Artificial intelligence (AI)
Global threat detection and security technologies company, Smiths Detection is showcasing for the first time an integrated checkpoint solution at inter airport Europe 2019, which harnesses biometric technology to enable risk-based screening practices. With air passenger growth predicted to double by 2037, the aviation industry will be challenged to support this capacity growth while providing operational efficiencies and meeting shifting passenger expectations of the airport experience. To cope with this growth, biometric technology is being increasingly adopted at airport Border Control gates, bag drop and boarding gates. As pioneers in providing checkpoint solutions to airports across the world, Smiths Detection has partnered with experts in the field of biometry to create, for the first time, a proof of concept which integrates biometric identity management solutions with class-leading screening solutions. Integration of biometrics Inter airport delegates are invited to experience the biometric capable checkpoint in action – which also employs Smiths Detection’s advanced CT scanner, HI-SCAN 6040 CTiX, the iCMORE Weapons automatic object recognition capability and the advanced tray return system, iLane.evo. Biometrics is the ‘unique identifier’ for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their trays to enable real-time risk-based screening. We are very excited to be driving biometric checkpoint technology forward in a rapidly developing marketplace" Risk-based screening is designed to increase operational efficiency and effectiveness through continual risk assessments relevant to the individual passenger journey, resulting in shorter and easier journeys for passengers. Through passenger and tray identification, new data insights can be gathered to inform decision making at airports - based on flights, airlines or destinations. Matching passengers with trays also enables the sharing of screening results with transit or arrival airports, and the combination of hold baggage and checkpoint screening results. Seamless checkpoint security "At Smiths Detection, we’re dedicated to delivering a seamless passenger journey and we are very excited to be driving biometric checkpoint technology forward in a rapidly developing marketplace,” said Smiths Detection Vice President Europe, Africa and Marketing Tony Tielen. "As a trusted partner to airports across the world, we are working with the aviation industry to deliver risk-based screening at departure, transit and arrival airports to streamline the checkpoint journey to make it even safer and more efficient.” he adds. "Biometrics is an urgently needed solution to provide seamless checkpoint security,” said Global Market Director Aviation, Richard Thompson. "Ever increasing air passenger traffic plus advances in biometrics, artificial intelligence and integrated screening technology mean that risk-based screening is now firmly on the fast track. We look forward to offering a preview of the checkpoint solution of the future to delegates at inter airport Europe 2019.”
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0 enables security analysts to tailor the way they visualize incident and indicator flows, allowing security teams to better manage and automate incident response. Key updates to Demisto v5.0 include - Reimagined User Interface - Brand new UI that streamlines global navigation while also enhancing the delivery of information within each incident Enhanced Threat Intelligence - Access rich indicator intelligence from integrated sources and take action in a scalable manner Database Scaling - Install the Demisto app server and databases on separate machines. Multi-tier configurations let you scale your environment and manage resources efficiently SOAR on the fly - Introduction of chat support in the mobile application, letting you update relevant stakeholders on-the-go and ability to manage notifications from the web app, choosing to receive updates on email, Slack, Mattermost, or the mobile app Demisto v5.0 security platform Rishi Bhargava, VP Product Strategy, Demisto, a Palo Alto Networks company comments, “Demisto v5.0 is packed with new features suggested to us by our community of customers, partners, and independent users. We’ve also introduced changes that facilitate improved load management and scaling of resources, ensuring that organizations are secure irrespective of the pace at which they grow”. He adds, “Back in 2015, we recognized that security teams wilt under dual pressures every day: an ever-increasing volume of security alerts, and insufficient resources to address these alerts. Over the past four years, our customers have seen us as the only platform that has combined security orchestration, incident management, and real-time collaboration to make their lives easier”. Security Orchestration and incident management Rishi further stated, “Automating as much as possible hands time back to security teams to investigate, learn and improve, and sometimes just take a deep breath. Since joining forces with Palo Alto Networks, we have accelerated our go-to-market and made inroads into use cases outside of traditional security operations.”
