceIndustry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement.  One of the changes needed in the industry includes how risk assessments are performed  Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level?  Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link.   Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too.  Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organizations that might not care about cybersecurity but are prioritizing function.  Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.

Latest FLIR Systems news

FLIR Highlights The Applications Of Thermal Technology In Security, Safety, And Equipment Protection
FLIR Highlights The Applications Of Thermal Technology In Security, Safety, And Equipment Protection

The Insights from the Field series features insight from FLIR experts who recommend, deploy, and use thermal imaging technology every day. FLIR discusses the diverse applications of thermal technology in security, safety, and equipment protection for critical infrastructure. Epidemics and pandemics can leave large enterprises that employ and receive thousands of people vulnerable to widespread infection and business interruptions. Without the right entry protocols in place, an employee who has symptoms of an infectious disease, such as a fever, could enter a facility and put the entire workforce at risk of exposure. Skin temperature screening Elevated Skin Temperature Screening Major businesses are ramping up their workforce safety best practices by deploying FLIR thermal cameras for elevated skin temperature measurement. Registered with the U.S. Food and Drug Administration (FDA), these non-contact thermal cameras measure skin surface temperature at the inner canthus (or corner of a person's eye). FLIR thermal cameras that are engineered for elevated skin temperature screening can achieve accuracies of ±0.3°C FLIR thermal cameras that are engineered for elevated skin temperature screening can achieve accuracies of ±0.3°C (0.5°F) over a temperature measurement range of 15°C to 45°C (59°F to 113°F). This aligns with the U.S. FDA Guidance for Industry and Food and Drug Administration Staff as well as with ISO/TR 13154 specification. FLIR provides an array of cameras for elevated skin temperature screening in multiple form factors—including handheld, tripod mounted, or fixed-mounted—optimized for a variety of application needs. Measuring body temperature Infrared thermography can detect elevated skin temperatures, which may indicate the presence of a fever. When followed by a screening with a medical device designed specifically for measuring body temperature, such as a thermometer, the use of an infrared camera as an adjunctive diagnostic tool may help contain or limit the spread of viral diseases such as bird flu, swine flu, or COVID-19. In the wake of COVID-19, businesses across the critical infrastructure market rapidly adopted thermal cameras for elevated skin temperature screening. In the utilities sector, the Office of Cybersecurity, Energy Security and Emergency Response notes how energy utilities are updating their entry protocols in response to COVID-19. Practices now include wellness questionnaires to check for symptoms as well as temperature checks conducted through tools such as thermal cameras. Screening all patients GM deployed 377 FLIR thermal cameras across 72 sites to help limit the spread of COVID-19 General Motors (GM) is one of the manufacturers of motor vehicles, has over 85,000 employees in the United States, and has some plants that employ 1,000 people in a given shift. In May 2020, GM deployed 377 FLIR thermal cameras across 72 sites to help limit the spread of COVID-19. Healthcare facilities are also installing FLIR solutions; for example, the VA Medical Center in Manchester, New Hampshire deployed FLIR thermal cameras to screen all patients and staff for elevated skin temperature prior to them entering the building. In the transportation sector, Emirates airlines deployed FLIR thermal cameras at departure gates for all U.S. gateways beginning in March 2020. Guests traveling on U.S. bound flights out of the Dubai International Airport are screened for elevated skin temperature. Radiometric thermal cameras As more critical infrastructure organizations deploy thermal cameras for elevated skin temperature screening, they will likely prompt greater long-term adoption and integration of radiometric thermal cameras into the overall security and safety solution. Here’s why. While temperature screening of employees and guests often falls under the purview of Environmental Health and Safety or Occupational Health and Safety teams, not every business has a dedicated EHS or OHS staff. As a result, many organizations are tasking their security teams to vet and implement screening solutions. Security officers as well as security equipment, such as surveillance cameras and metal detectors, are already in place at key entry points in a facility. As a result, many security officers must play a dual role as the frontline personnel required to use handheld or tripod mounted thermal cameras to conduct elevated skin temperature screening. Video surveillance solutions It’s important to use a high-resolution thermal camera for elevated skin temperature screening Adding a thermal camera for elevated skin temperature screening is a logical addition to existing video surveillance solutions. As critical infrastructure businesses shift their attention toward the long-term implementation of thermal cameras for elevated skin temperature screening, there are multiple deployment practices to consider. Here are the a few recommendations from FLIR’s team of experts. Choose a Certified Camera – To ensure optimal reliability and deployment success, choose a thermal camera specifically designed for elevated skin temperature screening with a 510(k) filing (K033967) with the U.S. Food and Drug Administration. When looking to integrate this thermal camera into an existing video management system, make sure the camera is ONVIF-compliant. Other screening standards should be considered including ISO/TR 13154:2017 and IEC 80601-2-59:2017. Select a Camera with High Resolution – It’s important to use a high-resolution thermal camera for elevated skin temperature screening so one can capture the right pixels to yield accurate readings. Delivering consistent measurements Ensure Proper Distance for Screening – Distance matters. Make sure the camera is placed at the manufacturer’s recommended distance away from the individual so the camera can focus. Ensure the camera is stabilized so that the camera will deliver consistent measurements. Place a neutral backdrop a few feet behind the location where the person will be screened, and only screen one person at a time to identify temperature anomalies. It is more susceptible to environmental interferences and more likely to generate measurement errors Measure the Right Spot – While the forehead is easier to quickly screen, it is more susceptible to environmental interferences and more likely to generate measurement errors. Research has shown that the corner of the eye—the region medially adjacent to the inner canthus—provides a more accurate estimate of core body temperature than other areas of skin. Specific skin temperature This is because skin at the canthi is thin (decreasing insulating effects), is less exposed to environmental factors, and is directly over major arteries which increase blood flow and heat transfer. Set an Alarm Threshold – For FLIR cameras with a Screen-EST™ mode, set an alarm upon detection of a specific skin temperature compared against a sample average of temperature value. Because skin temperature can vary multiple degrees throughout the day based on the environment and other factors, FLIR Screen-EST mode gathers temperatures from several individuals to determine an average that can be updated throughout the screening operation. This is a defining feature and capability for the FLIR cameras for elevated skin temperature screening.

