3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces immediate availability for the company’s new VIGIL Client Lite software for Mac users.
3xLOGIC’s newest software offering fulfills customer requests to produce a lite version of VIGIL Client for Mac users that provides the basic functionality of the PC version of VIGIL Client. “This application opens up a yet untapped segment of our customer base who use Apple products, particularly in the education vertical,” said Michael Poe, 3xLOGIC Product Manager.
3xLOGIC PC-Based VIGIL Client Features
VIGIL Central Management (VCM) Support – VCM users can easily populate and load managed VIGIL Servers
VIGIL Client Lite for Mac supports many of the features of the 3xLOGIC PC-based VIGIL Client, including:
View live streams for up to 36 cameras across multiple VIGIL servers
Use VIGIL Connect or Direct IP to connect to multiple VIGIL servers or standalone cameras
Digital Pan, Tilt, and Zoom support through the Live View window
Instant playback to quickly view the last 5 minutes of video
Search playback based on date and time
Export Jpeg snapshots or MP4 videos
Smart Search support
VIGIL Central Management (VCM) Support – VCM users can easily populate and load managed VIGIL Servers
Significant Performance Boost
Running VIGIL Client Lite natively on the Mac OS should be a significant performance boost while maintaining the look and feel
“This is an important addition to our software library,” commented Bills Hobbs, National Director of Sales for 3xLOGIC. “The education vertical market is large and growing, we’ve had good success with education customers, and now we’re set to gain even more education market share by supporting popular Apple technology.”
Running VIGIL Client Lite natively on the Mac OS should be a significant performance boost while maintaining the look and feel Apple users have always enjoyed, thus bringing the power and flexibility Windows users have had to the Mac user as well. Version 1.0 of the Mac Client provides the building blocks of future versions that will offer additional functionality as the software evolves.
The second day of Global Security Exchange (GSX), the security industry’s flagship event, was jam-packed with security professionals eager to get first-hand exposure to exhibitors and vendors offering innovative solutions that solve traditional everyday security issues as well as deliver emerging technologies to solve problems of the future, such as AI, blockchain and AR/VR.
Security Education And Insights
GSX provides an outstanding opportunity for our members to gain education and insights about current security trends and threats"
“GSX provides an outstanding opportunity for our members to gain education and insights about current security trends and threats, and also to see all the greatest and newest technologies out there on the expo floor,” said Kimberly Pratt, executive director of InfraGard National. “We hope ASIS members will come check out our booth and learn more about what InfraGard has to offer."
“Today’s show exceeded our expectations based on the quality prospects who provided good conversations about our solutions,” said Paul Baratta, Business Development Manager, Axis Communications, Inc.; and ASIS Boston Chapter Treasurer; and member of the ASIS Healthcare Advisory Council. “It was overall a very successful day and I personally fully enjoyed the new X Stages as they provided more insight into the industry and the impact technologies are making today as well as how they will shape future engagements with our customers. We’re looking forward to the remainder of GSX!”
Counter-UAV Defense Systems
In the morning keynote, delivered by Scott Klososky, Founder and Principal of TriCorps Technologies, he addressed how the industry can leverage technology to solve challenges. Attendees were then released onto the GSX show floor featuring three new stages, including the X Stage, where they heard about revolutionary technologies poised to disrupt the industry first-hand. There was a standing-room only, live streamed school security panel as well as on-the-show floor demos showcasing the use of drones, droids and counter-UAV defense systems. Fortem Technologies, an innovative provider of AI-enabled airspace security and safety, conducted three drone shoot downs throughout the day, which has never happened on a security show floor to date.
Prior to the doors opening, we saw a lot excitement about what new and exciting initiatives ASIS was bringing this year"
“It has been an important show for us to be at over the years, and this year is no different. We’re seeing more convergence and integration of technology as well as partnerships, which aligns with our mission at the show,” said Eric Widlitz, Vice President of North America Sales, Vanderbilt Industries. “Prior to the doors opening, we saw a lot excitement about what new and exciting initiatives ASIS was bringing this year.”
Career Guide For Security Professionals
This afternoon ASIS and the Security Industry Association (SIA) unveiled the rollout of the Career Pathways Guide in the GSX Career HQ. This new career guide provides a first of its kind review of core competencies that are needed at every stage of a security professional’s career.
“Now that the first day of the Expo Hall has closed, it is evident from the standing-room only theaters and shoulder-to-shoulder packed aisles, that the industry has fully embraced the new show format and features,” said Richard E. Chase, CPP, PCI, PSP, President of ASIS International.