The advances in video analytics – including improved classification, accuracy and speed – were unveiled at a Global Partners Summit of international security and video surveillance professionals, hosted by IDIS in Seoul, South Korea. The three day event, attended by senior executives from security distributors from 23 countries, focused on how IDIS is responding to market trends and needs, developing end-to-end solutions, including specialist technologies for a range of vertical markets, and pushing forward with improvements to the IDIS Deep Learning Engine, the technology which powers the company’s AI in the Box and IDIS Deep Learning Analytics solutions. Reduce false alarms, people counting, fall detection Earlier this year IDLA Version 3.0 was introduced as a service module for up to 80 channels within the IDIS Solution Suite VMS and it set new performance benchmarks by achieving an accuracy of 97% - 98% and dramatically reduces false alarms. Responding to customer demand for easier, more affordable analytics for smaller applications, IDIS also launched its DV-2116 AI in the Box solution. Delegates learned of future enhancements in meta-data searching by class, color and number Delegates learned of future enhancements in meta-data searching by class, color and number, plus the ability to search a specific area of interest. People counting, fall detection and the ability to search by the direction of an object’s movement were also previewed and delegates got advanced notice of a new range of AI-ready 5MP cameras, featuring deep learning on-the-edge analytics, due for release next year. Growing importance of cyber security The global summit also previewed IDIS’s ambitious video product and technology roadmap for 2020, further building out its end-to-end solutions for core vertical market sectors. Innovations in recording and camera technology, and the growing importance of cyber security, extended warranties and the advantages of delivering lower Total Cost of Ownership (TCO) and lower Total Cost to Serve for systems integrators and installers were among key topics discussed at the event. Strategies for product development IDIS works closely with its partners and hosts the annual summit as an opportunity to exchange market insights and steer its strategies for product development, technical support and marketing. Partners shared best practice implementations and case studies in core vertical markets including retail, education, logistics and distribution, and hotels. Joon Jun, President of the IDIS Global Business Division, recognized outstanding project implementations and presented special awards for best practice to Alarm Automatika from Croatia and BTCO from Chile. Video surveillance manufacturer This collaborative approach, focusing on long term partnerships is a key element in the company’s success. It’s a customer-focused model that has seen IDIS grow continuously since 1997 to become Korea’s pioneer in-country video surveillance manufacturer, with regional operations now expanding across over 50 countries. Together we are giving our customers the most advanced video surveillance solutions" Concluding the summit, special partner awards were presented by Y. D. Kim, CEO of IDIS, recognizing outstanding collaboration and sales growth over the last year. These were given to Alarm Automatica of Croatia, CCTV Center of Spain, EPCOM of Mexico, JES CQTEC of Thailand and Secure Inc of Japan Protection against cyber-security risks “The expertise, energy and commitment from all our partners at this year’s summit demonstrates, again, that collaboration is that the best route to success,” said Joon Jun, President of the IDIS Global Business Division. “Together we are giving our customers the most advanced video surveillance solutions, offering industry-best TCO value, ease-of-use and installation, scalability and protection against cyber-security risks.”
