IDIS, a global security company that designs, develops and manufactures surveillance solutions for a wide range of commercial and public sector markets, has announced that the company is proud to be participating in the Global Security Exchange Plus (GSX+) virtual exhibit.
Global Security Exchange Plus
While most of the industry trade shows have had to opt for online experiences, GSX+ promises to deliver the high caliber of expertise, influence, and resources synonymous with this flagship ASIS International event.
Attendees will want to check out the raft of new technologies that IDIS is launching at GSX+
Attendees will want to check out the raft of new technologies that IDIS is launching at GSX+. It is positioned to transform control room and security operations with greater situational awareness, faster investigations, and an enhanced user experience.
IDIS video technology
IDIS’ newest video technology will support a safe return-to-workplace (RTW) set of strategies that, when combined, continue to deliver on the IDIS promise of a low Total Cost of Ownership.
Among the major IDIS technology and solutions on view at GSX+ include:
Next generation IDIS Deep Learning Analytics with AI-assisted notifications for object, loitering and fall detection, as well as tools that leverage metadata to rapidly speed up investigations. This capability empowers security teams with enhanced situational awareness and operator efficiency, thereby enabling operators to initiate a faster and more appropriate response to life safety incidents, threats, and suspicious activity.
New IDIS COVID-19 Solutions. This simple plug-and-play appliance supports safe return-to-workplace strategies across all industry sectors. It includes essential capabilities that facilitate social distancing, people counting, occupancy monitoring / crowd detection, mask detection and, very importantly, reporting compliance.
The new IDIS Mobile features an improved user-friendly interface app with split screens and portrait modes that enables users to manage both IDIS VMS options (the free IDIS Center VMS and IDIS Solution Suite) to improve real-time monitoring/verification of incidents and enable instant investigation across multiple facilities/sites on the move.
IDIS all-in-one interface - Cloud Manager (ICM) enables users to view live and recorded video via a web browser with the added assurance of the highest levels of cyber security protection and without the need to install any additional software.
The new 2MP micro dome camera with its non-bubble, anti-IR reflection structure will be demonstrated to show crisp nighttime image capture. And with a choice of pearly color options, makes it the ideal choice for facilities with an eye to aesthetics, such as boutiques, jewelry stores, and other upscale venues.
IDIS end-to-end logistics
Presentations and demos will be led by IDIS America Regional Sales Directors, Jeff Montoya and Jason Burrows
Presentations and demos will be led by IDIS America Regional Sales Directors, Jeff Montoya and Jason Burrows. Among the topics and technologies they will be covering are IDIS award-winning and cost-effective end-to-end logistics, featuring the best-selling 12MP Super Fisheye camera, as well as the modular and scalable solution IDIS Solution Suite VMS.
They’ll also present a session that will help end-users understand and calculate the lifecycle and total cost of ownership of their video surveillance solutions.
Innovative surveillance technologies
“IDIS is extremely proud to be part of the 2020 GSX+ online-experience platform,” said Jeff Montoya, IDIS America Sales Director for the Eastern region.
He adds, “We look forward to meeting our booth visitors virtually and presenting our innovative surveillance technologies and solutions. We’re very pleased also to be introducing our most recent innovations to meet the security challenges of this COVID-19 era.”
To register for Global Security Exchange Plus (GSX+) virtual event and be a part of the online experience, interested individuals can log on to the official website.
Egress, the provider of human layer data security solutions, released their 2020 Outbound Email Data Breach Report, which highlights the true scale of data security risks related to email use. 93% of IT leaders surveyed said that their organization had suffered data breaches through outbound email in the last 12 months. On average, the survey found, an email data breach happens approximately every 12 working hours.
Rising outbound email volumes due to COVID-19-related remote working and the digitization of manual processes are also contributing to escalating risk. 94% of respondents reported an increase in email traffic since the onset of COVID-19 and 70% believe that working remotely increases the risk of sensitive data being put at risk from outbound email data breaches.
The study, independently conducted by Arlington Research on behalf of Egress, interviewed 538 senior managers responsible for IT security in the UK and US across vertical sectors including financial services, healthcare, banking and legal.
Insights from the report
Key insights from respondents include:
93% had experienced data breaches via outbound email in the past 12 months
Organizations reported at least an average of 180 incidents per year when sensitive data was put at risk, equating to approximately one every 12 working hours
The most common breach types were replying to spear-phishing emails (80%); emails sent to the wrong recipients (80%); incorrect file attachments (80%)
62% rely on people-led reporting to identify outbound email data breaches
94% of surveyed organizations have seen outbound email volume increase during COVID-19. 68% say they have seen increases of between 26 and 75%
70% believe that remote working raises the risk of sensitive data being put at risk from outbound email data breaches
Root cause of breach incidents
In terms of the impact of the most serious breach incident, on an individual-level, employees received a formal warning
When asked to identify the root cause of their organization’s most serious breach incident in the past year, the most common factor was “an employee being tired or stressed”. The second most cited factor was “remote working”.