ExtraHop, global provider of analytics for security and performance management, has announced the availability of Reveal(x) for Microsoft Azure. With Reveal(x) for Microsoft Azure, enterprise security and cloud operations teams now have enterprise-grade network traffic analysis (NTA) that uses advanced machine learning to instantly surface high-risk threats and automate response across the entire hybrid enterprise. With this latest release, Reveal(x) is also available for remote site deployments, extending visibility from the data center to the branch office to the cloud.
Reveal(x) Network Traffic Analysis (NTA) Solution
Reveal(x) for Microsoft Azure is available immediately in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure.
While cloud platforms offer incredible scale and agility, they also expand the enterprise attack surface, creating new opportunities for malicious actors to exploit misconfigurations, access sensitive data, and compromise applications. Reveal(x) for Microsoft Azure provides an enterprise-grade NTA solution that delivers threat detection and investigation purpose-built for the cloud, extending the visibility and response capabilities of the enterprise security operations center (SOC) to encompass cloud infrastructure. Reveal(x) automatically discovers and classifies everything traversing the Azure environment, including rogue compute instances, to deliver complete real-time visibility at cloud scale. That data is correlated with event data from Azure Security Center to create a unified analytics and investigation source for SOC teams that provides always-on, always-everywhere visibility across the hybrid attack surface.
Microsoft Azure Virtual Network Tap (Azure vTAP) The Reveal(x) network traffic analysis platform integrates with the Microsoft Azure Virtual Network Tap to analyze cloud-based application payloads at scale
The Reveal(x) network traffic analysis platform integrates with the Microsoft Azure Virtual Network Tap to analyze cloud-based application payloads at scale. Announced at Microsoft Ignite, the Azure Virtual Network Tap (Azure vTAP) is the industry’s first virtual network tap offered by a public cloud provider that enables out-of-band monitoring of all network traffic. ExtraHop has partnered with Microsoft Azure to natively integrate Reveal(x) with the Azure Virtual Network Tap to deliver a completely passive, agentless approach to network traffic analysis in the cloud.
With the introduction of Reveal(x) for Microsoft Azure, enterprises can effectively address shared responsibility models and prioritize use of security resources based on critical assets and risk, delivering complete visibility across each dimension of enterprise responsibility including:
Applications & Content: Integration with Azure Security Center events enriches network-based threat detection with system-level activity (disabled logging, suspicious processes, suspect file execution), while real-time TLS 1.3 decode and transaction payload analysis spots threats and evaluates risk, even within PFS deployments.
Inventory & Configuration: Automatic discovery and classification of all cloud assets gives cloud and security teams up-to-the-second understanding of the attack surface, including the ability to track rogue instances – even when logging is disabled - and instantly flag exposed resources.
Data Access: Full support for Azure SQL Database and Azure Blob Storage protocols means visibility into behavior, not just activity, while machine learning at the application layer provides immediate detection of exfiltration activity.
Identity & Access Management: Integration with Azure Activity Monitoring allows granular tracking of privilege manipulation, while analysis and machine learning performed on Microsoft Active Directory payloads surfaces and flags suspicious behavior like credential harvesting and brute force login attempts.
Network Traffic Access From The Cloud
The Microsoft Azure Virtual Network Tap is the first of its kind, allowing us to access network traffic from the cloud"“The Microsoft Azure Virtual Network Tap is the first of its kind, allowing us to access network traffic from the cloud as easily and passively as we do from our data center,” said Daniel Howard, VP of Information Technology at International Cruise & Excursions. “This integration immediately transforms that data into a powerful source of threat detection and investigation. We now have the power to secure our cloud workloads exactly as we do our on-premises applications.”
“The enterprise attack surface is no longer confined to the data center. Enterprise IT assets exist everywhere the enterprise operates, from the branch office to the data center or the cloud," said Jesse Rothstein, CTO and co-founder, ExtraHop. "With Reveal(x) for Microsoft Azure, we're enabling SecOps to detect and investigate threats across the entire hybrid enterprise while focusing on the most critical assets first so business functions can continue uninterrupted and customer data remains protected.”
Threat Analysis And Incident Management
Adwait Joshi, Director, Product Marketing, Azure Security, Microsoft Corp. said, "ExtraHop Reveal(x) offers comprehensive threat visibility across the hybrid enterprise allowing SecOps teams to detect threats immediately and act decisively to eliminate them. The solution works with Microsoft Azure, enabling monitoring and incident response from cloud infrastructure to the data center.”