Security and Safety Things GmbH demonstrated their open IoT platform for video surveillance cameras at GSX in Chicago in September, showcasing real world examples of the Security and Safety Things camera operating system and global IoT marketplace in preparation for worldwide launch early next year. The Security and Safety Things OS, the world’s first open and standardized operating system for surveillance cameras, has a growing list of manufacturer partners who have adopted the OS for use in their cameras and more than 15 partner software developers who have produced some 40 apps ready to be sold in the app store. Innovative AI applications At GSX we also demonstrated several prototype cameras using our operating system" “We are very excited by our rapidly growing ecosystem of partner developers that include Microsoft Azure Cognitive Services with their innovative AI applications, which range from real-time edge analytics to deep learning,” said Hartmut Schaper, CEO of Security and Safety Things. “Along with the great diversity of apps already in our marketplace, at GSX we also demonstrated several prototype cameras using our operating system from various camera manufacturer partners.” An innovative airport-themed booth at GSX illustrated video analytics use cases in three core areas of an airport: The terminal, the boarding gate and the duty-free shops. The terminal section featured cross-domain use cases with Microsoft Azure Cognitive Services and Here Technologies, presenting how security and travel journeys can be improved with deep learning. Integrated camera analytics data The boarding gate section focused on security and safety use cases, with different applications such as detecting abandoned luggage. In the duty-free store, partner developers illustrated how video analytics improve store operations and how neural network learning enhances the shopping experience of customers. These benefits are part of our mission and that of our more than 15 developer partners to help increase security" The app from Here Technologies illustrated the possibilities of an enhanced travel journey with integrated camera analytics data and mapping services to better manage and inform users of traffic congestion, parking availability and payment within the airport setting. “These benefits are part of our mission and that of our more than 15 developer partners to help increase security, optimize operations and improve customer experience at airports and many other environments as well,” said Emmanuel Ventadour, vice president, Sales & Marketing, Security and Safety Things. All applications ran on prototype cameras with the Security and Safety Things OS from members of the Open Security and Safety Alliance (OSSA).
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT Increases Threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organization recognize and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organizations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organizations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognizing and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embraces more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centered around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offers complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasized systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognize a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the big picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.”Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorized, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorized that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarizes the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organizations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command center space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimize these centers. Stay tuned for the full GSX 2019 show review.
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognize the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognizing gun threats Aegis AI offers such a technology, which the company says enables existing security cameras to automatically recognize gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognize what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Aegis AI. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Aegis AI. “People are in fight-or-flight response and prioritize immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Aegis AI helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximize survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Aegis AI with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Aegis mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Aegis is a software-only solution that plugs into security camera hardware and software, including VMSAegis' solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Aegis. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Aegis is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Aegis’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Aegis can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Aegis is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organizations.” There are no privacy or compliance concerns because Aegis stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
