In light of the current global events, most of the human workforce is confined to their homes and business owners are actively seeking new ways to guard their personal and commercial assets 24x7.
Enterprises of all sizes need smart and scalable security solutions to protect their physical capital and properties
automated drones to guard assets
Using automated drones to guard assets round the clock has become a necessity, and businesses are reaping great value by adopting autonomous drones for security operations.
Enterprises of all sizes need smart and scalable security solutions to protect their physical capital and properties, the calls for the need of reliable hardware and intelligent software.
Smart technological solutions
As technology advances rapidly in the present world, the security industry too is inducting smart technological solutions with the aim of risk identification and mitigation.
There has been rapid adoption of drones for security use cases. However, businesses that wish to induct these solutions face the following challenges:
Highly expensive, complex and complicated system setup.
Lack of interoperability and agnostic DiaB hardware with leading off-the-shelf drones.
Lack of reliable and scalable automation software.
Increased time to market, turnaround and lead time.
Lack of software support to automate off-the-shelf drones like DJI Mavic 2 series.
Expensive DiaB hardware and time-consuming set ups hampering overall operational efficiency.
Lack of automation in existing drone operation management systems.
Focus on aerial security and surveillance
To help business users overcome the above-mentioned challenges with regards to drone automation, FlytBase and Hextronics have partnered together recently, with a focus on aerial security and surveillance.
Evolv Technology has announced the appointments of a pair of executives with proven track records for guiding high-growth digital technology companies into global market leaders. Eric Pyenson joins as General Counsel from VMware Carbon Black (part of Carbon Black, Inc.) and A.J. De Rosa as Chief Revenue Officer (CRO) from Orbital Insight.
Evolv just completed its most successful year since being founded in 2013. Scaling operations across all functions, the company is the world’s first and only commercially successful provider of artificial intelligence (AI)-based touchless security screening systems.
Evolv Express is deployed worldwide and has been used to screen more than 50 million people
Evolv Express is deployed worldwide and has been used to screen more than 50 million people, second in numbers only to the U.S. Department of Homeland Security’s Transportation Security Administration (TSA).
Pyenson is a veteran technology industry lawyer and management executive with broad private and public company experience, including managing multiple initial public offerings (IPOs) and strategic transactions, as well as building respected in-house legal teams.
Technology industry expert
He joins Evolv as general counsel from VMware Carbon Black, where he served as vice president and general counsel of the Carbon Black Security Business Unit following VMware’s US$ 2.1 billion acquisition of Carbon Black in 2019. Previously, as Carbon Black’s General Counsel and a member of the executive team, he helped lead its US$ 175 million IPO in 2018.
He also served in a similar role with A123 Systems, which had one of the most successful IPOs in the clean technology sector. Notably, he has significant international and security experience serving the U.S. government on counterterrorism matters earlier in his career.
New sales and revenues head
As Evolv’s new Chief Revenue Officer (CRO), De Rosa is responsible for all sales, business development, customer success and strategic partnership initiatives. Most recently, he served as CRO at Orbital Insight, where as head of all client-facing operations, sales, customer success and marketing efforts he helped the company to establish a global leadership position in the geospatial analytics sector.
With expertise in advanced sensors, data analytics, SaaS-based models and sales optimization methodologies, he brings to his new role more than 25 years of experience scaling global sales organizations, building strategic relationships and driving customer success.
Combining vision with advanced technologies
We’re living in chaotic, stressful times and having a sense of safety has never been more important"
Earlier in his career, as Senior Managing Director and Co-head of Global Sales at Eze Software Group, he built a team that grew annual sales in excess of US$ 100 million.
“We’re living in chaotic, stressful times and having a sense of safety has never been more important,” said Evolv Technology’s Chief Executive Officer (CEO), Peter George, adding “Evolv identified early on that human security had to be fundamentally rethought in order to provide substantially better outcomes – capable of addressing known threats as well as risks that would inevitably present themselves in the future.”
Peter further said, “By combining our vision with advanced technologies, we’re leading that digital transformation. We’re thrilled to welcome Eric and A.J. to the team. They’ll play important roles as we accelerate our growth and keep even more people safe around the globe.”
Digital transformation of physical security
Evolv is leading the digital transformation of physical security, one that is touchless and addresses the ‘new normal’ threat of pandemic viruses as well as concealed weapons. Using AI software and powerful sensors, Evolv Express can screen up to 3,600 people per hour, 10 times faster than legacy approaches such as metal detectors, hand wands and manual inspections.
The system enables social distancing at entrances and other security checkpoints, while minimizing person-to-person interaction, requiring no stopping, no emptying of pockets or removing bags.