In terms of the impact of the most serious breach incident, on an individual-level, employees received a formal warning in 46% of incidents, were fired in 27% and legal action was brought against them in 28%.
At an organizational-level, 33% said it had caused financial damage and more than one-quarter said it had led to an investigation by a regulatory body.
Traditional email security tools
In one-third of the most serious breaches suffered, employees had not made use of the technology provided
The research also found that 16% of those surveyed had no technology in place to protect data shared by outbound email. Where technology was deployed, its adoption was patchy: 38% have Data Loss Prevention (DLP) tools in place, while 44% have message level encryption and 45% have password protection for sensitive documents.
However, the study also found that, in one-third of the most serious breaches suffered, employees had not made use of the technology provided to prevent the breach.
Outbound email security risks mitigation
Organisations need technologies, like machine learning, to create a contextual understanding of individual users"
Egress CEO Tony Pepper comments: “Unfortunately, legacy email security tools and the native controls within email environments, such as Outlook for Microsoft 365, are unable to mitigate the outbound email security risks that modern organizations face today. They rely on static rules or user-led decisions and are unable to learn from individual employees’ behavior patterns. This means they can’t detect any abnormal changes that put data at risk – such as Outlook autocomplete suggesting the wrong recipient and a tired employee adding them to an email.”
“This problem is only going to get worse with increased remote working and higher email volumes creating prime conditions for outbound email data breaches of a type that traditional DLP tools simply cannot handle. Instead, organizations need intelligent technologies, like machine learning, to create a contextual understanding of individual users that spots errors such as wrong recipients, incorrect file attachments or responses to phishing emails, and alerts the user before they make a mistake.”
Reporting of outbound email data breach
When an outbound email data breach happens, IT leaders were most likely to find out about it from employees
Organizations still cannot paint a full picture of the risks, relying on people-led reporting to identify email breaches, despite severe repercussions
When an outbound email data breach happens, IT leaders were most likely to find out about it from employees. 20% said they would be alerted by the email recipient, 18% felt another employee would report it, while 24% said the employee who sent the email would disclose their error.
However, given the penalties that respondents said were in place for employees who cause a breach, it is not guaranteed that they will be keen to own up, especially if the incident is serious. 46% said that the employee who caused a breach was given a formal warning, while legal action was taken in 28% of cases. In 27% of serious breach cases, respondents said the employee responsible was fired.
Safeguard both employees and data
Tony Pepper comments: “Relying on tired, stressed employees to notice a mistake and then report themselves or a colleague when a breach happens is unrealistic, especially given the repercussions they will face. With all the factors at play in people-led data breach reporting, we often find organizations are experiencing 10 times the number of incidents than their aware of."
"It’s imperative that we build a culture where workers are supported and protected against outbound email breach risk with technology that adapts to the pressures they face and stops them from making simple mistakes in the first place. As workers get used to more regular remote working and reliance on email continues to grow, organizations need to step up to safeguard both employees and data from rising breach risk.”
Johnson Controls is announcing exacqVision 20.09, which offers an integrated, cost-effective face mask detection solution that can quickly put information into the hands of facility decision makers to help maintain safe environments for employees and visitors.
Based on Artificial Intelligence (AI) analytics versus pixel-based analytics, exacqVision 20.09 with Face Mask Detection offers improved accuracy and a scalable, efficient solution for organizations where public health and safety is a priority - such as retail stores, educational and healthcare campuses and corporate offices.
Enhanced situational awareness
With exacqVision’s automated event notification features, it’s easy to monitor, link and search No Mask events, providing businesses with enhanced situational awareness to respond quickly when a person without a required face mask is detected. This ultimately allows businesses to be more proactive about reducing risks and ensuring compliance to new norms.
Additional features include:
More efficient and streamlined than placing employees at entrances to ensure compliance
Alarms can be triggered based on the absence of a face mask
Open camera support
Real-time event monitoring, linking and searching
Davista, a provider of artificial intelligence for physical security and law enforcement, announced the availability of its AI-powered social distancing platform. The solution is designed to help businesses, organizations, and government agencies ensure social distancing efforts to keep individuals safe while promoting a healthy return-to-work.
Across the globe, governments, corporate entities, and health and law enforcement agencies are working to find solutions to COVID-19 while making strides to get their local economies back up and running.
Heimdall is designed to help organizations proactively identify threats, find strategies to combat them
Since the virus can be transmitted through close proximity to affected individuals, public health officials have identified social distancing as a proactive approach to help contain its spread. When combined with the ability to identify individuals who may be infected with COVID-19 and who they were in direct contact with, AI-driven technology can help organizations react proactively if an outbreak occurs.
Based on Davista’s flagship Heimdall platform, the social distancing platform is based on Bluetooth and GPS technologies and manages the process of identifying individuals who come in contact with individuals who may be infected. Heimdall is designed to help organizations proactively identify threats, find strategies to combat them and identify potential trends to identify based on their specific environment.
