Artificial intelligence (AI)
News
NetApp INSIGHT, Domino Data Lab, provider of the pioneering Enterprise AI Platform trusted by the largest AI-driven companies, and NetApp, the intelligent data infrastructure company, announced a strategic collaboration to help enterprises unlock AI’s full transformative power using NetApp’s advanced hybrid file storage technology in Domino. For the first time, companies can use one platform to manage both workloads and data movement in the hybrid cloud as well as across environments—making data AI-ready anytime, anywhere and simultaneously scaling data and AI, all with the efficiency, portability, and auditability required by enterprises. AI initiatives AI’s transformational power remains elusive because enterprises compromise their AI initiatives AI’s transformational power remains elusive because enterprises compromise their AI initiatives. Data scientists and IT operate in silos where valuable resources, effort and time are spent trying to scale AI. These initiatives lack the security and efficiency to innovate at the pace business leaders expect, and fall short of governance to comply with policies and regulations. The result is increased risk, excessive costs and lost revenue opportunities. By combining enterprise data and AI management across the AI lifecycle, Domino and NetApp are opening the path for new strategies devoid of such compromises. AI training and inferencing “Enterprises cannot capture AI’s opportunity without a unified approach to data and models,” said Jonsi Stefansson, SVP and CTO, Cloud Operations at NetApp. “Intelligent data infrastructure from NetApp helps customers more easily manage their data across a hybrid cloud estate for AI training and inferencing. Our collaboration with Domino allows organizations with a single advanced, unified AI and data stack to scale AI innovation easily, quickly, safely and responsibly across the world’s largest clouds.” Hybrid data and AI operations The two companies will co-develop a joint capability streamlining hybrid data and AI operations The two companies will co-develop a joint capability streamlining hybrid data and AI operations – allowing data scientists using Domino to provision and share high-performance storage volumes across cloud and on-premises environments with a single click. Powered by NetApp ONTAP and BlueXP™, the integration will offer industry-pioneering snapshotting, caching, and synchronization features, ensuring full data traceability and model reproducibility—a critical requirement for preserving audit trails and meeting regulatory compliance. Secure data management With seamless access to data, AI developers can innovate on models faster while simultaneously satisfying IT needs for secure data management. “AI innovation stalls when teams must balance it with technical complexity and governance," said Nick Elprin, co-founder and CEO of Domino. “Together with NetApp, we're smashing these barriers, helping our customers unleash AI's full potential immediately.” Cloud-based initiatives "Enterprises have invested heavily in big data, analytics, and cloud-based initiatives over the past decade, yet many still struggle to unlock the full potential of AI,” said Howard Dresner, founder and chief research officer at Dresner Advisory. “Cohesive methods for orchestrating models across any infrastructure and governing data precisely is key for responsible and efficient AI deployment.” AI model development lifecycle The joint Domino and NetApp solution also eliminates the need to choose between velocity and enterprise readiness, innovation and risk management, or value and return on investment (ROI) of AI initiatives. It does this by creating a common operating environment across all data and models, integration with the world’s largest clouds, and a common control plane – coupled tightly with the AI model development lifecycle to streamline the AI and data lifecycle. This allows enterprises to: Scale AI and data simultaneously across any infrastructure. Costly data movements or delays impede data, infrastructure, and tool orchestration. Efficient data movement and replication, powered by NetApp ONTAP, makes that data instantly and securely available at scale on the infrastructure where it’s needed for training and inferencing of models, with full resilience and security. Teams can co-locate data, infrastructure, and AI tooling with seamless cloud bursting to accelerate AI projects, ensure compliance with data sovereignty regulations, and drive cost-efficient cloud or repatriation strategies. End-to-end AI and data governance to trust AI at enterprise scale. Joint governance capabilities enable full traceability, reproducibility, and auditability of all data, including metadata and artifacts. Domino captures this data from users and systems, while NetApp ONTAP’s efficient snapshotting capabilities ensure full data provenance via immutable dataset copies, visibility on policy compliance, and enable audits without disrupting the AI lifecycle. This unprecedented governance scope spanning AI and data saves time lost to forensics, compliance assessments, and risk mitigation. Put enterprise data at the fingertips of data scientists and AI builders. NetApp’s innovative Data Explorer will power an unprecedented abstraction of underlying infrastructure allowing data scientists to directly search and access available enterprise data anytime, anywhere without delay as they build models and processes. This shrinks AI project timelines and prevents the need for data engineering. Amazon FSx for NetApp’s ONTAP The collaboration’s foundational capability, Domino Cloud running on Amazon FSx for NetApp’s ONTAP, is available, offering customers: Curation and sharing of robust, versioned data resources allowing data scientists to collaboratively iterate on model development faster, with write speeds improved by 417% and read speeds by 94% – reducing data loading times, training delays, and retrieval-augmented generation (RAG) inefficiencies—maximising the return on AI projects and infrastructure investments. Efficient migration of data between on-premises and cloud environments with NetApp FlexCache® technology, ensuring just-in-time availability, optimized performance, and consistent model governance across environments with Domino. Storage that grows and shrinks automatically based on needs, with integrated enterprise-grade security and no manual setup or maintenance. Availability Domino Cloud powered by Amazon FSx for NetApp ONTAP is available now on AWS Marketplace. Additional capabilities will be available in early 2025.