Screening technologies deployed at various sites
People being screened simply walk through naturally, alleviating potential crowding and long lines while greatly reducing contact between guests, employees and security staff.
In use at hundreds of outdoor entertainment venues, cultural landmarks, corporations, warehouses, schools, hospitals, stadiums and large-scale events worldwide, Evolv’s customers include Six Flags Entertainment Corporation, L.L. Bean, Wynn Las Vegas, Oakland International Airport, two South Carolina school districts, Hersheypark, Set Jet, the Biltmore Estate and the Pittsburgh Symphony Orchestra. By using Evolv Express, organizations optimize the performance of their security teams, while reducing screening expenses by as much as 70 percent.
HiveWatch, a security fusion startup company that uses multi sensor fusion to help companies respond better and effectively to physical security threats, has emerged from stealth and announced a seed funding round led by CrossCut Ventures, with participation from Freestyle and SaaS Ventures.
Centralizing event data
HiveWatch’s platform pulls data from a company’s disparate monitoring systems and security sensors to provide operators a single-pane-of-glass to evaluate and respond to alerts.
By centralizing event data, HiveWatch reduces the security program noise that plagues operations
By centralizing event data, HiveWatch reduces the security program noise that plagues operations, using multi-sensor analysis and machine learning to only elevate events that require a human response.
With years of experience building comprehensive security programs for both unicorn startups and renowned Fortune 500 enterprises, HiveWatch’s Chief Executive Officer (CEO) and Founder, Ryan Schonfeld is addressing the biggest common challenge in building an advanced and state-of-the-art global security operations center.
Security operations platform
“We’re building a platform to make security leaders more aware, more connected, more proactive, and more informed,” said Hive Watch Chief Executive Officer and Founder, Ryan Schonfeld.
He adds, “Noise from the wide range of legacy sensors that exist within most companies’ security infrastructure is only addressed by hiring more people to process the data, resulting in a reactionary security program yielding minimal return on investment. The overarching vision of HiveWatch is to help the security leaders we talk to every day gain the intelligence needed to make their teams more effective.”
Multi-sensor analysis to reduce noise
HiveWatch reduces 90% of the noise that plagues operations centers on a daily basis and allows operators to evaluate the remaining threats as fast as possible.
Instead of operators switching between each sensors’ proprietary software to manually gather situational data, HiveWatch empowers operators by presenting all significant event feeds in one window as an alert comes in.
Vast experience in technology startup execution
HiveWatch is made up of top technical talent from Apple, Bird, Cisco, Disney, and NORAD
HiveWatch is made up of top technical talent from Apple, Bird, Cisco, Disney, and NORAD, who have a broad combined security expertise in advanced military operations knowledge with high-growth technology startup execution.
HiveWatch’s Head of Product, Jordan Hill has previously led multiple teams at Bird to develop machine learning solutions to contextualize hardware and software data for internal safety operations, sidewalk detection, and asset recovery that returned millions of dollars in capital investments and revenue globally.
Enhanced interoperability and visibility
“We were attracted to the background of this founding team, and their history and experience in scaling corporate security systems for high-growth companies like Bird,” said Brian Garrett, Co-Founder and Managing Director at Crosscut Ventures.
Brian adds, “Ryan and Jordan have figured out how to bring interoperability and visibility into an antiquated software and hardware ecosystem. Their approach will make corporate security programs more accessible for both high-growth startups and Fortune 500 enterprises as we enter a post-Covid, data-driven paradigm.”
Building scalable and efficient security programs
HiveWatch is directing their funding to expand their team with new and diverse security leaders and system engineers to accelerate feature releases and onboarding customers from their wait list.
“Interoperability has been a problem in physical security since I started my career more than 30 years ago,” said Ron Rothman, former President of Honeywell Security and a HiveWatch Advisor, adding “The nature of products available today has made scaling security cumbersome. With HiveWatch, you can build scalable and efficient programs by sense making and reducing noise across disparate security sensors.”
HiveWatch is the multi-sensor security fusion platform that brings the right people, information, and tools together to achieve higher levels of security and safety. HiveWatch provides teams with access to the data they need, when they need it by delivering fused intelligence to empower proactive security.
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27”, and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points, or self-checkout pay points.
With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity to display a slide show which can include supplier adverts, own-brand product promotions, and special offers.
A default blinking recording in progress message is superimposed over the displayed graphics to let would be thieves know they are on camera, with operators having the option to customize the message and configure its size, color, opaqueness and positioning on the monitor.
Face and motion detection feature can be configured to switch the display to live view to make people aware they are being watched Supported by the Wisenet WAVE and SSM video management platforms as well as Wisenet NVRs, the ONVIF Conformant PVMs can be programmed so that images captured by the cameras are either continuously recorded or when prompted to do so by built-in face or motion detection video analytics.