The first China International Import Expo was held on November 5, 2018 in Shanghai. As the world's first import-themed national exhibition, it attracted more than 3,600 exhibitors from 172 countries, regions and international organizations, making security a top priority during the event. As an essential force in the global security industry, Dahua Technology has performed outstandingly in assuring the security of many international events such as the Rio Olympic Games, G20 Hangzhou Summit and the 9th BRICS Summit. This time, Dahua Technology has shouldered the security responsibility again with its state-of-the-art products and solutions. Event security Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment The Expo expected a total number of 800,000 visitors, as well as tens of thousands of displayed goods, coming from more than 3,000 companies in more than 130 countries, demanding safety as the top priority in the venue. Integrating data from various departments as well as monitoring the venue and command dispatching became a huge challenge for the security and police personnel. Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment in the core locations of the Shanghai National Convention and Exhibition Center and its surrounding areas, using video AR, face recognition, ANPR, video structuring, intelligent analysis and other technologies to improve the venue’s level of security. Artificial Intelligence solutions In order to further enlarge the area security coverage, Dahua Technology set up video surveillance points in key areas of Shanghai National Convention and Exhibition Center including entrance and exit points of the outer ring, interior area, office buildings, as well the surrounding major passages, plazas, commanding points, subway entrances and exits, pedestrian bridges, etc. In addition to the already pre-installed surveillance equipment, new monitoring devices were also added to make sure that there will be no blind spots and interruptions of the video transmission in the whole area. Panoramic cameras Dahua panoramic cameras installed at the commanding point of the Shanghai National Convention and Exhibition Center employs AR technology in order to achieve omni-directional and no blind spot surveillance. Additionally, the panoramic cameras deployed inside the exhibition center monitor the situation inside the exhibition hall and obtain real-time dynamic information that builds a three-dimensional platform that are visual, controllable and schedulable to facilitate an efficient security operation. Intelligent video analysis system Intelligent video analysis system was built in the exhibition area to classify the acquired data Moreover, intelligent video analysis system was built in the exhibition area to classify the acquired data according to the preset rules and application requirements, such as crowd detection, behavior analysis, map search, etc. This system expands and deepens the application of video information in the efficiency of public security. Furthermore, through the Dahua Deep Learning Series video alert camera, people who would illegally climb over the perimeter fence built within the 4-kilometer area of the exhibition hall would be identified and captured. Dahua face recognition system The Dahua face recognition system deployed at the entrance and exit of the exhibition center could recognize the identity of all visitors in real time by comparing their ID card’s recorded information with the face photo captured by the front-end smart camera. This system did not just improve the traffic efficiency of the entrance and exit points, but also guaranteed the safety and accuracy of the identification of people walking in and out of the venue. High-definition smart cameras Dahua high-definition smart cameras were also set up at the entrance and exit around the transportation hub of the Shanghai National Convention and Exhibition Center to monitor and track high-risk vehicles and people in real-time. This effectively improved the road management and traffic control in the area. Fully structured cameras capturing real-time videos of motor vehicles, pedestrians and non-motor vehicles were deployed in the surrounding area, which also support face and body recognition for a more comprehensive security. Video network platform Video network platform automatically connects the video and image data captured within the area Additionally, a video network platform automatically connects the video and image data captured within the area to the public security command center, creating a resource sharing integration of valuable information. China International Import Expo has facilitated countries and regions all over the world in strengthening economic cooperation and trade, and promoting global trade and world economic growth. Dahua AI solutions has greatly enhanced the prevention and control measures within the key areas around the venue, assuring security during the Expo. Cutting-edge security solutions After the event, Dahua Technology received letters from the Shanghai Public Security Bureau, Qingpu Public Security Bureau, Changning Public Security Bureau, Shanghai Hongqiao Integrated Transportation Hub Emergency Response Center, and other offices, thanking Dahua Technology for its strong support and contributions to the success of the security management during the event. From the Rio Olympic Games to the G20 Hangzhou Summit, from the 9th BRICS Summit to the first China International Import Expo, Dahua Technology always accomplishes various security tasks with high quality and efficiency. With its cutting-edge products and solutions, quality operation services and professional technical team, Dahua Technology will continue to assist more major international events in the future.