Teledyne Technologies Incorporated And FLIR Systems Announce Their Agreement For FLIR’s Acquisition Through A Cash And Stock Transaction
Teledyne Technologies Incorporated And FLIR Systems Announce Their Agreement For FLIR’s Acquisition Through A Cash And Stock Transaction

Teledyne Technologies Incorporated (“Teledyne”) and FLIR Systems, Inc. (“FLIR”) jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion. “FLIR’s commitment to innovation spanning multiple sensing technologies has allowed our company to grow into the multi-billion-dollar company it is today”. Permanent financing Under the terms of the agreement, FLIR stockholders will receive $28.00 per share in cash and 0.0718 shares of Teledyne common stock for each FLIR share, which implies a total purchase price of $56.00 per FLIR share based on Teledyne’s 5-day volume weighted average price. The transaction reflects a 40% premium for FLIR stockholders based on FLIR’s 30-day volume weighted average price. Net leverage at closing is expected to be 4.0x adjusted pro forma EBITDA with leverage declining to less than 3.0x As part of the transaction, Teledyne has arranged a $4.5 billion 364-day credit commitment to fund the transaction and refinance certain existing debt. Teledyne expects to fund the transaction with permanent financing prior to closing. Net leverage at closing is expected to be approximately 4.0x adjusted pro forma EBITDA with leverage declining to less than 3.0x. Different semiconductor technologies Teledyne expects the acquisition to be immediately accretive to earnings, excluding transaction costs and intangible asset amortisation, and accretive to GAAP earnings in the first full calendar year following the acquisition. “At the core of both our companies is proprietary sensor technologies. Our business models are also similar: we each provide sensors, cameras and sensor systems to our customers. However, our technologies and products are uniquely complementary with minimal overlap, having imaging sensors based on different semiconductor technologies for different wavelengths,” said Robert Mehrabian, Executive Chairman of Teledyne. Multiple sensing technologies “For two decades, Teledyne has demonstrated its ability to compound earnings and cash flow consistently and predictably. Together with FLIR and an optimized capital structure, I am confident we shall continue delivering superior returns to our stockholders.” We could not be more excited to join forces with Teledyne through this value-creating transaction" “FLIR’s commitment to innovation spanning multiple sensing technologies has allowed our company to grow into the multi-billion-dollar company it is today,” said Earl Lewis, Chairman of FLIR. “With our new partner’s platform of complementary technologies, we will be able to continue this trajectory, providing our employees, customers and stockholders even more exciting momentum for growth. Our Board fully supports this transaction, which delivers immediate value and the opportunity to participate in the upside potential of the combined company.” Global customer base Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction. Together, we will offer a uniquely complementary end-to-end portfolio of sensory technologies for all key domains and applications across a well-balanced, global customer base." "We are pleased to be partnering with an organization that shares our focus on continuous innovation and operational excellence, and we look forward to working closely with the Teledyne team as we bring our two companies together to capitalize on the important opportunities ahead.” Approvals and timing Teledyne announced improved preliminary financial results for the fourth quarter and full year 2020 In a separate press release issued, Teledyne announced improved preliminary financial results for the fourth quarter and full year 2020. The Teledyne press release is available on the company’s official website. FLIR