The face and motion detection feature can also be configured to switch the display to live view to make people aware they are being watched, as they will be able to see themselves on the monitor as they enter a store or walk down a shopping aisle. The display reverts to the slide show after a specified number of seconds.
The PVMs, which can be integrated with tagging (EAS) systems to record images of people who might be leaving the store with stolen items, also provide support for the AI-Masking, AI-Bio, AI-Face-Detect, and AI-Occupancy video analytics applications, developed by Hanwha Techwin’s technology partner, A.I. Tech.
Regardless of whether they are displaying live images or a slide show, or the monitor has been turned off by someone using a remote control, the PVMs will continuously stream images to a control room where they can be viewed via video management software (VMS), as well as continue to be recorded on an on-site or remotely located NVR.
The ultra-low light capabilities of the new PVMs, together with Wide Dynamic Range (WDR) technology performing at up to 150dB, enables the built-in camera to capture clear, sharp images in strongly contrasting light conditions at, for example, store entrances where strong sunlight may be streaming in.
Power over Ethernet
All three PVMs can be powered by 12V DC, with the Wisenet SMT-1030PV also offering the option to utilize Power over Ethernet (PoE+) if there isn’t an existing power supply close to where the PVM is being installed. A single cable of up to 100m is all that is needed to provide both powers to the SMT-1030PV and for network communications.
The three new Wisenet PVMs, which can be mounted by using standard VESA brackets, are as follows:
SMT-1030PV: 10” monitor with LED backlight and 1024 x 600 display resolution.
SMT-2730PV: 27” monitor with LED backlight, HDMI input, and Full HD display.
SMT-3230PV: 32” monitor with LED backlight, HDMI input, and Full HD display.
Loss prevention strategy
“With retailers increasingly relying on PVMs to play an important role within their strategic approach to loss prevention, we have designed our new models to make it quick and easy, as well as cost-effective, to deploy them across a large number of stores,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe.
“As the only PVMs available which, for cyber security and data protection purposes, are supplied with a complete built-in SSL connected camera, they eliminate the need for system integrators to install and connect a separate supporting camera, which some other manufacturers’ PVMs require."
"By building in an intuitive user interface, we have also made it extremely easy for busy store managers to take full advantage of the PVM’s functionality, including the ability to utilize the monitor for advertisement and signage using the slide show mode.”
Like most industries, the fields of security, access, and safety have been transformed by technology, with AI-driven automation presenting a clear opportunity for players seeking growth and leadership when it comes to innovation.
In this respect, these markets know exactly what they want. They require solutions that accurately (without false or negative positives) classify and track people and/or vehicles as well as the precise location and interactions between those objects. They want to have access to accurate data generated by best-of-class solutions irrespective of the sensor modality. And, they need to be able to easily deploy such solutions, at the lowest capex and opex, with the knowledge that they can be integrated with preferred VMSs and PSIMs, be highly reliable, have low install and maintenance overheads and be well supported.
With these needs in mind, camera and computer vision technology providers, solutions providers, and systems integrators are forging ahead and have created exemplary ecosystems with established partnerships helping to accelerate adoption. At the heart of this are AI and applications of Convolutional neural networks (CNN), an architecture often used in computer vision deep learning algorithms, which are accomplishing tasks that were extremely difficult with traditional software.
But what about 3D sensing technologies and perception?
The security, safety, and access market have an additional crucial need: they must mitigate risk and make investments that deliver for the long-term. This means that if a systems integrator invests in a 3D sensing data perception platform today, it will support their choice of sensors, perception strategies, applications, and use cases over time without having to constantly reinvest in alternative computer hardware and perception software each time they adopt new technology or systems.
This begs the question - if the security industry knows what it needs, why is it yet to fully embrace 3D sensing modalities?
Intelligent perception strategies are yet to evolve which sees designers lock everything down at the design phaseWell, one problem facing security, safety, and access solutions providers, systems integrators, and end-users when deploying first-generation 3D sensing-based solutions is the current approach.
Today, intelligent perception strategies have yet to evolve beyond the status quo which sees designers lock everything down at the design phase, including the choice of the sensor(s), off-the-shelf computer hardware, and any vendor-specific or 3rd party perception software algorithms and deep learning or artificial intelligence.
This approach not only builds in constraints for future use-cases and developments, it hampers the level of perception developed by the machine. Indeed, the data used to develop or train the perception algorithms for security, access, and safety use cases at design time is typically captured for a narrow and specific set of scenarios or contexts and are subsequently developed or trained in the lab.