Platform with predictive intelligence
The customizable platform combines a multitude of data sources and uses predictive intelligence
The customizable platform combines a multitude of data sources and uses predictive intelligence to best deploy physical security or law enforcement personnel, assets and technologies. It can be configured to address evolving risks and security and compliance requirements, and easily add new configurations to support applications like the social distancing platform.
Employees running the Heimdall Social Distancing app on their smart devices will receive alerts when they come close to other employees. The system will also enable employers to trace, monitor, and manage their organization’s overall social distancing environment.
Proactive risk mitigation strategies
The AI engine can be configured to automatically record the user's location as well as the user’s “bread crumb” trail
The AI engine can be configured to automatically record the user's location as well as the user’s “bread crumb” trail for proactive risk mitigation strategies. If an individual exhibits COVID-19 symptoms, organizations can quickly find and isolate the correct employee, map the user’s trail via their mobile device and identify who they came in contact with.
"Davista is committed to helping organizations across the globe gain access to the technical tools required to help combat the virus and ensure streamlined health monitoring to support the re-opening process," said Scott Sieracki, Chief Sales and Marketing Officer, Davista. "Our team believes there has never been a more important moment to engineer solutions to solve this challenging process. Through close cooperation and collaboration with our customers, we look to harness technology's power to slow the spread of COVID-19 and accelerate the return to everyday life."
Drawing on its years of experience in the engineering of AI-enabled solutions, Davista can automate the process of social distancing and security leaders and law enforcement help identify people potentially at risk through:
Geo- and Bluetooth-enabled TracingBuilt upon the latest technology protocols, Heimdall utilizes both geo-location aware and Bluetooth based technology for enhanced contact tracing and can leverage a customer’s wireless access points (WAP) and other technologies for optimal location awareness.
Automated Stakeholder AlertsStakeholders receive automated alerts based upon predefined conditions informing them of what they need to know and when they need to know it.
n-th Degree Contact TracingQuickly locate people who contact potential COVID-19 individuals by using advanced filtering options and contact link visualizations.
Privacy-preserving Data CollectionQuickly deploy in a building, campus, or agency-wide setting and employ Heimdall's geofencing and data anonymisation techniques for privacy preservation.
Security experts have discussed the demise of the passwords for years. As early as 2004, Bill Gates told the RSA Security Conference that passwords “just don’t meet the challenge for anything you really want to secure.” Change has been slow, but the sudden increase in remote working and the need for enterprises to become touchless as they try to encourage teams back to the office is increasing traction. Here we look at the future of passwordless authentication - using the example of trusted digital identities - and share tips on choosing a solution that works for your organisation.
The move away from passwords was beginning to gain momentum pre-pandemic. Gartner reported an increase in clients asking for information on ‘passwordless’ solutions in 2019. Now Gartner predicts that 60% of large and global enterprises, and 90% of midsize enterprises, will put in place passwordless methods by 2022. This is up from 5% in 2018. The many limitations of passwords are well-documented, but the cost of data breaches may be the reason behind this sharp upswing. Stolen credentials – usually passwords – and phishing are the top two causes of data breaches according to the 2019 Verizon Data Breach Incident Report. Each breach costs businesses an average of anywhere between £4M to £8M depending on which studies you read.
A catalyst for change
As in so many other areas, the pandemic has been a catalyst for change. Newly remote workers using BYOD devices and home networks, sharing devices with other family members, and writing down passwords at home all make breaches more likely. And seasoned home workers represent a risk too.
It also means that enterprises are developing new procedures to mitigate the spread of disease. This includes a thorough examination of any activity that requires workers to touch surfaces. Entering passwords on shared keyboards or touchscreens falls squarely in this area of risk. As does handling physical smart cards or key fobs. Enterprises are expanding their searches from “passwordless” to “passwordless and touchless,” looking to replace physical authenticators. In the quest to go touchless these are items that can be easily eliminated.
The future of passwordless authentication
Using fingerprint or facial recognition often only provides a new front-end way to activate passwords
Common alternatives to passwords are biometrics. But, using fingerprint or facial recognition often only provides a new front-end way to activate passwords. Passwords are still required for authentication after the biometric scan and these live in a central repository vulnerable to hackers. With one successful hack of the central repository, cyber-criminals can swipe thousands of details. In other words, biometrics on their own are not an improvement in security, only a better user experience. They need to be combined with a different approach that adds another layer of security.
A more secure option is to move away from the centralised credential repository to a decentralised model. For example, one based on trusted digital identities. This is where digital certificates are stored on users’ phones. Think of encrypted digital certificates as virtual passports or ID cards that live on a worker’s device. Because they are stored on many separate phones, you are able to build a highly secure decentralised credential infrastructure.