noted that it expects to meet or exceed the full year fiscal 2020 guidance it provided on October 30, 2020. The transaction, which has been approved by the boards of directors of both companies, is expected to close in the middle of 2021 subject to the receipt of required regulatory approvals, including expiration or termination of the applicable waiting period under the Hart-Scott-Rodino Antitrust Improvements Act, approvals of Teledyne and FLIR stockholders and other customary closing conditions. Conference call and webcast Evercore is acting as exclusive financial advisor and McGuireWoods LLP is acting as legal advisor to Teledyne in connection with the transaction. Goldman Sachs & Co. LLC is acting as exclusive financial advisor and Hogan Lovells US LLP is acting as legal advisor to FLIR in connection with the transaction. Teledyne has entered into a 364-day senior unsecured bridge facility credit agreement with Bank of America as sole lead arranger and administrative agent. Teledyne and FLIR will host a conference call to discuss the acquisition. A live webcast of the call can be accessed at Teledyne’s website. One can connect to the website at least 15 minutes prior to the start of the call to allow adequate time for any software download that may be required. A replay will be available on the company’s website approximately three hours after the call and will be available for approximately one month.

FLIR Systems Develops Deep Learning Facemask Detection Prototype In Two Days
FLIR Systems Develops Deep Learning Facemask Detection Prototype In Two Days

Facemasks are a critical tool for fighting the spread of COVID-19 virus and are proven to be most effective when face coverings are worn universally. As stores and businesses reopen, ensuring all occupants wear a facemask is essential. However, the additional resources required to monitor patrons can further strain businesses already struggling to meet other sanitation and social distancing guidelines. Deep Learning solutions are capable of automatically detecting anyone in violation of facemask guidelines, saving employee time and ensuring safer environments. Deploying Deep Learning solutions Deep learning is a form of machine learning that uses neural networks with many ‘deep’ layers between the input and output nodes. By training a network on a large data set, a model is created that can be used to make accurate predictions based on unseen data. In this case, the network can be trained to detect not only facemasks, but if a facemask is worn correctly on a person’s face. A fully functioning deep learning system can be developed and deployed in a matter of days A fully functioning deep learning system can be developed and deployed in a matter of days. Using a FLIR Firefly DL camera, FLIR Systems’ engineers developed a system for detecting compliance and flagging users who may be in violation of PPE (Personal Protection Equipment) guidelines. Facemask detection dataset The facemask detection dataset used 2 publicly available libraries with over 1000 images to provide examples of people with, without, and incorrectly wearing facemasks in different environments. Other cameras suited for this purpose include the Blackfly S GigE. Each image in the facemask dataset was annotated with bounding boxes showing object locations and class labels indicating which faces had the mask on, which did not, and if they were worn appropriately. Deep learning developers and solution integrators can easily expand this solution to cover more complex and robust use cases for deployment in the real world. For example, the neural network can be trained to detect face shields, gowns, gloves, and other PPE within high risk/high traffic environments like hospitals and airports.

Related white papers

Hybrid Hyperconverged Systems Benefit Growing Storage and Retention Needs

Five Things To Consider For AI With Video Technology

Making Your Surveillance Cyber Secure