As those in this industry know too well, siloed solutions and technology gaps typically block the creation of productive ecosystems and partnerships while lack of commercial whole products can delay market adoption of new innovation. Perception systems architectures today do not support the real-time adaptation of software and computing engines in the field. They remain the same as those selected during the design phase and are fixed for the entire development and the deployment stage.
Crucially, this means that the system cannot deal with the unknowns of contextually varying real-time situations where contexts are changing (e.g being able to reflex to security situations they haven’t been trained for) and where the autonomous system’s perception strategies need to dynamically adjust accordingly. Ultimately, traditional strategies have non-scalable and non-adaptable competing computing architectures that were not designed to process the next generation of algorithms, deep learning, and artificial intelligence required for 3D sensor mixed workloads.
What this means for industries seeking to develop or deploy perception systems, like security, access, and safety, is that the available computing architectures are generic and designed for either graphic rendering or data processing. Solutions providers, therefore, have little choice but to promote these architectures heavily into the market. Consequently, the resulting computing techniques are defined by the computing providers and not by the software developers working on behalf of the customer deploying the security solution.
Context…. we don’t know what we don’t know
Perception platform must have the ability to adjust to changes in context, thereby improving the performance post-deployment To be useful and useable in the security context and others, a perception platform must have the ability to adjust to changes in context, can self-optimize, and crucially, can self-learn, thereby improving the performance post-deployment. The combinations of potential contextual changes in a real-life environment, such as an airport or military base, are innumerable, non-deterministic, real-time, often analog, and unpredictable.
The moment sensors, edge computing hardware, and perception software are deployed in the field, myriad variables such as weather, terrain as well as sensor mounting location and orientation all represent a context shift where the perception systems’ solution is no longer optimal. For example, it might be that a particular sensor system is deployed in an outdoor scenario with heavy foliage.
Because the algorithm development or training was completed in the lab, the moving foliage, bushes, or low trees and branches are classified as humans or some other false-positive result. Typically, heavy software customization and onsite support then ensue, requiring on-site support by solutions vendors where each and every sensor configuration needs to be hand-cranked to deliver something that is acceptable to the end customer.
A new approach for effective perception strategies
Cron AI is building senseEDGE, which represents a significant evolution in the development of sensing to information strategy. It is a 3D sensing perception and computer vision platform built from the ground up to address and remove the traditional deployment and performance bottlenecks we’ve just described.
senseEDGE is aware of the user application reaction plan indication to trigger an alarm or turning on a CCTV camera The entire edge platform is built around a real-time scalable and adaptable computing architecture that’s flexible enough for algorithms and software to scale and adapt to different workloads and contexts. What’s more, it has real-time contextual awareness, which means that the entire edge platform is, at any time, aware of the external context, the sensor and sensor architecture, and the requirements of the user application.
Furthermore, when it produces the object output data, it also aware of the user application reaction plan indication, which could be triggering an alarm or turning on a CCTV camera when a specific action is detected. This approach turns traditional perception strategies on their head: it is software-defined programmable perception and computing architecture, not hardware-defined.
It is free from the constraints imposed by traditional CPU or GPU compute dictated by hardware architecture providers and not limited to the perception built defined during design time. And, being fully configurable, it can be moved from one solution to another, providing computation for different modalities of sensors designed for different use cases or environments, and lower risk of adoption and migration for those developing the security solution.
Future perception requirements
senseEDGE is also able to scale to future perception requirements, such as algorithms and workloads produced by future sensors as well as computational techniques and neural networks that have yet to be invented. Meanwhile, latency versus throughput is totally software-defined and not limited by providers of computing architecture.
Finally, contextually aware, it is fully connected to the real world where the reflexes adapt to even the subtlest changes in context, which makes all the difference in time and accuracy in critical security situations.
This is how CronAI sees the future of perception. It means that security and safety innovators can now access and invest with low risk in a useable and scalable perception solution that can truly take advantage of current and future 3D sensor modalities.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge.
However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there.
Rising scope of 5G, AI, IoT and the Cloud
The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens.
Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority.
Innovative surveillance cameras with integrated IoT
Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns
Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents.
Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud.
Smart programming to deliver greater insights
These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights.
The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity.
Smart surveillance systems
It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly.
For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles.
This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible.
Cloud-based technologies provide the interoperability, scalability and automation
Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems.
The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment.
Smart surveillance in the real world
Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact.
Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility.
Smart Cities operations
The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations.
The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents.
The right cloud approach
Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs.
Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available.
Open system architecture
An open system architecture will also be vital for smart cities to enhance their operations
For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come.
The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety.
New safety features
Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist.
Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
The explosion of artificial intelligence used to enhance business processes, propel innovative products, and further automation has touched essentially every industry to date. The security sector, notable for its maturity and complexity, is not exempt from the AI tidal wave.