A solution that uses people’s phones is also compatible with touchless authentication systems. You can replace smart cards and key fobs with a phone-based security model and reduce the number of surfaces and items that people touch. This is especially beneficial for workplaces where people have to visit different sites, or for example in healthcare facilities. Replacing smartcards with a phone in a pocket reduces the number of items that clinicians need to take out and use a smartcard between and in different areas, which may have different contamination levels or disease control procedures.
How do trusted digital identities work?
Workers unlock their mobile devices and access their trusted identity using fingerprint or facial recognition
Here’s an example installation. You install a unique digital certificate on each user’s mobile device — this is their personal virtual ID card. Authorised users register themselves on their phones using automated onboarding tools. Workers unlock their mobile devices and access their trusted identity using fingerprint or facial recognition. Once they are authenticated, their device connects to their work computer via Bluetooth and automatically gives them access to the network and their applications with single sign on (SSO). This continues while their phone is in Bluetooth range of their workstation, a distance set by IT. When they leave their desk with their phone, they go out of range and they are automatically logged out of everything.
Five tips on choosing a passwordless solution
More automation means less disruption
Consider how you can predict and eliminate unnecessary changeover disruptions. The task of onboarding large or widely dispersed employee populations can be a serious roadblock for many enterprises. Look for a solution that automates this process as much as possible.
Scalability and your digital roadmap
Will you maintain remote working? Having a high proportion of your team working remotely means that passwordless solutions will become more of a necessity. Are you expecting to grow or to add new cloud apps and broader connectivity with outside ecosystems? If so, you need password authentication that will scale easily.
Encryption needs and regulatory requirements
If your workers are accessing or sharing highly sensitive information or conducting high-value transactions, check that a solution meets all necessary regulatory requirements. The most secure passwordless platforms are from vendors whose solutions are approved for use by government authorities and are FIDO2-compliant.
Common hacker strategies like credential stuffing and exploitation of re-used credentials rely on stealing centralised repositories of password and log-in data. If you decentralise your credentials, then these strategies aren’t viable. Make sure that your passwordless solution goes beyond the front-end, or the initial user log-in and gets rid of your central password repository entirely.
Make it about productivity too
Look for a solution that offers single sign on to streamline login processes and simplify omnichannel workflows. For workers, this means less friction, for the enterprise, it means optimal productivity.
Security improvements, productivity gains and user goodwill all combine to form a compelling case for going passwordless. The additional consideration of mitigating disease transmission and bringing peace of mind to employees only strengthens the passwordless argument. The new end goal is to do more than simply replace the passwords with another authenticator. Ideally, enterprises should aspire to touchless workplace experiences that create a safer, more secure and productive workforce.
Smart cities, airports, stadiums, hospitals and other organizations are now liaising with government bodies and law enforcement to propel a new dawn of collaborative security and communication.
The influx of new technology coupled with the ever-changing political and social landscapes has meant security is having to evolve. Artificial Intelligence is now allowing law enforcement, security personnel and organizations to a transformational method of fighting crime, maintaining public security and significantly finding persons of interest.
AI-powered surveillance cameras
Utilising surveillance cameras with implemented AI has revolutionized finding missing persons. Facial Recognition and IREX.ai’s “Searchveillance” have equipped both the public and private sector with the tools to collaboratively work together in finding persons of interest.
The influx of new technology coupled with the ever-changing political and social landscapes has meant security is having to evolve
Finding missing persons has been an underfunded and challenging issue across society, with many countries having no funding at all after the initial police investigation. Through artificial intelligence, surveillance cameras will never sleep on finding missing people by setting up alerts for once a missing person appears under surveillance.
How it’s happening
Technology like IREX.ai has delivered an AI collaborative security solution which is implemented into surveillance cameras enabling them to become “smart cameras”. Both public and private sector have not been able to collaborate through utilising their existing cameras, which are now powered by AI-backed smart video technology.
With surveillance systems now veering toward becoming cloud based, this now allows an unlimited number of cameras for an organization or city to connect to. The AI platform is helping bringing about a collaborative network to help monitor crowded public areas in real time, something that would have taken a lot of manpower, time and cost to produce.
Quicker response through “searchveillance”
This has now become a crucial element in the fight against COVID-19. The ability to track and trace has been very effective but this particular AI module may only just be getting started in the fight to find persons of interest.
When an individual goes missing or is abducted, every second is crucial along with information gathered. Unfortunately, this brings in human-error, when a person believes they may have seen the person of interest, it can lead law enforcement and authorities critically, in the wrong direction.
AI-powered Facial Recognition helps eliminate human-error through 99.5% accuracy success, leading authorities to definitive sightings and factual information through the help of AI.
“Searchveillance” enables authorities to liaise with the public and private sector organizations who have implemented the AI into their surveillance to run a single search with the person of interest’s photo. Instantaneously the user receives immediate results of, if and when this person last appeared under surveillance.