Absolute Security, a global pioneer in enterprise cyber resilience, announced the availability of AI Threat Insights. This new AI-powered threat detection capability is now available through the Absolute Secure Access Security Service Edge (SSE) offering. With the AI Threat Insights module activated, customers using Absolute to continuously monitor all network traffic across PC fleets can detect and act against zero-day threats, ransomware, other malware, and suspicious user, device and application behaviors. Massive investments Innovation feeds proactive alerts to help the corps expect and respond to security risks This innovation provides proactive alerts to help organizations anticipate and respond to security risks, increases productivity by reducing false positives, and reduces the attack surface by analyzing endpoint and network telemetry without having to divert traffic to the cloud. “Organizations are spending billions of dollars to defend against threats and to make sure their mobile workforces remain securely connected to their networks. Despite these massive investments, they continue to fall prey to advanced attacks, complexity, and human errors that result in catastrophic disruptions,” said Joe Savarese, Executive Vice President, Secure Access Products, Absolute Security. AI and machine learning solutions Savarese added: “Backed by AI and underpinned by the Absolute Cyber Resilience Platform, Secure Access now provides customers the ability not only to maintain the highest levels of performance and zero-trust connectivity available, but also to greatly reduce the risk of being infected with ransomware or impacted by negligent or malicious users.” The global cost of cybercrime now extends into the trillions of dollars. A single, successful data breach can inflict millions of dollars in damages. Attacks targeting endpoints are becoming more frequent. The only way organizations can manage network risk in the modern threat landscape is by leveraging resilient AI and machine learning solutions that are always up to date, protected against vulnerabilities and threats, and fully operational. AI Threat Insights Absolute Secure Access customers with AI Threat Insights not only receive optimized connectivity across their hybrid and remote PC fleets, but also critical added benefits, including the ability to: Monitor millions of network traffic flows and associated endpoint telemetry on endpoints, inside and outside of the Absolute encrypted tunnel, to detect, block, and prevent the spread of zero days, ransomware, and other malware. Monitor all traffic traversing managed endpoints to detect potential threats and suspicious activities without having to divert traffic to the cloud, improving performance, eliminating latency, and further reducing the overall attack surface. Identify suspicious activity quickly, pinpointing individual users, devices, networks, processes, and applications that may be creating high-risk situations. Speed the identification, troubleshooting, and resolution of incidents, allowing costly disruptions and downtime to be avoided. Protect business-critical data as well as customer and personally identifiable information (PII), reducing the risk of a data breach. Achieve compliance with stringent standards including PCI DSS, HIPAA, GLBA, and other regulations. Maintain maximum performance and connectivity with network resilience and persistence capabilities embedded in the device firmware, ensuring that Absolute Secure Access is always up to date, protected against vulnerabilities, and fully operational. Mobile and remote connections “Telemetry is a double-edged sword. It is critical to establishing effective defenses that can detect and stop threats and bad behaviors, but it can also lead to overwhelming false alarms that destroy productivity and lead to missed events,” said Fernando Montenegro, Senior Principal Analyst, Omdia. "With mobile and remote connections expanding, platforms that can capture data in high volumes from the edge and leverage AI to convert it into actionable information are going to be increasingly in demand.” Absolute Cyber Resilience Platform Embedded in the firmware of more than 600 million PCs, the Absolute Cyber Resilience Platform is the foundation of a modern resilience infrastructure, providing endpoint visibility and control, vulnerability and patch management, secure remote access, application resilience, rapid incident recovery, and AI-enhanced threat detection. The platform’s unique position in the endpoint firmware ensures that from the moment devices are powered on, organizations will be able to ensure that operating systems (OS), applications, and critical security controls are always up to date, protected against vulnerabilities and threats, and fully operational. Absolute AI Threat Insights is currently available to Secure Access SSE customers at no additional cost.
Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, announced it will acquire Clumio, a technology pioneer in data protection for critical cloud data in AWS. This transaction enables Commvault to leverage Clumio’s AWS offerings to provide cyber resilience to next-generation applications built on AWS. Clumio serves a wide range of customers including Atlassian, Cox Automotive, Duolingo, and LexisNexis. AI development in the cloud More and more corps are relying on Amazon S3 as their de facto storage offering More and more organizations are relying on Amazon S3 as their de facto storage offering, including for AI development in the cloud. Clumio has brought groundbreaking innovations to market in this area, including technologies that enable customers to have near-instant access to their Amazon S3 data during a time-critical recovery operation. Cyber resilience capabilities “In the event of an outage or cyberattack, rapidly getting back to business is paramount to our customers,” said Commvault CEO Sanjay Mirchandani. “Combining Commvault’s industry-pioneering cyber resilience capabilities with Clumio’s exceptional talent, technology, and AWS expertise advances our recovery offerings, strengthens our platform, and reinforces our position as a pioneering SaaS provider for cyber resilience.” Cloud-native offerings The asset acquisition is expected to close in early October 2024 and be directly accretive to ARR “At Clumio, our vision was to build a platform that could scale quickly to protect the world’s largest and most complex data sets, including data lakes, warehouses, and other business-critical data,” said Poojan Kumar, co-founder of Clumio. “Joining hands with Commvault allows us to get our cloud-native offerings to AWS customers on a global scale.” The asset acquisition is expected to close in early October 2024, and be immediately accretive to ARR and revenue, and accretive to free cash flow within the next three quarters. BofA Securities The purchase price is not material to Commvault and will be funded with cash on hand. Commvault reiterates the fiscal second quarter 2025 earnings guidance previously announced on July 30, 2024. BofA Securities served as a financial advisor and Hogan Lovells LLP served as legal counsel to Commvault in connection with the transaction.
Global Security Exchange (GSX) 2024, the annual conference of ASIS International, the world’s largest association for security management professionals, closed on day two in Orlando, FL. Concluding the afternoon of Wednesday 25 September, the event features an extensive program with more than 200 education sessions, daily keynote speakers and general sessions, and a show floor with approximately 500 leading innovators from the security industry. Prevalence of AI Tuesday’s general session featured Rana el Kaliouby, an executive fellow at Harvard Business School, co-founder of Blue Tulip Ventures, and an investor in leading AI technology. El Kalibouy discussed the increasing prevalence of artificial intelligence in lives, the opportunities that it presents, and the potential risks. She also highlighted the real-world effects and economic impact of artificial intelligence. “AI has a massive impact, adding $2.6 million to the global economy,” said el Kalibouy. Physical security in K-12 settings Kaliouby emphasized the extent of holding strong ethics when implementing AI into workplace policies Moving forward, el Kaliouby emphasized the importance of maintaining strong ethics when implementing artificial intelligence into workplace policies. The ASIS Professional Standards Board hosted a press briefing Tuesday morning featuring a panel of experts who detailed the proposed ASIS School Security Standard. The standard is a comprehensive tool, including information on program management, risk management, behavioral threat assessment management, developing operational emergency plans as well as effective approaches to managing physical security in K-12 settings. Security risk management principles “Right now, if a school wants to improve its security, it's hard to know where to start,” said Jeff Slotnick, ASIS School Security Standard Technical Committee co-chair. “There's a lot of advice out there, but it's scattered and sometimes contradictory. It's like trying to build a house without a complete set of blueprints.” “Our aim in initiating this project was to create a solid framework based on enterprise security risk management principles that will assist all schools in developing an appropriate and risk-based security program that blends leadership, risk assessment policies, procedures and practices, physical security, behavioral threat assessment and management, and emergency response principles to provide tools for those schools that they can pick up and apply effectively in their own environment,” added Drew Neckar, ASIS School Security Standard Technical Committee co-chair. Current challenges ASIS continues to share updates on the standard, which is expected to be ended in the latter half of 2025 ASIS will continue to share updates on the standard, which is expected to be completed in the latter half of 2025. The Game Changer session titled “Do You Trust Me? How to Thrive in a Mistrustful Era,” delved into how global conflicts can increase not only external threats but can also create discord within workplaces. Donna Concannon, PCI, Dean of the California School of Forensic Studies at Alliant International University and Principal at CPW Consulting Group, Inc. and Specialized Training Services, Inc., discussed with attendees how mistrust can threaten security, what current challenges are and how technology amplifies them, and how to leverage human nature to combat future mistrust. Final day of GSX The final day of GSX, on Wednesday, 25 September, will feature Military and Law Enforcement Appreciation Day (MLEAD) honoring the individuals who make our communities and world a safer place. As a thank for their service, all law enforcement, military, and first responders receive a free one-day pass to GSX 2024. Highlights of upcoming sessions Additional highlights of upcoming sessions on Wednesday include: General Session: Commander Kirk Lippold, U.S. Navy (Ret.) Game Changer: When Chaos Reigns: The Critical Role of Security in Global Crises Building Resilient Teams for Military and Law Enforcement Personnel The Business Model of Terrorism Career Mapping: Plan Your Post-Military Journey Artificial Intelligence: Harnessing Security Data for Business Outcomes