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive.
Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door.
A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals
Providing A Lightweight Alternative
“When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel.
“Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent.
“Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software
Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options.
There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company.
Modern Network Infrastructure
NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.”
FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location
NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT.
We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair.
There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs?
Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters.
The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs.
A New Focus Away From AI
Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available.
For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear.
To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications.
The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location.
Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel.
On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved
That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
According to Save The Rhino statistics, over 1000 rhinos are killed annually in South Africa. These harrowing poaching statistics display a gloomy future for survival of this beautiful species. While many attempts have been undertaken over the past ten years to combat the devastating results of poaching, the country has not yet seen a steady decline in numbers year-on-year.
It is with this knowledge that AxxonSoft’s Global Marketing Director, Colleen Glaeser, who is based in South Africa, decided to create a strategical and proactive anti-poaching approach, utilising the tools at her disposal, assisting a country in dire need of assistance. While Deep Learning, using Artificial Intelligence and neural network analytics in its algorithm, is not new to the security and surveillance industry, Colleen and the team at AxxonSoft global took the technology a step further, developing and implementing the software to help differentiate between humans and animals.
Identifying Actual Poaching Threats
AxxonSoft’s surveillance software, which leverages Artificial Intelligence and Deep Learning technology now alerts the operators in the control room to an immediate poaching threat
The implementation of this technology in game reserves and parks across South Africa has certainly been a game-changer regarding the war against poaching. For two reasons namely; this neural network solution can identify actual poaching threats (distinguishing poachers from their prey) while providing a proactive surveillance solution as opposed to a reactive one.
Predominately utilised for face and license plate recognition, Deep Learning technology has never been adapted to tell the difference between humans and animals. Prior to the incorporation of Deep Learning in anti-poaching surveillance, software often failed control rooms and response units in that false alarms were on many occasions, set off by animals, insects and weather.
Control rooms were not able to tell the difference between an actual threat and a false alarm, which often resulted in exhausting resources as teams were dispatched for animals who had touched the fence while grazing in their natural habitat. AxxonSoft’s leading surveillance software, which leverages Artificial Intelligence and Deep Learning technology now alerts the operators in the control room to an immediate poaching threat as poachers try and breach the fence perimeter to enter the reserve or park.
Proactive Surveillance Solution
AxxonSoft’s Deep Learning technology provides a proactive solution to surveillance whereas previous systems were somewhat archaic and reactive in their response to real threats
Global Marketing Director for AxxonSoft, Colleen Glaeser says, “Our Deep Learning technology has been extremely successful thus far in telling the difference between animals and humans as the neural network algorithm can identify, through certain indicators, whether a human or animal has set off the alarm. If the software detects a human, the operations team is immediately notified and a dispatch team is sent to the scene in question.”
Furthermore, AxxonSoft’s Deep Learning technology provides a proactive solution to surveillance whereas previous systems were somewhat archaic and reactive in their response to real threats. Due to expansive terrain and limited resources, rangers and antipoaching units often get to the scene of the crime too late.
With the AxxonSoft technology, as soon as the breach occurs, cameras will identify if the breach has been caused by an animal or human, and the control room is immediately notified as to where the occurrence has taken place in the reserve or park. The dispatch team is given the necessary information and they head to the site where the occurrence has taken place.
Real-Time Identification Of Threats
By utilising this technology, we have been able to take a proactive approach, identifying the threat in a real time situation"
The beauty about Deep Learning and Neural Network analysis is in its ability to learn and understand the conditions which lead up to an event, and that ultimately allows us to prepare for threats or potential breaches when the known conditions are met. “AxxonSoft’s technology has proved very successful in preventing killings as the team is able to get to the scene of the crime quickly.
“By utilising this technology, we have been able to take a proactive approach, identifying the threat in a real time situation. The AxxonSoft team and I really believe this anti-poaching solution can aid in the war against poaching and drastically bring down the upsetting statistics. I can attest to the fact that we have seen great success in curbing poaching,” concludes Glaeser.
As an innovator in airport security, Oakland International Airport (OAK) announced that it has installed the Evolv Edge, a physical threat detection and prevention system powered by artificial intelligence, to streamline its employee screening program. This installation enhances OAK’s security posture by protecting against metallic and non-metallic threats while simultaneously improving operational efficiency.
Physical Threat Detection System OAK is committed to applying advanced, innovative solutions to complex security operations
OAK is committed to applying advanced, innovative solutions to complex security operations. The TSA acknowledged this commitment by selecting OAK as a TSA Innovation Site, a prestigious distinction that promotes improved efficiency and allows the airport to try technologies to benefit its growing passenger and employee base.