Long-term missing persons
It’s common knowledge that after 72 hours, statistically speaking the chance of finding the individual quickly diminish, but that doesn’t mean people stop searching. This week alone, September 2020, US Marshalls found and rescued 25 missing children in Ohio, many of whom had been missing for years.
AI-powered facial recognition helps eliminate human-error through 99.5% accuracy success
Implementing AI into surveillance cameras is becoming more frequently adopted around the world, enabling alerts in surveillance cameras and notifying appropriate law enforcement when a missing person appears under surveillance are all extraordinary tools. The alert system from the persons photo in the software. Facial recognition allows law enforcement to receive real-time footage of the missing person and their location.
It is of great assistance for law enforcement to simply receive a notification and a real time feed of individual they are looking for.
Security is becoming a more collaborative effort
In light of recent events throughout the world, with protests surrounding police brutality, rioting, violence and deaths, security is evolving and it has to. Enabling technologies and building security collaboration and communication platforms is assisting in the fight to find missing people.
It’s not just smart cities and smart airports who are providing a fishing net for find persons of interest, it’s also stadiums. The Superbowl and other major sporting events generate some of the biggest human slavery and trafficking busts of the year. Stadiums are now harnessing the responsibility to help counteract this and set up these alerts, utilize the AI in their cameras and collaborate with authorities, thus playing their part in finding persons of interest.
IREX.ai has helped deliver the AI and the platform for collaborative security and communication, as technology grows and becomes more in our lives than we care for it to be, you often forget of the results it can provide, such as reuniting a family.
Developing an effective contact tracing system in the UK to monitor the spread of COVID-19 has proved to be problematic. The trials of the app developed by the government and its partners encountered numerous challenges, and despite the reopening of restaurants, pubs and shops, the current approach to contact tracing is inconsistent, with recent reports suggesting not all establishments are following the government guidance.
At the same time, businesses are being encouraged to ask employees to return to the workplace as lockdown restrictions ease, and the lack of an effective contact tracing system is only going to become more of an issue. Responsibility now lies with employers to ensure social distancing measures are adhered to in the workplace, trace any contact that a person infected with COVID-19 has had with others, and communicate consistent messaging across their organizations. Considering all of these challenges, it is not surprising that technology is being turned to for the answers.
Turning to technology
However, it is not just cutting-edge technology that can support measures to address health and safety issues related to COVID-19; the use of existing infrastructure is vital too. Consider the ubiquity of CCTV in workplaces and public spaces, especially in densely populated cities. Recent research has shown that London, for example, has 627,727 cameras for 9.3 million residents - the equivalent of 67.5 cameras per 1,000 people. The data collected from these feeds will play a key role in effectively tracing interactions and monitoring the adherence to social distancing measures.
Tracing interactions and monitoring the adherence to social distancing measures
As useful as this data is though, the sheer volume of it is enormous. Sifting through hundreds of hours of video footage collected from networks of thousands of cameras will be far too time-consuming and inaccurate to complete manually. This is where more advanced technology such as A.I.V.A. (Artificial Intelligence Video Analytics) is required.
A.I.V.A. solutions use existing camera networks and geospatial algorithms to determine an individual’s location in the camera field of view in real-time, automatically learning the perspective of the scene and calculating the GPS coordinates of individuals in real-time based on their location in the camera field of view.
Social distancing algorithms
For example, with regards to social distancing, an algorithm can detect when two parties are within a meter proximity of each other. This will trigger an alert in the system and log the occurrence in a dashboard report. If government recommendations change and the suggested distance is 2 meters, the algorithm is easily adjusted.
This approach will help to reinforce changes in behavior to encourage social distancing and, in the worst case, establish an effective contact tracing system for those who have been infected with COVID-19 and have come into contact with others.
An effective contact tracing system for those who have been infected with COVID-19
Firstly, in terms of how this can be used for social distancing, AI powered video analytics can be used to identify particular hotspots where breaches occur. While isolated incidents of a breach in the 1m rule may not be particularly useful, when a series of occurrences is identified from thousands of hours of CCTV footage, vital insights can be gained into localised clusters of COVID-19 infections. The reports generated from this type of analysis can be extremely useful; for example, pinpointing particularly busy areas of a job site, identifying queues at a coffee station at a certain time of the day, or the most frequently used exit of an office building.
Breaching the rules
Armed with these insights, businesses can implement measures to try and alleviate such bottlenecks. In practice, this may involve implementing one-way systems or moving people from one congested area to a quieter one at particular times of the day, to help reduce the chances of breaching the 1m social distancing rule. There is even the capability of triggering an automatic alert when a breach is observed to remind employees of their responsibility to adhere to the guidelines.
If a business is informed that one of its employees or a visitor has contracted COVID-19, the use of A.I.V.A can support in helping to identify areas that the person has visited and whether there were any other people in that area at the same time. Instead of informing others directly, the business can issue a notice to say exactly where that person was and advise employees who may have been present to be tested. This is particularly useful for businesses with large sites, who need to manage each building and facility on a case-by-case basis.