Expert commentary
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionizing traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behavior analysis. These capabilities extend far beyond simple, passive monitoring, offering organizations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognize unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analyzing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organizations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyze video feeds in real-time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organizations meet strict data privacy regulations and protect sensitive information. Customization: On-premises systems allow for greater customization of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralized management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organizations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analyzing video data in real-time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimize product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimize production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organizations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialized skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organizations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organizations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratize access to advanced AI and ML capabilities for organizations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionizing risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organizations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organization inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilizing AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localized command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centers empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centers Real-time crime centers (RTCCs) serve as centralized hubs where dedicated personnel leverage pioneering-edge technologies to analyze diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centers provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centers provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and license plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralize a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centers is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. License Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyze video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorized intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualize events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information Center (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionizing RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their locationThe proliferation of RTCCs across the United States with over 80 centers in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centers are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and license plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The center has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyze historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorized access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centers during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralized hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyze vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning are essential to ensure these centers operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centers become more prevalent, they will play an increasingly vital role in helping agencies maximize their resources and make informed decisions, ultimately contributing to safer communities for all.
Security beat
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialized flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionize indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognizing a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards, and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include maneuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centers use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety, and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorized access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralized platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimize interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimizing maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyze vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defenses against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organizational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorized access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defenses against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defenses. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardization aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardization aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasizes the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognizing the need for continuous improvement and adaptation to evolving threats. Recognizing the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognize the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defenses. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defense against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorized infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defenses of our nation’s critical infrastructure.”
Case studies