Delfina Chain, Sr Associate Customer Engagement & Development at Flashpoint, discusses what resources defenders must access to in order to keep a finger on the pulse of the cybercriminal underground. Artificial intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices - such as voice-controlled personal assistants and self-directed vacuum cleaners - to ground-breaking business applications that optimize everything from drug discovery to financial portfolio management. So naturally, there is growing interest within the information security community around how we can leverage AI - which encompasses the concepts of machine learning (ML) and deep learning (DL) - to combat cyber threats. AI-enhanced cyber security The effectiveness and scalability of cybersecurity-related tasks has already been enhanced by AI The effectiveness and scalability of cybersecurity-related tasks, such as malware and spam detection, has already been enhanced by AI, and many expect ongoing AI innovations to have a transformative impact on cyber defence capabilities. However, security practitioners must also recognize that the rise of AI presents a potent opportunity for cybercriminals to optimize their malicious activities. Much like the rise of cybercrime-as-a-service offerings in the underground economy, threat-actor adoption of AI technology is expected to lower barriers to entry for lower-skilled actors seeking to conduct advanced malicious operations. A report from the Future of Humanity Institute emphasizes the potential for AI to be used toward beneficial and harmful ends within the cyber realm, which is amplified by its efficiency, scalability, diffusibility, and potential to exceed human capabilities. Encrypted chat services Potential uses of AI among cybercriminals could include the development of highly evasive malware, the ability for automated systems to exhibit human-like behaviour during denial-of-service attacks, and the optimization of activities such as vulnerability discovery and target prioritization. Fortunately, defenders have a leg up over adversaries in this arms race to harness the power of AI technology, largely due to the time- and resource-intensive nature of deploying AI at its current stage in development. The purpose of intelligence is to inform a course of action. For defenders, this course of action should be guided by the level of risk (likelihood x potential impact) posed by a threat. The best way to evaluate how likely a threat is to manifest is by monitoring threat-actor activity on the deep-and-dark-web (DDW) forums, underground marketplaces, and encrypted chat services on which they exchange resources and discuss their tactics, techniques, and procedures (TTPs). Cobalt Strike threat-emulation software Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of way Cybercriminal abuse of technology is nothing new, and by gaining visibility into adversaries’ ongoing efforts to develop more advanced TTPs, defenders can better anticipate and defend against evolving attack methods. Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of ways, ranging from the use of pirated versions of the Cobalt Strike threat-emulation software to elude server fingerprinting to the use of tools designed to aid visually impaired or dyslexic individuals to bypass CAPTCHA in order to deliver automated spam. EMV-chip technology Flashpoint analysts also observe adversaries adapting their TTPs in response to evolving security technologies, such as the rise of ATM shimmers in response to EMV-chip technology. In all of these instances, Flashpoint analysts provided customers with the technical and contextual details needed take proactive action in defending their networks against these TTPs. When adversaries’ abuse of AI technology begins to escalate, their activity within DDW and encrypted channels will be one of the earliest and most telling indicators. So by establishing access to the resources needed to keep a finger on the pulse of the cybercriminal underground, defenders can rest easy knowing they’re laying the groundwork needed to be among the first to know when threat actors develop new ways of abusing AI and other emerging technologies.
Each day, over 55,000 electrical substations in the United States funnel massive amounts of energy to homes and businesses across the country. An array of specialized equipment allows these facilities to keep up with demand, and each component must run smoothly to adequately transfer and distribute energy. Housing mission-critical assets vital to the community means that substations must track everything—from condition monitoring to intrusion and sabotage threats. Thermal imaging cameras, video classification analytics, and radiometric measurement offer unmatched maintenance and security insight for substations and help prevent costly issues that hurt the bottom line. AI and deep learning technologies Advancements in artificial intelligence technologies are expanding the capability of security systems Advancements in artificial intelligence and deep learning technologies are expanding the capability of security systems. As security solutions improve, customer expectations grow. Systems that were once limited to perimeter protection are now able to provide valuable process efficiency and maintenance information. Substations should consider integrating new technology that improves efficiency and safety as they move to satisfy NERC CIP-014 requirements. Problematic heating and cooling connections can plague substations. Overheating and burning a transformer is a costly, potentially multimillion-dollar error that can take several months to correct. Beyond damage costs, the abrupt loss of equipment can lead to extended service interruptions and significant revenue loss. The consequences of equipment failure highlight the importance of asset monitoring, asset resiliency, and predictive