Workforces can be protected by decreasing the chance of social distancing breaches
Although simple to implement, AI powered video analytics can play a key role in helping businesses implement solutions that allow employees to safely return to work. With such technology in place, workforces can be protected by decreasing the chance of social distancing breaches occurring and effectively tracking those who have it.
The technology does not rely on the identification of specific individuals nor their personal information or mobile phones, but rather recognises behavior patterns and uses this approach to provide accurate information to groups of people that need it. AI has long been touted as the technology set to revolutionise life as we know it, and now it has the chance to unlock its potential and protect people in a world significantly affected by COVID-19.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe.
In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace.
Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace
These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry.
“In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists.
“Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.
“How do you support the business and, more broadly, societies and communities?”
The new normal for security
The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.”
“We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks.
“We just need to take a fresh look from a mix of perspectives.”
“Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show
Infrared cameras and access control technologies
New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing.
But what will such use of these technologies mean in the long term?
Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing
“We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company.
“Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?”
Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good.
“Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.”
An accelerated timeline will raise the stakes even further.
“All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto.
“The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’”
Public health versus individual liberty
The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information.
“There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.”
The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection
“There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly.
“In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.”
From smart security to more intelligent technology
After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.”
After the pandemic, the innovation climate will befit new technology adoption
Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon.
Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.”
“Science and technology are morally neutral,” he said. “How we use them is not.”
Intelligent automation over artificial intelligence
Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse.
Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”
“A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things.
In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity.
“Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward.
In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats.
Speaking at ISC West
DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West.
Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone.
The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust.
DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev:
You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302.
Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape?
The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302.
The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss.
CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701.
Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations.
Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom.
What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage.
A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy"
Smart home market on the forefront
The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.”
“The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.”
Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com.
Focus on Cybersecurity
In 2020, companies will continue to focus on solutions for protecting consumer data"
Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates.
“Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.”
“At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds.
Smart access control
Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology.
Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security.
Homeguard offers a range of affordable CCTV solutions for home and small business
DIY CCTV demonstrations
DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits.
Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing.
AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities.
Security and automation solutions
D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access.
Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring.
Personal safety mobile application
Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens"
WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features.
“Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.”
“Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Evolv Technology announced that Hersheypark® is using Evolv’s artificial intelligence (AI)-based, touchless security screening system as part of the much-loved theme park’s robust COVID-19 safety measures.
Hersheypark was originally created by businessman and philanthropist Milton S. Hershey more than 110 years ago as leisure grounds for employees of Hershey's Chocolate Factory.
Embodying the passion of its namesake, the park is dedicated to its global reputation as a safe, fun family destination offering something entertaining for everyone, regardless of age. Hersheypark welcomes millions of guests annually and was recently honored by the 2020 USA TODAY 10Best Readers’ Choice awards.
Using AI software and powerful sensors, Evolv Express™ can screen up to 3,600 people per hour
Evolv is involved in the digital transformation of physical security, one that is touchless and addresses the ‘new normal’ threat of pandemic viruses as well as concealed weapons. Using AI software and powerful sensors, Evolv Express™ can screen up to 3,600 people per hour - 10 times faster than legacy approaches such as metal detectors, hand wands and manual inspections.
The system enables Hersheypark to facilitate social distancing at its security checkpoints while minimizing person-to-person interaction-requiring no stopping, no emptying of pockets or removing bags.
Park guests simply walk through naturally, alleviating potential long lines at their entrances while greatly reducing contact between guests, employees and security staff. By using Evolv Express, organizations have been able to optimize the performance of their security teams while reducing screening expenses by as much as 70%.
Renovated main entrance
Following state mandates related to the pandemic and an abundance of caution, Hersheypark’s opening was delayed until July 3, which marked the debut of the park’s completely renovated main entrance designed to provide a stress-free, welcoming experience for guests.
A component of a 23-acre “Hershey’s Chocolatetown” development and park expansion, the Evolv Express systems are located at Hersheypark’s new main entrance.
Health and safety
The health and safety of our guests, team members and our community are core to our brand"
“Hersheypark prides itself on providing family fun in a clean, green and safe environment where our guests can relax and enjoy the day together,” said Garrett Gallia, vice president of communications and corporate relations at Hershey Entertainment and Resorts. “The health and safety of our guests, team members and our community are core to our brand and our most important commitment to all those who choose to honor us with a visit or work as a member of our team. Using Evolv’s touchless security screening platform is a perfect example of Hersheypark’s forward-thinking application of digital technology. Evolv Express is designed to grow with us to meet the current and future safety needs of our guests and employees, which we view as a significant benefit over traditional solutions.”
Response to Evolv Express at Hersheypark has been uniformly positive. Guests welcome how rapid and unobtrusive the process is while making them feel even safer.