Reliable identity verification is an unwavering requirement at mission-critical checkpoints such as border crossings. Oftentimes, however, this involves slow manual processes that create a ripple effect of inefficiency and security risks. Passengers endure long wait times leading to frustration, fatigue, and dissatisfaction. Indonesia Immigration recognized this strain on travelers moving through its destinations — specifically in one of the region’s busiest locations: the international seaport at Batam Center. Batam Center is one of the most-trafficked border spots between Indonesia, Singapore and Malaysia. Approximately 500,000 people move across Batam’s five seaports each year. The challenge Extremely long wait queues for international departures and arrivals were a severe pain point for the port Extremely long wait queues for international departures and arrivals were a severe pain point for the port. The root cause was the outdated manual process of handling identity verification for the tremendous number of passengers moving through the center. People had to present their documentation papers and wait to be reviewed and verified before crossing the border. Officials sought an intuitive, contactless solution to automate border control, process passengers faster and improve the traveler experience. They also required a system with strong security measures and high performance in challenging lighting to accommodate varying traffic control and conditions. The solution Facial recognition is becoming an increasingly important tool for border security. It is fast, seamless and secure, and offers a contactless approach for identity verification. Working through Indonesia Immigration’s local system integration partner, the HID U.ARE.UTM Camera Identification System was selected as the facial recognition component for the automated border crossing (ABC) gate — or Autogate per Indonesia Immigration — installed throughout the Batam ports. Combining a self-service gate system, document reader and facial recognition camera immediately transforms border control and boosts the passenger experience. HID ATOM™ document reader HID U.ARE.U camera stands out as an edge-computing device, delivering unsurpassed face detection This intuitive passenger verification begins when an individual approaches the Autogate and places their passport on the HID ATOM™ document reader to scan the data. Once confirmed, the first gate opens, and the traveler steps forward in front of the HID U.ARE.U camera to scan their face. Once the system confirms a match between the passport photo and the passenger’s face, a second gate opens, and the visitor is on their way — all within seconds. The HID U.ARE.U camera stands out as an edge-computing device, delivering unsurpassed face detection, matching, identification and verification directly at the edge. The camera was selected based on its engineering excellence that met the project’s many requirements, including: Combined HID-patented multispectral imaging (MSI) technology with artificial intelligence (AI) to deliver impeccable performance — even in challenging lighting conditions On-device biometric processing — face detection, capture, image quality checks and liveness detection — for the highest level of performance and maximum data protection Industry-leading presentation attack detection (PAD) with passive liveness detection to prevent fraud attempts in unattended use cases (ISO 30107-3 PAD Level 1 compliance, Level 2 pending) Top NIST ranking in matching speed and accuracy Ethically trained and built AI to reduce matching bias Results People passing through the Batam Center ports engage with top-notch facial recognition technology to quickly, seamlessly and securely authenticate themselves. The Autogate system helps increase efficiency, shorten passenger wait times and enhance the traveler experience. The entire identity verification process is now accomplished in seconds, greatly improving passenger throughput and operational efficiencies. Benefits of HID U.ARE.UTM Camera Identification System. “People moving through borders really appreciate the efficiency provided by this Autogate system with facial recognition,” said Silmy Karim, Director General of Immigration in Indonesia. “Wait queues are now drastically decreased and passengers are empowered by the fast and convenient self-service process that has them on their way in a matter of seconds.” Key benefits realized by Indonesia Immigration: Shorter wait times at the checkpoints Improved passenger experience Increased operational efficiency Enhanced border security
České Budějovice is a city located in Southern Bohemia in the Czech Republic that serves as the regional capital, with important commercial and political ties, and is the seat of many large corporations. An important trans-European road, the E55, that runs from Sweden to Greece also passes through the city. Protecting the citizens and visitors of České Budějovice on the roads is extremely important, both for strengthening the tourist attractiveness of the city and for ensuring smooth travel. The city of České Budějovice (the municipality) was awarded a tender for the installation of a traffic system with more than 170 cameras. The system was to ensure the protection of road users and pedestrians. Automatic incident detection Camera models include the X series cameras-XNO-6080R, XNO-6120R, XNP-6400R and XNO-6123R The winner and supplier of the contract were Swarco Traffic Cz s.r.o. and Telmo a.s., having proposed the best solution in cooperation with distributor, Abbas, a.s. This solution included cameras from manufacturer Hanwha Vision, combined with a video management system (VMS) by Genetec and an automatic incident detection and traffic collection system from the Italian technology company, Sprinx. The solution provides continuous recording and analysis of major roads in the city. Camera models include the X series cameras - XNO-6080R, XNO-6120R, XNP-6400R, and XNO-6123R, the PNB-A9001LP 4K RoadAI camera, the multi-sensor camera PNM-9031RV, and the PNO-A9081R 4K AI bullet camera. PNO-A9081R for business intelligence The PNO-A9081R camera features 4K resolution with real-time day/night recording and integrated infrared illumination up to 30 meters away, enabling continuous outdoor surveillance. Edge AI in the camera provides accurate AI object detection and classification as well as valuable business intelligence including people, vehicle, and heatmap analytics within pre-defined areas. This solution improves the accuracy of object detection and alerts, reducing time-consuming false alarms caused by wildlife, waving trees, and shadows. PNB-A9001LP for efficient traffic management The camera is ideal for monitoring busy urban traffic and covers up to two lanes at