maintenance for substations. Radiometric thermal cameras Integrating cutting-edge technologies like radiometric thermal cameras and temperature trend analysis software allows facility operators to remotely inspect equipment and quickly detect issues, preventing overheating and fires. Image quality and software compatibility are vital in planning an asset monitoring ecosystem. To best serve both the security and condition monitoring needs of substations, thermal sensor manufacturer FLIR Systems and software developer Embedded Logix collaborated to create a multi-purpose solution. Security and asset monitoring For over 30 years, FLIR has developed security and asset monitoring solutions for utility providers For over 30 years, FLIR has developed security and asset monitoring solutions for utility providers. A full lineup of fixed and pan-tilt thermal cameras allow security operators to monitor assets and perimeters in complete darkness, smoke, fog, and harsh weather conditions. FLIR thermal cameras provide superior resolution, capturing sharp imagery and minute details for high-performance video analytics and immediate threat detection. Quick intervention during intrusions prevents escalation, and rapid detection with thermal imaging supports fast response time. Smart-LX Sensor Gateway Recognizing threats before they ever reach the fence line deters theft, vandalism, and assault, keeping facility personnel safe and reducing the risk of equipment repair and legal costs. As an industry leader in thermal imaging, FLIR looks to partner with other innovative solution providers to create more advanced technologies. Embedded Logix, a Detroit, Michigan-based test and measurement solutions provider for the utility, plastic, food, and metal industries emerged as an ideal partner to integrate smart analytics software into thermal sensors. Their Smart-LX Sensor Gateway is an open-architecture platform that features Smart-LX Analytics with support for infrared cameras, programmable logic controllers, and SCADA systems. It opened the door for a complete predictive maintenance solution. FLIR thermal cameras Partnering with FLIR means being in the center of the infrared universe" The Smart-LX system allows both maintenance and security personnel to leverage networked thermal imagers on a single platform. By 2012, Embedded Logix was FLIR’s exclusive smart sensor software partner for temperature trending in predictive maintenance, bringing the Smart-LX platform to FLIR thermal cameras. “Partnering with FLIR means being in the center of the infrared universe. We can’t imagine any better product lineup to feed data into our Smart-LX Analytics,” said Deborah McLeod, president of Embedded Logix. “We have bench tested many other brands over the years, but FLIR’s products always come out on top, and that is why we recommend FLIR cameras to our customers. When you combine Smart-LX Analytics with FLIR cameras you turn an incredible sensor into an extraordinary solution.” Smart-LX Analytics Embedded Logix Smart-LX Analytics read, process, analyze, and create a visualization of sensor readings, generating asset performance reports on trends and rules that can be sent to maintenance personnel for further assessment. The software adapts over time with customer input, relying on user feedback to create an expert system. The Smart-LX platform works with both legacy and new equipment, analyzing signals from all sensors and systems, and is capable of aggregating information into VMS, OSI PI, and SCADA platforms. The FLIR FC-R fixed thermal camera leverages a radiometric sensor for noncontact temperature measurement FLIR offers several high-performance thermal imaging solutions for Smart-LX integration, including the FLIR A310 and FLIR FC-R Series cameras. Dual thermal and optical sensors on the FLIR A310 PT offer reliable perimeter protection and automated condition monitoring while pan/tilt controls maximize coverage. The onboard radiometric thermal sensor measures slight changes in surface temperature, allowing the A310 PT to monitor hotspots on equipment and alert an operator if temperatures exceed preset levels. FC-R fixed thermal camera The FLIR FC-R fixed thermal camera leverages a radiometric sensor for noncontact temperature measurement. Onboard human and vehicle classification analytics offer reliable intrusion detection and work in tandem with external monitoring systems to quickly alert operators and security personnel. “FLIR’s innovative A310F, A310PT, and FC-R radiometric thermal cameras have been paramount in substation monitoring for years,” said Michael Chaffee, director of business development at FLIR. “With the addition of Embedded Logix and its SmartLX software, our customers can take FLIR thermal cameras to the next level. When combined, FLIR cameras and Smart-LX software create a data goldmine, allowing a more frequent analysis of substation assets right from the security control room.” Facility security FLIR and Embedded Logix systems revolve around facility security and asset monitoring FLIR and Embedded Logix systems revolve around facility security and asset monitoring. Installing different cameras and network components throughout a substation creates an ecosystem ready to detect and prevent issues. Most security and asset monitoring systems from FLIR and Embedded Logix begin with several FLIR FC-ID cameras along the perimeter of the substation, one A310 PT mounted in the center of the substation, FC-R or A310F cameras installed around high priority assets, and several Smart-LX Sensor Gateways. When the system detects an object of interest, FLIR FC-ID cameras trigger the A310 PT camera to track and