Optimizing staff resources
The park’s security professionals emphasize how easy it is to learn and use the system The park’s security professionals emphasize how easy it is to learn and use the system while optimizing their staff resources. With metal detectors, it typically takes the park four to five seconds per person for the screening, regularly followed by hand searching of bags or other personal items.
With Evolv Express, most guests now stroll through at their normal pace not even realizing the screening process is occurring and then begin their day of fun and relaxation.
The park’s security team estimates a four-to-five times improvement in the number of guests screened per hour using the system when compared to metal detectors or other dated approaches. The frictionless experience that precludes unnecessary physical contact registers high on the list for everyone.
Security screening process
Our guests and security staff have been pleasantly surprised at the speed of the touchless screening experience"
“We knew our former security screening process would provide challenges in the pandemic environment,” said Jason White, managing director of corporate safety and security at Hershey Entertainment and Resorts. “We’d already been evaluating how we could improve on our guest screening process and had piloted Evolv Express last fall because the system could accommodate thousands of people an hour in a frictionless, no-stop flow. As we began formulating the security screening aspect of our pandemic reopening strategy, it was clear that Evolv Express was the best solution that could meet our requirements. Our guests and security staff have been pleasantly surprised at the speed of the touchless screening experience that largely eliminates manual bag checks. The responsive customer support and working relationship we have with the Evolv team is just as phenomenal as their product.”
Touchless security screening
Deployed worldwide, Evolv’s touchless security screening systems have been used to screen more than 50 million individuals in an expedient, respectful manner.
In addition to Hersheypark, customers include Six Flags Entertainment Corporation, L.L. Bean, Wynn Las Vegas, Georgia Aquarium, Set Jet, Oakland International Airport, two South Carolina school districts, the Biltmore Estate and hundreds of others.
“Navigating the path to reopening requires an employee-and-customer-first commitment to safety, combined with the vision to embrace new policies, procedures and technologies,” said Evolv Technology Chief Executive Officer Peter George. “Hersheypark embodies that approach and it has been wonderful to see their security leaders like Jason White helping peers at other venues understand what’s required in this new normal. We’re thrilled to be working with such a visionary team.”
ZeroEyes, a renowned provider of artificial intelligence weapons detection solution, announced that it will provide its technology to the South Side Area School District in Beaver County, Pennsylvania. ZeroEyes’ platform is purpose-built to detect visible weapons in real-time, identifying guns before any violent threats can occur. ZeroEyes’ software integrates with an organization’s existing camera systems and video analytics to detect weapons in real time.
As soon as a visible weapon is detected, an alert with the image of the weapon goes to the ZeroEyes monitoring team. Once confirmed, an alert is sent to a local emergency dispatch, onsite security staff, police and school administrators via cellphone and desktop. South Side Area School District operates three schools: an elementary school, middle school, and high school, with approximately 980 students.
Weapons detection solution
The school has invested in a number of different technologies focused on keeping staff, students and visitors safe, taking a pioneering stance in prioritizing school safety. ZeroEyes is the first weapons detection solution installed on premises.
ZeroEyes’ AI weapons detection platform allows security personnel to quickly enact security protocols
“As a rural public school district, it’s absolutely crucial for us to take the steps needed to ensure the safety of everyone who sets foot on campus,” said Alan Fritz, Superintendent at South Side Area School District. “ZeroEyes has consistently demonstrated their steadfast focus and commitment to public safety, and we believe that their weapons detection solution will play a critical component in our overall security approach.”
Active shooter threats
ZeroEyes partners with its customers as well as local first responders to ensure that organizations - including schools, commercial and government buildings - have an additional layer of security to identify and stop threats. ZeroEyes’ AI weapons detection platform allows security personnel to quickly enact security protocols, or direct first responders to a threat.
“ZeroEyes was founded with the core focus to help mitigate school shootings, and we’re excited to partner with a school district that is taking proactive measures against active shooter threats,” said Dustin Brooks, Vice President of K-12 Education at ZeroEyes. “We look forward to the partnership with the South Side Area School District and forging a strong relationship built upon deeply caring about protecting students and faculty.”
Prevent mass shootings
Founded by former Navy SEALs and military veterans with over 50 years of collective military experience, ZeroEyes’ mission is to detect weapons before shots are fired, enable faster response times for first responders and security personnel, and ultimately prevent mass shootings.
Protecting commercial properties is complicated and goes beyond safeguarding people and property. Security professionals respond to the needs of the business, staff, contractors, and visitors and deal with the realities of property damage, theft, and disgruntled employees. Ava helps the team react to anomalies and policy enforcement in real-time. Instead of merely investigating incidents, organizations can take the necessary steps to prevent them.
Spotlight brings relevant feeds to the operator’s attention and triggers real-time alerts to address threats before they escalate. Leverage integrated video and audio analytics to give an enhanced understanding of the camera feeds. Respond to loitering challenges, access anomalies, theft incidents, fires, and more.
Identifying suspicious people
Smart Search allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, identifying suspicious people like unescorted visitors, investigating health incidents or damage to the property, performing cleaning crew inspections now take minutes instead of hours.