speeds up to 100 km/h The PNB-A9001LP, 4K RoadAI camera is a comprehensive traffic monitoring solution with pre-installed and licensed ANPR, Make/Model and Color Recognition (MMCR), and vehicle classification analysis. The camera is ideal for monitoring busy urban traffic and covers up to two lanes at speeds up to 100 km/h. Edge AI provides valuable insights and reduces false alarms, with analysis performed within the device itself to reduce server requirements and save energy and costs. In addition, the camera is equipped with a license plate list management function, while the camera output can be connected to an access control system, helping operators manage parking lots and toll roads. PNM-9031RV for panoramic view The PNM-9031RV outdoor multi-sensor IP camera is equipped with four 5MP sensors and a 192° panoramic view that covers wide areas. Each sensor can also be remotely adjusted with pan and tilt capabilities. Operators can transmit surveillance footage through four separate channels or as a linked panoramic view. Artificial intelligence for faster responses MKDS project was funded by the Transport Infrastructure Fund and a grant from the European Union AI-powered features enable better situational awareness, supporting faster responses to emergencies such as accidents or stopped vehicles, evidence for investigations, and detailed insights for future city planning. This includes vehicle counting and classification, which can be used to inform road management and parking. Meanwhile, the detection of stopped vehicles and congestion means that operators can take appropriate action when necessary, such as opening new routes and rerouting vehicles to keep traffic flowing in the city. The MKDS project was funded by the Transport Infrastructure Fund and has a contribution from the European Union. Monitoring and analytical features Ing. Zuzana Trousilová, Deputy Director for Internal Affairs and Methodology from the Municipal Police of České Budějovice, said: "When it comes to monitoring and ensuring safety on the roads of our city, Hanwha Vision cameras fully meet the specified requirements for camera parameters and are compatible with the integration needs of the operational software applications." With its monitoring and analytical features, the video surveillance system provides the city with vital information for solving traffic and safety issues in the municipal area of České Budějovice.
One of Indonesia’s shopping mall operators, Agung Sedayu Realestat Indonesia (ASRI), is using the latest AI video technology from IDIS to boost profitability and growth. Agung Sedayu Realestat Indonesia ASRI is a subsidiary of the Agung Sedayu Group and operates five shopping and leisure complexes in Jakarta, four residential developments, and three office towers. To improve safety and security across this estate and boost operational efficiency, the company has adopted an end-to-end IDIS video solution that includes highly accurate people counting analysis integrated with ASRI’s centralized database. Surveillance coverage expansion The upgrade integrates legacy third-party cameras to reduce costs and waste while expanding surveillance The upgrade also integrates legacy third-party cameras to reduce costs and waste while expanding surveillance coverage of internal and external areas with the latest high-performance IDIS HD cameras, eliminating blind spots. The contract was awarded to IDIS integration partner PT Mandiri Cipta Integrasi (MCI) following a price-competitive bid and proof of concept demonstration. Intuitive controls The upgraded solution comprises over 250 IDIS 5MP bullet and dome cameras, delivering forensic image capture in all lighting conditions. It also includes intuitive controls for monitoring and managing surveillance operations across all five malls using a third-party video wall from ASRI’s control room. IDIS AI-in-the-Box for retail devices The flexible 4-channel add-on devices deliver actionable insights and make it easy to scale up the power People counting and options to use heat maps, queue management, and occupancy monitoring are provided by fifteen strategically deployed cameras connected to IDIS AI-in-the-Box for Retail devices. These flexible 4-channel add-on devices deliver actionable insights and make it easy to scale up the power of surveillance systems without license fees or the need for costly retail analytics software. IDIS NVR system The video footage and analytics data are stored on eight robust IDIS 64-channel DR-8564 NVRs, which support RAID 5 with eight hot-swappable 10TB HDDs for rapid and efficient maintenance. The IDIS NVR system provides two months of storage, while ASRI backs up data for an additional month, using its own NAS devices to easily and cost-effectively meet the extended three-month retention requirement. Log collector software ASRI and its retail partners improve their consumer offerings and make more informed decisions IDIS also developed log collector software tailored for the project and provided it cost-free to support seamless integration of people counting data from the NVRs to ASRI’s third-party relational database. ASRI Innovation Sales Manager, Roy Wahana, says understanding and measuring customer behaviors and preferences will help ASRI and its retail partners improve their consumer offerings and make more informed decisions about marketing, resource allocation, and business investments. IDIS Solution Suite's flexibility “As we invest in our offering of high-end retail, leisure, residential, and lifestyle venues for discerning consumers, IDIS technology gives us the most dependable, powerful, and sustainable platform for video monitoring and storage." "Our new video infrastructure supports safety, security, and better decision-making across all our malls.” IDIS MEA & Asia Senior Sales Manager, Alex Lee, adds that the IDIS Solution Suite's scalability also ensures future-proofing and flexibility. Video surveillance platform “For the project's next phase, our flexible video surveillance platform will make it easy for ASRI to integrate AI-powered facial recognition software and store video data with a local cloud storage provider." "This will enable even more flexibility in how authorized personnel access and manage footage and analytics data.”