As the second busiest airport in northern California, passenger travel at OAK is on pace to surpass the 13.2 million travelers that passed through the airport last year. To accommodate this growth, more and more employees are being hired to work at OAK. Therefore, OAK began researching innovative solutions related to employee inspection methods and equipment. Evolv Edge provides OAK with the ability to screen employees for metallic and non-metallic threats with a fast, non-invasive process. Designed with built-in wheels for portability, OAK can easily move the system throughout the airport allowing maximum efficiency for its employee inspection program.
Non-Invasive Employee Screening With Edge, organizations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience
With this installation, OAK continues to be at the forefront of security through its use of modern technologies to combat today’s evolving threat landscape. By replacing traditional physical screenings with Evolv Edge’s precision, mobility and multi-threat detection capabilities, OAK can control access and respond to different threat scenarios quickly and efficiently. With Edge, organizations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience.
“With today’s threat landscape, the security perimeter has expanded beyond traditional checkpoints,” said Mike Ellenbogen, CEO of Evolv Technology and a 20-year veteran in aviation security. “Evolv Edge’s flexibility and portability provides Oakland International Airport with an added layer of security when it comes to employee screening. Oakland International Airport is always at the forefront of innovation, and we will continue working closely with their team to ensure success and safety.”
It was over a century ago that Charlotte Hungerford Hospital (CHH) was founded, as a gift by industrialist Uri T. Hungerford. The vision was to create a community hospital that would serve as a beacon of hope and a place of comfort for the sick and injured.
100 years later, that same community spirit has helped CHH evolve into a vibrant, independent, affordable healthcare network that delivers a comprehensive range of healthcare programs and services for over 100,000 lives in Northwestern Connecticut.
A Challenging Safety Diagnosis
Avigilon has made us more efficient as we don’t have to spend much time sifting through large amounts of video”
Charlotte Hungerford Hospital prides itself on supporting patient and staff safety in all hospital areas and locations. Several years ago, they found themselves with an outdated security system that lacked quality video coverage and recording capabilities. CHH struggled with reliable video playback and faced frequent system crashes.
As a result, the hospital’s security operators were often unable to provide accurate evidence during forensic investigations and many liability claims and hospital incidents went unresolved.
CHH needed a cost-effective, comprehensive security solution that could protect patients and staff across multiple locations while still being flexible enough to scale with the hospital’s growing needs.
Avigilon AI & Analytics Technology
With a desire to improve its legacy surveillance system, CHH looked to Avigilon’s advanced artificial intelligence (AI) technology and video analytics to meet their security needs. CHH began a multi-phase upgrade that included installing over 100 Avigilon cameras with self-learning video analytics, deploying AI-based Avigilon Appearance Search technology and using impulse radar technology with the Avigilon Presence Detector (APD) Sensor.
Avigilon Appearance Search technology – a sophisticated deep learning AI search engine – helps CHH quickly locate a specific person or vehicle of interest across all cameras both inside the hospital and care centers as well as outside parking lots. This technology provides CHH’s operators with enhanced situational awareness, enabling fast event response and helping to save time and effort during critical investigations.
To protect areas of the hospital where cameras cannot be installed, CHH installed the Avigilon Presence Detector (APD), a discreet impulse radar device with self-learning radar analytics that scans, learns, and continuously adapts to its environment.
Avigilon Presence Detector Sensors
Our Security Department’s mission at Charlotte Hungerford Hospital is the safety of our patients, visitors, and employees"
Capable of detecting persons who aren’t moving or are hidden, the APD sensors help improve situational awareness for CHH staff, and are used in areas where cameras are not permitted, such as restrooms or change rooms. When integrated with Avigilon Control Center (ACC) video management software, APD sensors alert CHH operators of human presence while still maintaining privacy.
Avigilon H4 cameras were used throughout the hospital to provide exceptional image quality and built-in self-learning video analytics, which provides accurate detection and notification of movement of people and vehicles.
CHH also deployed HD Multi-sensor cameras which provide up to four camera views per camera installation, using only one camera license and network drop. This allows CHH’s staff to efficiently cover all angles in order to detect, verify, and act on potential security events across the hospital’s premises.
Avigilon H4 and HD Multi-Sensor Cameras
At the core of CHH is a desire to help the community and still serve as the beacon of compassion it was founded to be 100 years ago. With these values in mind, the hospital’s mission when it comes to security is the safety of patients, visitors, and employees.