Combine with access control to identify tailgating or fire or active shooter scenarios
To gain occupancy insights, operators can leverage Ava Aware’s unique Map view with Smart Presence. By adding floor plans and maps of premises, people and vehicles appear as dots in their precise on-site locations. Operators can see live footage as they move on the cameras’ fields of view. Combine with access control to identify tailgating or fire or active shooter scenarios.
Connect Ava Aware to the cloud to achieve easy and simple deployment and access from anywhere in the world. Share links of recorded video with team members, claim investigators, and law enforcement, regardless of whether they have admin access to Aware or not. Get a secure download of video files in a standard mp4 format with digital watermarking for authenticity.
Key benefits delivered are as follows:
Integrate with existing cameras
Hundreds of hours saved in forensic searches
Add access control to extend capabilities
Video & metadata storage remain on-premises
Full site survivability and local access
Increase operational productivity and reduce facility costs
Distribute heat and cooling efficiently, optimize cleaning and workplace productivity through hot-desking insights
Use people flow insights to manage people and vehicle queues efficiently
Automatically decrease storage demands from all the recordings
Reduce bandwidth consumption on critical links with AI-based optimization
Pay for what is needed, when it is needed, without the hassle of complicated licensing
Up to 200 cameras per Ava appliance— small footprint support for larger facilities
One-click Ava Dome and Ava 360 camera configuration
Encrypted media at rest and in transit
Automatic firmware updates
Digital watermarking to prevent tampering
Simple subscription model without hidden costs or analytics add-ons
With a simple licensing model, Vaion always includes services and software upgrades. They no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure.
Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threats proactively, improve operational efficiency, and provide surgery documentation for educational purposes.
Anomaly detection and analysis in real-time
Ava’s pervasive, integrated video analytics use self-learning to give an enhanced understanding of all of the user’s cameras’ feeds. The staff can use the dynamic Video view with Spotlight that brings only the relevant feeds to their attention. In unusual activity cases, the operators can immediately respond when a high-risk patient leaves his room unattended or visitors are wandering in prohibited areas.
Increased situational awareness
Add maps of the user’s facilities and rooms to keep track of high-risk patients, visitors, and staff and their exact location. Maps include Smart Presence, a capability that lets the users track them as they move through their facilities. Combine with access control to locate patients and staff in critical moments. Administrators can also have a clear picture across their locations to improve patient care and daily operations.
Quick search within minutes for insurance claims
Operators can find visual evidence to prove or disprove liability claims fast and accurately or if hygiene protocol compliance is followed correctly. Smart Search allows personnel to search by appearance, events, objects, similarity, or image. The vcore VMS integrates with access control systems through the generic access control API. It is possible to get a clear picture of historical entries and exits of patients and staff and the video associated with it.
Sharp images and integrated audio analytics
Equipped with directional acoustic sensors, Ava vcam Dome and Pano notify security and healthcare professionals instantly when loud noises, screaming, glass breaking, and gunshots occur. The cameras also deliver unmatched video quality required to provide recordings for scientific presentations, research, and education. vcam is suitable for different settings, from parking lots and storerooms to patient wards and operating rooms.
Key benefits, delivered:
Build from existing investment while retaining privacy
Integrates with existing cameras
Hundreds of hours saved in forensic searches
Add access control to extend capabilities
Video and metadata storage remain securely on-premises
Full site survivability and local access
Safe and reliable environment
Capture every detail at all times with discreet security cameras
Monitor high-risk patients at all time with remote monitoring
Enable preventative action through immediate response time
Improve operations and services
Save storage and money
Automatically decrease storage demands from all of the user’s recordings
Reduce bandwidth consumption on critical links with AI-based optimization
Support both on-premises and cloud within a single deployment
Up to 200 cameras per Ava vserver appliance - small footprint support for larger facilities
Simplicity and compliance
One-click Ava vcam configuration
Encrypted media at rest and in transit
Automatic firmware updates
Digital watermarking to prevent tampering
Simple subscription model without hidden costs or analytics add-ons
Simple and flexible licensing
With a simple licensing model, Ava always includes services and software upgrades. The users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?
Dark video images contain little or no information about the subject being surveilled. Absence of light can make it difficult to see a face, or to distinguish the color of clothing or of an automobile. Adding light to a scene is one solution, but there are also new technologies that empower modern video cameras to see better in any light. We asked this week’s Expert Panel Roundtable: What impact does lighting have on the performance of video systems?
Artificial intelligence (AI) and machine learning have made a big splash in the physical security market, transforming video analytics to a new level of accuracy. In fact, the terms have become common buzzwords throughout the industry. However, the potential for AI and machine learning to impact the physical security industry goes far beyond their ability to improve video analytics. We asked this week’s Expert Panel Roundtable: Beyond better video analytics, how can artificial intelligence (AI) and/or machine learning benefit the physical security market?