zoom on the object for further threat assessment, allowing security personnel to quickly and safely gauge the situation. Condition monitoring thermal imagers can continuously survey any asset in their field of view. Fixed FLIR A310F camera Fixed FLIR A310F and FC-R cameras monitor specific equipment 24/7, while the A310 PT can focus on multiple areas, viewing transformer connections, incoming power transmission lines, switch gears, fans, and more. Generated reports compare the performance of similar assets across all stations Smart-LX Sensor Gateways control the A310 PT preset scanning to gather temperature information on equipment, triggering an alarm if a temperature exceeds the preset threshold. Generated reports compare the performance of similar assets across all stations, address historical temperature trends, and label each temperature reading with the substation location, asset ID, and asset class information. This reporting is vital, as temperature trends can indicate trouble even when alarms remain untriggered. Remote monitoring “If the temperature is rising and falling on one asset, but the temperature on the other assets are steady, it can indicate a problem,” McLeod explained. “Even if the asset doesn’t reach the temperature threshold, the temperature slowly creeping up to that threshold is valuable information.” FLIR and Embedded Logix systems leverage remote monitoring to catch issues before they occur, preventing expensive downtime and maximizing substation efficiency. Predictive maintenance programs can identify poor-performing components, allowing operations teams to decide whether to proactively replace components or to continue monitoring. An unknown failure could cause catastrophic damage to other substation elements, causing customer outages and costing the utility millions of dollars. Thermal imaging Smart-LX Sensor Gateways also allow thermographers to inspect equipment remotely “The FLIR and Embedded Logix solution allows you to qualify with more frequency,” said Chaffee. “It ultimately enables you to save money and identify failures sooner. It’s much more expensive to replace a component after failure versus pre-failure. When a failure happens, you shut down the substation and part of the grid, which costs a lot of money.” Smart-LX Sensor Gateways also allow thermographers to inspect equipment remotely, improving efficiency during repairs. Traditionally, a thermographer would report to a substation to manually inspect equipment in need of service. Using a handheld thermal imager, the thermographer would take temperature measurements and check for load balance to determine whether equipment should be taken offline for repair. The need for a pre-work assessment and post-repair verification can make for long days. Embedded Logix Smart-LX Sensor Gateways remove this pain point. Live data access The Smart-LX Sensor Gateways give thermographers the ability to inspect equipment remotely and access live data from each networked FLIR thermal camera. Real-time temperature measurement and analytics allow the maintenance crew to confirm repairs or safely identify any additional issues. Thermographers would only need to go to a site when something is critical" “The FLIR and Embedded Logix solution enhances the role of thermographers,” Chaffee said. “Not needing to drive hundreds of miles to do a regularly scheduled thermal scan saves a lot of money. Your thermography team can scan safely, and with more frequency, from the security operations center. Thermographers would only need to go to a site when something is critical. Time is money, so being more productive as a utility and building a substation predictive maintenance program is an important element.” Critical asset monitoring Smart-LX Software works continuously to monitor critical equipment and uncover even small changes that can indicate impending failure. Intelligent maintenance and security systems are making substations safer and more efficient, positively impacting the bottom line. The insurance deductible of a significant substation asset can be hundreds of thousands of dollars. Detecting just one instance of equipment failure can prevent inordinate costs. “The Smart-LX Software solution reduces the cost of an event by detecting it much earlier. Instead of detecting a fire, you’re preventing a fire,” McLeod added. “It’s important for all stakeholders that utilities monitor changes in asset health as a means of improving reliability and reducing the total cost of repairs. Asset security and management Utilities are moving towards proactive deterrence and away from reactive monitoring He adds, “Stakeholders want to see that steps are being taken to reduce insurance claims from unnecessary escalations when a malfunctioning asset is not discovered until it fails and takes out expensive assets or infrastructure around it. Preventing costly downtime by repairing equipment at the first sign of trouble can reduce the number of unscheduled downtime events dramatically and create significant cost-savings.” Leveraging radiometric thermal cameras and analytics for both security and asset monitoring represents a paradigm shift. Utilities are moving towards proactive deterrence and away from reactive monitoring. Substation security FLIR radiometric thermal cameras and Embedded Logix Smart-LX Sensor Gateways safeguard substations and reduce the risk of critical equipment failure. Investing in stronger security keeps substations and their assets safe, and innovative, multipurpose solutions from FLIR and Embedded Logix create a win-win for utility providers throughout the country.
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?