In fact, quite the opposite, the security sector and more specifically the domain of video surveillance have seen an emergence of AI-powered solutions both hardware and software.
The widespread adoption of IP cameras, cloud computing capacities, and smart sensors have paved the way for new AI products and solutions to function at scale.
AI-powered video analytics
One application of artificial intelligence for the video surveillance sector is the use of video analytic solutions to analyze video streams in order to extract pre-determined objects, behaviors, or situations.
To give some examples, AI video analytics can be used to monitor perimeter crossing for border control, detect fevers or masks in airports or public spaces, arms detection in casinos, or be used to filter out alarms triggered by benign movements versus real intrusions.
This application of artificial intelligence leans on its specific branch, machine learning, which uses a complex series of AI models to analyze the content of the video flow, autonomously identifying and classifying the videos according to predefined rules.
AI video analytics yields promising benefits, a reduction in operational costs, and an increase in safety, and a decrease in risk When AI video analytics are used effectively, they yield very promising benefits. A jump in video flow analysis from an average of 10% by humans to 100%, a reduction in operational costs, and an increase in safety, and a decrease in risk.
The use of AI video analytics for surveillance sounds simple enough, however, there are several perceived factors inhibiting security organizations from adopting the technology.
Adopting AI into your video surveillance operation
The security industry is capital intensive, complex in its IT structure, and diverse in situational business needs.
Therefore, resulting in a perception of high effort, time, and costs required to successfully integrate AI into your video surveillance operation. However, these effort constraints can be debunked due to the flexibility of video analytic solutions.
Three areas that deter security organizations from adopting AI
A surveillance operation contains a network of cameras that film with a range of video qualities.
AI video analytics can analyze a range of videos from low to high resolution in thermal, infrared, and visible formats AI video analytics often operate on smart cameras that have the appropriate video image quality for the capacity of content analysis. The costs involved in overhauling legacy camera systems, converting videos into higher quality, or waiting until the current camera network is ready to be replaced in order to integrate AI is expensive, time-consuming, and often unfeasible.
However, not all AI video analytic solutions need to be deployed on edge with smart cameras. Instead, video analytics can be deployed both directly on to the camera or have server-based integration maintaining and scaling to your existing camera network. AI video analytics can also analyze a range of videos from low to high resolution in a variety of formats: thermal, infrared, visible.
Complex IT structure
A single central command center or in-house security network operates in a multi-manufacturer environment. This means cameras, video management systems, and technology partners can be provided by several manufacturers therefore increasing the complexity of successful IT workflows and integrations.
Theft or perimeter infringement can take place in a matter of minutes, therefore the transfer of information between solutions is required to function at top speed. To overcome this complexity, the successful integration of solutions in a multi-manufacturer environment is assured through industry enforced standards set by non-profit organizations.
This allows for third-party solutions such as AI video analytics to be easily integrated into the bulk of software and hardware technologies.
Diversity in security needs
To obtain high performance in a diverse security setting is inherently built into AI video analytic machine The objective of a surveillance operation can vary greatly from one organization to another. Retailers prioritize theft detection, while city governments may be concerned about arms detection or people counting.
The capacity for AI to function with high performance, meanwhile adapting to several organization’s security needs requires algorithms to be trained accordingly. To obtain high performance in a diverse security setting is inherently built into how AI video analytic machine learning model’s function.
AI can be trained to adapt to different environments and uses progressive learning to increase performance overtime. A collaborative effort between security experts, data scientists, and business strategists will ensure high performance and an appropriate application of AI to fit each organization’s specific needs.
Surveillance innovation moving forward
While for some video surveillance organizations, the costs and time associated with successfully integrating AI into their network may seem daunting, there are ways to adapt new technology into an existing operation with minimal effort.
The emerging presence of smart cameras and IoT products will only accelerate the adoption of AI moving forward. If your organization is looking to enhance its operation with emerging technologies, now can be the time.
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content.
In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones.
Beyond video analytics
"Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists.
AI made its initial splash in the physical security market by transforming the effectiveness of video analytics
AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient.
Biometrics with access control
Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit.
AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future.
Smarter perimeter protection
Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial.
AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store
Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video.
Meeting urban needs
Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analyzing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors.
Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic.
Optimize security solutions
As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimize security solutions.
In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioral analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras.
AI surveillance software
In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI
This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities.
Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI.
Fighting illicit trade
Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioral anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future.
AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labor-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles.
During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate.
Role of thermal cameras
These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms.
These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices
These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly.
Temperature detection systems
FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware.
There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems.
Rise of contactless
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions.
Immediate impact of the change includes suspension of time and attendance systems that are touch-based
Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS).
Facial recognition system
Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications.
A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability.
Smart video analytics
Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons.