Achat Hotel in Bochum, Germany offers comprehensive meeting and conference services, including both accommodation and catering. Due to the ever-increasing demand for interactive meeting amenities, the hotel chose and implemented the Dahua DeepHub Business Solution, providing integrated AI-powered conference and meeting capabilities for its guests. Challenge The 5 flexible and combinable meeting rooms of the Achat Hotel in Bochum can accommodate various types of events, creating a high demand for these facilities. In order to be able to successfully hold forward-thinking events in the digitalized era, such as hybrid events that integrate both in-person and online participants, the hotel needs a modern and user-friendly digital conference solution. Solution "With DeepHub from Dahua, we have found the exact solution," explains Jorge Melendez, Sales Manager at Achat Hotels, adding "We installed a 98-inch DeepHub in our largest conference room. DeepHub impressed us above all with its ease of use. It has both a Windows and an Android interface, so our guests who are familiar with computers or smartphones can use it intuitively straight away. With online sharing and connection via a dongle, our guests don't need to download any software." He continues, "Meetings start faster and participants can focus on the essentials. The 98-inch DeepHub is large and bright enough. In a conference room for 80 people, everyone can see everything clearly without the need to darken the room. The wireless connection makes setting up a meeting incredibly easy. The handwriting function is also excellent – converting handwriting to printed text without any delay in writing is extremely useful." Latest DeepHub Meeting software Nina De Rosa, Director of Achat Hotel in Bochum, said: "The built-in camera makes it easy to make video calls via platforms such as Teams and Zoom. The integrated speakers are of high quality and do not generate background noise. The latest DeepHub Meeting software is very popular with our guests. Especially for those who organize seminars and workshops in our hotel, DeepHub Meeting is extremely convenient." She adds, "It is not only an optimized online conference software, but also offers a variety of practical tools for teamwork, discussions and brainstorming. Online participants can also use the free DeepHub Meeting app to take part in the on-site seminar and get actively involved." Results The Dahua DeepHub Business Meeting Solution has elevated the conference rooms, event venues, and other facilities of the Achat Hotel in Bochum, taking it to the next level. It not only changed the way the hotel holds meetings, but also significantly enhanced the experience and satisfaction of their guests. Markuz Metz, Technician at Achat Hotel in Bochum, said, "Dahua provides robust and easy-to-move stands with wheels for each DeepHub. We have just purchased a second 86-inch DeepHub. During the European Championship soccer season, we were able to move the DeepHub onto the terrace in the evening so that our guests could watch soccer matches together." He adds, "And the same device is used for workshops and seminars during the day. We can even set up the DeepHub in the bar. It's not just a screen, but also an interactive platform that offers our guests many entertainment options."
Round table discussion
Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lost revenue or hidden costs of energy consumption and environmental consequences can also impact the measure of TCO. Costs of training, integration, support, and scalability can also be examined. Considering the security industry impact of TCO, we asked this week's Expert Panel Roundtable: How does/should total cost of ownership (TCO) impact the decision-making process when choosing technologies for security?
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. However, in the end, overlooking critical factors can undermine the totality of system performance. We asked this week's Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organizations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimize the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Products
White papers
The Role Of Artificial Intelligence To Transform Video Imaging
DownloadTotal Cost of Ownership for Video Surveillance
Download5 Surprising Findings From OT Vulnerability Assessments
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadIntegrating IT & Physical Security Teams
DownloadTop 7 Trends To Watch In The Physical Security Industry
Download2024 Trends In Video Surveillance
DownloadHow Intelligent Video Is Transforming Banking And Financial Institutions
DownloadSecuring Data Centers: Varied Technologies And Exacting Demands
DownloadThe Real Cost Of An Outdated Video Security System
Download5 Easy Steps To An Upgraded Video Surveillance System
DownloadAI In Security Solution
DownloadVSS - Top 4 Questions To Get You Started
DownloadWhy SAAS Security Platform Is More Popular In American SMEs
Download3 Ways AI Can Improve Safety And Reduce Compliance Costs
Download