Avigilon’s AI solutions have helped achieve this by moving the CHH system from legacy to advanced and providing effective monitoring around the clock while also helping to create operational efficiencies. Since deploying ACC software, CHH’s operators spend significantly less time reviewing recorded video, allowing them to focus on proactive event response.
Working with Avigilon, Charlotte Hungerford Hospital has a roadmap for continued growth and exceptional patient safety.
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organizations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees.
To help enhance safety Search Technology at more than 100 schools, Fulton has installed a full Avigilon surveillance solution that includes Avigilon cameras with self-learning video analytics, Avigilon network video recorders, and Avigilon Control Center (ACC) video management software with Avigilon Appearance Search technology. Fulton is also deploying Avigilon Access Control Manager to secure physical access points, providing an integrated security solution for the district.
Fulton sought to replace analog cameras with an end-to-end high definition surveillance system camera system in order to maximize protection
Simplifying Recording And Capturing Of Footage
Fulton sought to replace analog cameras with an end-to-end high definition surveillance system camera system in order to maximize protection, enable proactive event response, and facilitate the recording, capturing and sharing of clear footage with its school board, police and the concerned public.
Securing more than 100 buildings is no easy feat, but it’s of utmost importance to the Department of Safety and Security at Fulton, which also includes the School Police and Student Health Services and Emergency.
Upgrading Video Surveillance System
With recent data showing above average student incident rates and student disciplinary concerns at some schools, upgrades to the surveillance system were needed to allow better local and remote monitoring in important areas.
“One of the biggest security challenges we face is our ability to reliably monitor important areas throughout our schools, especially during an emergency. With Avigilon, we not only benefit from exceptional image quality, but their advanced video analytics, like Avigilon Appearance Search technology, save us valuable time and effort, ultimately making our schools a safer place.” - Paul Hildreth, Emergency Operations, Safety and Security, Fulton County School System.
Avigilon high-definition cameras with self-learning video analytics and access control solutions have been installed in 101 schools
Appearance Search Technology
Avigilon high-definition cameras with self-learning video analytics and access control solutions have been installed in 101 schools. ACC 6 video management software with Avigilon Appearance Search technology is a particularly exciting new development for the district.
“We chose Avigilon because of the capabilities it offers in its advanced video analytics search technologies, including Avigilon Appearance Search,” said Paul Hildreth, Emergency Operations, Safety and Security for Fulton. “Their analytics are easy to set up and use, and can save us valuable time and effort, ultimately making our schools a safer place for generations to come.”
Video Data Analysis
Avigilon Appearance Search video analytics technology uses a sophisticated deep learning artificial intelligence search engine to sort through hours of footage with ease. This technology allows Fulton’s operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently. This can save Fulton time and effort during critical investigations as Avigilon Appearance Search technology intelligently analyses video data, helping to track a person’s or vehicle’s route and identify previous and last-known locations.
Avigilon self-learning video analytics enable proactive, real-time event response. Built from the ground up to manage high-definition video, Avigilon offers self-learning analytics on camera resolutions of up to 5K (16 MP).
Avigilon Multisensor cameras were also set up to capture challenging angles and provide total coverage within a 180 to 360-degree area
Avigilon H4 Platform
Avigilon H4 bullet and dome cameras from the new H4 platform were installed, offering self-learning video analytics, greater resolution performance and Wide Dynamic Range support. Avigilon H4 cameras are available in 1 to 5 MP and 4K Ultra HD (8 MP) resolutions. Avigilon Multisensor cameras were also set up to capture challenging angles and provide total coverage within a 180 to 360-degree area.
Upgrading the district’s surveillance solutions began three years ago with a single high school as a pilot program. The success of this replacement led the district to integrate ACC in other school projects and, in 2014, Fulton opened new administrative centers with both Avigilon access control and video surveillance solutions. At the start of 2017, Fulton began implementing a three-year approach to completing the upgrade.
Image Quality And Resolution
Before switching to the Avigilon solution, the district was challenged with low system reliability, which resulted in not having video evidence when needed. Furthermore, in situations where there was recorded footage, it was not of high enough quality to provide value. With the installation of Avigilon video surveillance, Fulton has benefited from exceptional image quality and resolution across wide areas in all lighting conditions.
The ongoing Avigilon implementation will provide the district with crucial and powerful insights that can help save time and effort during critical investigations. With the help of Avigilon trusted security solutions, the future looks bright for Fulton County Schools.
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analyzing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realize its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?