One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated
One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers.
Enforcing social distancing
Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees.
If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart.
For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service.
COVID-19 White Papers
In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included:
The top five security lessons learned that apply across all industries navigating COVID-19.
Using video analytics to keep staff, visitors and customers safe by enforcing social distancing.
How antimicrobial treatment on door handles and levers can reduce disease spread.
How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term.
Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic.
“True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful.
Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.”
Securing New Ground virtual conference
Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry
Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response.
“We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.”
But some of those conversations are happening from a distance.
Results-oriented approach in remote work environment
After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.”
There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.”
Positives in using multi-factor identity management
He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed.
When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz.
Shift to ‘Zero Trust’ model
All three panelists noted a coming skills gap relating both cyber security and systems integration
Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorized user patterns based on identity, time, and device posture.
For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps.
Skills gap in cyber security and systems integration
A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce.
Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John.
Adoption of temperature sensing solutions
From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present.
“Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said.
“Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free.
Move to a hybrid and flexible work environment
In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach"
An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.”
“Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control.
“Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler.
Continuum of mechanical and electromechanical devices
Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.”
“First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyze people,” said Duato, who also participated in the access control panel.
Shift to touchless, frictionless access control
“The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past."
More and more data is a feature of new systems, but is only helpful when it is analyzed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
Ipsotek, a pioneer in artificial intelligence (AI) powered video analytics, has announced that it has been awarded a security systems project at the Katara Culture Village in Doha, Qatar, in partnership with Mannai Trading Co, a Qatari based company listed on the Qatar Stock Exchange.
Ipsotek’s highly scalable VISuite AI platform and advanced VISuite FR facial recognition system have been selected and approved by the Qatar Ministry of Interior to improve the security and safety as well as provide business intelligence at the iconic cultural village of Katara. VISuite AI enables users to efficiently manage automatically generated alarms in real-time, resulting in reduced operator response times and the ability to track chosen behaviors of interest in complex environments.
VISuite FR automatically detects and informs operators of people that have visited a site multiple times in a configurable timeframe and could pose a security threat. It is optimized for use in busy and security-sensitives scenarios where the highest level of recognition is required.
In addition to the project at Katara in collaboration with Mannai ICT, Qatar’s renowned Systems Integrator and the Information & Communication Technology Division of Mannai Corporation, Ipsotek has a number of other major projects across Qatar. The company has also announced that it has appointed Mr Jihad Marei as Country Manager for Qatar and is in the process of opening a new office in one of Qatar’s Free Zones.
Key strategic partners
We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co."
Also known as ‘The Valley of Cultures’, Katara is one of the main cultural destinations in Qatar, featuring a museum, open amphitheatre, opera house, movie theater, conference hall, beach, Souq and multiple restaurants. Katara hosts hundreds of events and attracts over 10 million visitors each year.
Charlie Bennett, Ipsotek Head of Sales for EMEA said: “We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co. Mannai has become one of our key strategic partners in Qatar and we have enjoyed collaborating on several projects together this year, which is why we have also chosen to grow our presence in country further by employing Jihad Marei as Country Manager and open a dedicated office in Qatar.”
Artificial intelligence video analytics
Shamnad Karuvadi, Deputy Manager ELV Physical Security at Mannai Trading Co said: “We are very pleased to be working with Ipsotek as our solution partner for Artificial Intelligence Video Analytics. Ipsotek has added a great deal of value to the Mannai solution portfolio and together we look forward to providing the highest levels of safety and security to protect critical infrastructure. We would like to extend our sincere thanks to Charlie Bennet & Mr. Jihad Marei at Ipsotek for their extensive support.”
Calipsa, a provider of deep-learning powered video analytics for false alarm reduction, announces that its false alarm filtering platform is being used by Richmond, British Columbia-based Radius Security.
Radius Security is the security systems and monitoring branch of Vancouver Fire and Security and the first Canadian monitoring center to adopt the cloud-based Calipsa technology. Calipsa’s false alarm reduction technology uses artificial intelligence with deep learning technology to filter out false alarms with a 99.5% accuracy rate.
Recognizing genuine alarms
Calipsa’s technology recognizes genuine alarms caused by human or vehicle movement, while filtering out notifications resulting from nuisance factors such as animals, lighting, weather or foliage.
With our Redhanded Human Detection solution, our focus is on catching criminals in the act"
Aleksei Bulavko, research, development and production manager at Radius Security, said the Calipsa technology would further enhance his company’s reputation as a top-tier monitoring station. “With our Redhanded Human Detection solution, our focus is on catching criminals in the act,” he said. “Calipsa enables us to do this at a greater capacity, meaning an even faster police response time for our customers.”
False alarm filtering platform
Brian Baker, vice president, Americas, Calipsa, said the false alarm filtering platform will enhance Radius Security operators' efficiency by enabling them to concentrate on genuine alarms. “Also, Calipsa’s cloud-based technology requires Radius Security to install no hardware devices,” he said.
“Initial installation and future upgrades are quickly and remotely integrated with station operating software and customer cameras without incurring on-site installation costs.” Calipsa’s false alarm reduction software is easily scalable, making it ideal for any growing monitoring station and customer business. A platform dashboard enables station managers to monitor the software’s performance, including detecting idle cameras that may need replacement or repositioning.
Security is the biggest concern for military facilities. Modern military facilities face a wide variety of risks, from cyber attacks to data theft to terrorist attacks. The Corpus Christi Naval Air Station in Corpus Christi, Texas for example, dealt with three separate attempted intrusions in a year and a half. In one incident, man driving a stolen SUV entered the base and attempted to exit through a separate entrance, but crashed his car and was then shot by security personnel.
In another incident, just eight months later, the base went on lockdown again before an armed man was taken into custody. Then, in the third incident, seven months later, there was a third attempt to break into the base, this time by a man with known ties to terrorist groups.
Protect sensitive facilities
The man fired at the security guard at an entrance gate and struck her bulletproof vest before she raised the barrier to prevent the attacker from getting inside the base. The base’s security did a good job of preventing any serious damage during these attacks, but with the frequency of these incidents, more modern security may be needed to ensure that the next attack doesn’t end in catastrophe.
Modern times call for modern security solutions, and Helios is the perfect option to protect sensitive facilities
Modern times call for modern security solutions, and Helios by UVeye is the perfect option to protect sensitive facilities. Helios is safer, improves security, makes security officers’ jobs easier, works in extreme conditions, and can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19. Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras.
Improved safety for facilities
It alerts the user on any irregularities or foreign objects hidden in the undercarriage. Inspecting the undercarriages of vehicles is very difficult for security personnel. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspect the undercarriage, they may not know what to look for. They may not recognize a threat and allow a vehicle with a weapon, bomb, or other illicit or dangerous item to enter the facility.
Security officers put themselves at great risk by manually inspecting vehicles, as evidenced by the attempted terrorist attack in Corpus Christi in May. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images and checking for anything suspicious or unusual in the undercarriage.
Detecting potential threats
Scanning all vehicle types for undercarriage threats
Automatic detection of illicit materials below the vehicle on the first pass
Full integration to barriers, bollards and access control systems
Driver and passenger fever detection capabilities
No matter how well trained a security officer is, all humans make mistakes. However, with Helios, the chances of human error are greatly reduced. The system produces high-quality images of the undercarriages and alerts the security officer of any irregularities. It will even detect issues in the undercarriage of a vehicle passing through the system for the first time. Detecting potential threats is easy with UVIS.
Works in extreme conditions
The high-resolution images allow a security officer to see the entire undercarriage very clearly to determine whether there is anything suspicious. Instead of manually inspecting the vehicle and putting themselves at risk, security officers can inspect the vehicle from a more relaxed and safer environment and zoom in on the smallest details.
Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by massive vehicles
Plus, Helios provides a side-by-side view of previous scans from the same vehicle if it has gone through the system before to make it easier for the officer to notice any differences. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain.
UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers, which can identify visitors with potential fevers, improving the safety of everyone on the base. UVeye fully supports 3rd party integration and provides a multiple layer of security for any facility
Integrations made in the past:
Face Detection / Recognition
Arm Barriers / Bollards
VMS (Video Management System)
Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralized management system enables the client to access the different systems deployed and manage the different users and historical data.
Access control systems
The undercarriage of a vehicle is one of the most important parts of the vehicle to inspect, but also one of the most difficult areas to inspect. Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal and dangerous items from entering military facilities.
It can make everyone in the facility safer, including security officers, who will no longer need to manually inspect vehicles and put themselves in harm’s way. Integrating with other security and access control systems can provide a multi layer approach to tighten the entry and exit points to any sensitive site while keeping personnel and data safe.
A frequent target for terrorism, airports faces considerable challenges in securing the flow of traffic. Concerns over security can ground flights, grinding operations to a halt. Whether one needs to inspect all vehicles entering the airport grounds or just those entering higher-security areas like the apron and the container space, there is no room for long waits during inspections.
Passengers are counting on their flights leaving on time, and security delays could lead to flight delays. However, one can’t afford to compromise the security standards either.
Propane gas cylinders
While security is usually heavy in the terminal buildings themselves, in some international and local airports, there are not enough measures in place in the external road and parking areas leading to the departure and arrival zones.
The attack resulted in ‘only’ five people injured and heavy damage to the terminal building
For example, on June 30, 2007, a Jeep Cherokee laden with propane gas cylinders and gasoline cans was driven at a high speed into the doors of the Glasgow Airport departure area on one of the busiest days of the year. The attack resulted in ‘only’ five people injured and heavy damage to the terminal building. Incidents like this one really emphasized the need for an automatic and efficient method for inspecting vehicles entering the different areas in and around the airport.
Heavy traffic control
The airport apron, flight line or ramp is the area of an airport where aircraft are parked, unloaded or loaded, refilled, or boarded. In most airports, the security regulations in this area are heavy, and only authorized, trained personnel are allowed to drive in and out while withholding heavy traffic control rules.
One can only imagine the danger of terrorists or other hostile people entering in an authorized vehicle. There needs to be a method to make sure these types of people cannot use fake license plates if the recurring vehicle list does get into the wrong hands. While clearly the number of civilian passengers who use airports has risen dramatically as time has gone by, the risks associated with airports and airline travel have also increased.
Identifying vehicle passengers
The device is available in both a mobile and a stationary, fixed version and works in extreme conditions
The threat of bombs or cargo-related explosives is significant, but security measures have not necessarily risen at the same rate as threats and number of flights and passengers. The financial and physical risks of illicit and dangerous materials entering sensitive areas in and around an airport are clear, and a new generation of screening is required to tackle these challenges. UVeye scans, analyses, and records all passing vehicles, ensuring security while also keeping flights on schedule.
Helios by UVeye is the perfect option to protect both the access roads and parking facilities around the airport and important areas like the apron. Helios improves security while keeping security personnel safe. The device is available in both a mobile and a stationary, fixed version and works in extreme conditions. Their technology can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19.
Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. It alerts security personnel about any irregularities or foreign objects hidden in the undercarriage, whether its weapons intended to be used in a terrorist attack, improvised explosive devices, or illegal cargo to be loaded onto a plane in the apron of the airport.
Inspecting the undercarriages of vehicles is very difficult for security personnel and is sometimes neglected due to the number of vehicles entering an airport. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspected the undercarriage, they probably didn’t know what to look for.
Reducing inspection times
UVeye is here to solve this problem by providing drive-through solutions in selected access points
UVeye has built its products as drive-through solutions that reduce inspection times to as little as a few seconds, supporting a quick flow of vehicles entering or leaving the premises. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images on a tablet or computer screen, checking for anything suspicious or unusual in the undercarriage, automatically marked by the system.
Many airports do not have enough staff or the capacity to inspect every vehicle entering or leaving secure areas. UVeye is here to solve this problem by providing drive-through solutions in selected access points, alerting security personnel of any irregularities or potential threats attached to a vehicle. Helios is the only product on the market able to detect issues in the undercarriage of a vehicle passing through the system for the first time.
Fingerprint ID feature
The apron of the airport is the most sensitive area of the facility, and with UVeye’s technology and unique fingerprint ID feature, every vehicle entering or exiting the apron will be marked using artificial intelligence and receive a unique ID that will be saved in the database. This way, security personnel will not need to rely on license plates alone when inspecting vehicles on the authorized vehicle list.
If someone attempts to enter using a fraudulent license plate, the system will recognize that it is not the same vehicle, and the attempted trespassers will be stopped in their tracks. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles like trucks and buses. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain.
Airport access roads
UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers entering the external airport access roads, which can help identify visitors with potential fevers, improving the safety of everyone in and around the airport.
Airports around the world can enhance their security efforts with automatic vehicle inspection systems
Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralized management system enables the client to access the different systems deployed and manage the different users and historical data. Airports around the world can enhance their security efforts with automatic vehicle inspection systems, providing an extended layer of safety in and around the airport.
Access control systems
Uveye took into consideration heavy traffic entering the access and parking areas of an airport when it built its drive-through scanner, Helios, which can quickly find any threat attached to or hidden in the undercarriage without slowing down vehicle traffic.
Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal or dangerous items from entering the apron of the airport and potentially accessing the airplanes about to take flight. Integrating Helios with other security and access control systems can provide a multi-layer approach that will tighten the entry and exit points to any sensitive site while keeping personnel and data safe. UVeye is ideal for airports and also can be implemented at border crossings, seaports, military bases, embassies, data centers, and other secure perimeters.
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?
Facial recognition is the latest technology to be targeted because of concerns about privacy. If such concerns cloud the public perception, they can be harmful to technology markets. Whether the concerns are genuine or based on misinformation is often beside the point; the practical damage has already been done. But beyond market demand, what is the impact of privacy concerns on technology innovation? We asked this week’s Expert Panel Roundtable: Are privacy concerns stifling innovation in security and related markets?