SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • ISC West
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Body worn video cameras
    Ajax StarterKit Plus

    Ajax StarterKit Plus

    VIVOTEK  Indoor Dome Camera

    VIVOTEK Indoor Dome Camera

    Dahua Technology 50m Security Radar

    Dahua Technology 50m Security Radar

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • ISC West
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Body worn video cameras
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hanwha Secures Kirkland’s Stores With Its Wisenet X Series HD Dome Cameras
    • Omnigo Software Security And Risk Management System Installed By Major Casino Operators In Macau, China
    • Hanwha Security Cameras Aids Convergint Technologies In Protecting The Philadelphia Holocaust Memorial Plaza
    • Maxxess EFusion Integration With Traka Explore Advancements In Key And Equipment Management
    Topics
    • ISC West
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Body worn video cameras
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • Year in Review 2018
    • Year in Review 2017
    Featured
    • Our Top-10 Click-Worthy Articles in 2019 Highlighted Changing Industry Trends
    • New Pelco CEO Optimistic About Iconic Company’s Path Forward
    • Trends In Banking Security Include More Networks And Software
    • Fast And Accurate, Rapiscan’s CT Scanning Improves Airport Baggage Screening
    Topics
    • ISC West
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Body worn video cameras
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • ISC West
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Body worn video cameras
    Vanderbilt’s SPC Connect Helps Monitor Buildings For Odense Council, Denmark

    Vanderbilt’s SPC Connect Helps Monitor Buildings For Odense Council, Denmark

    Arecont Vision Cameras Utilised For City Surveillance In Mankato, Minnesota

    Arecont Vision Cameras Utilised For City Surveillance In Mankato, Minnesota

    CLIQ® Access Control Solution: Securing South Staffs Water

    CLIQ® Access Control Solution: Securing South Staffs Water

    Dahua Delivers Cameras, Monitors And Switches For Surveillance Of City Center In Lincoln

    Dahua Delivers Cameras, Monitors And Switches For Surveillance Of City Center In Lincoln

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Upcoming Events
    • IFSEC India 2019
    • 2019 China Smart Homes & Buildings Expo
    • Intersec Dubai 2020
    Topics
    • ISC West
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Body worn video cameras
    Biometrics for Government and Law Enforcement 2020

    Biometrics for Government and Law Enforcement 2020

    International Wireless Communications Expo 2020

    International Wireless Communications Expo 2020

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • Hanwha Techwin America
    • TESA
    • Seagate Technology
    • Honeywell
    • HID Global
    Other Resources
    • Videos
    Topics
    • ISC West
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Body worn video cameras
    Nine Ways To Make Your Retail Security System Work Harder

    Nine Ways To Make Your Retail Security System Work Harder

    Financial Institutions Require Future-Ready Physical Security Technologies

    Financial Institutions Require Future-Ready Physical Security Technologies

    H.265 High Efficiency Coding: Video Compression For Security Applications

    H.265 High Efficiency Coding: Video Compression For Security Applications

    How To Overcome The Storage Challenges Of Adopting Surveillance AI

    How To Overcome The Storage Challenges Of Adopting Surveillance AI

About us Advertise
  • ISC West
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Body worn video cameras
  • Intrusion detection
  • Video management software
  • Trade Show/Exhibition
  • Video analytics
  • View all

Artificial intelligence (AI)

  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Avigilon Introduces Avigilon Control Center With AI-powered Facial Recognition Technology For Commercial Video Management Software

Avigilon Introduces Avigilon Control Center With AI-powered Facial Recognition Technology For Commercial Video Management Software

Product
Our Top-10 Click-Worthy Articles in 2019 Highlighted Changing Industry Trends

Our Top-10 Click-Worthy Articles in 2019 Highlighted Changing Industry Trends

Expert commentary
AAEON Atlas Ensures Enhanced Safety And Connectivity Of Smart Cities With Intel Movidius Myriad X

AAEON Atlas Ensures Enhanced Safety And Connectivity Of Smart Cities With Intel Movidius Myriad X

Product
Minut Unveils Fully Secure, All-In-One Smart Home Alarm For Residential Security Systems In The UK

Minut Unveils Fully Secure, All-In-One Smart Home Alarm For Residential Security Systems In The UK

Product
MOBOTIX To Unveil MOBOTIX 7 Smart Platform And M73 IoT Cameras At International Security Expo 2019

MOBOTIX To Unveil MOBOTIX 7 Smart Platform And M73 IoT Cameras At International Security Expo 2019

Events

News

Konica Minolta Launches MOBOTIX 7 Smart Solution Platform And The M73 IoT Camera
Konica Minolta Launches MOBOTIX 7 Smart Solution Platform And The M73 IoT Camera

Konica Minolta is making the next big advance in intelligent video technology by launching the MOBOTIX 7 smart solution platform and the M73 IoT camera that uses it. The latest generation of MOBOTIX video cameras offers a whole new set of functions plus application solutions based on deep learning, opening up new possibilities far beyond traditional video security. The M73 comes with more than 15 apps integrated into its camera software, which can be used to optimize business processes in practically any industry. Integrated facial recognition MOBOTIX 7 is the by far powerful and decentralized and secure modular IoT video system" "MOBOTIX 7 is the by far powerful and decentralized and secure modular IoT video system based on ‘Made in Germany’ and Deep Learning modules, jointly developed with Konica Minolta" explains Gary Fletcher-Moore, Head of Sales – Intelligent Video Solutions, Konica Minolta Business Solutions (UK) Limited. "With the MOBOTIX 7 platform and its new range of intelligent apps we will revolutionize numerous IoT processes for our customers." By combining image sensors and environmental sensors with AI-based analytics, industrial enterprises can increase their production efficiency and improve preventive maintenance or fire prevention measures. For transport applications, the integrated facial recognition, traffic monitoring and object recognition capabilities ensure that drivers are immediately aware of hazards, thus improving road safety for drivers, passengers and other road users. High-Quality professional market The new MOBOTIX M73 IoT camera features high-octane processor technology, meaning it easily provides the latest state of the art in camera performance, such as 4K resolution at 30 fps or 120 dB WDR (Wide Dynamic Range). Only high-quality professional market and partner solutions are integrated In keeping with current demands, the camera is also highly energy efficient: despite a total power consumption of less than 25 watts (PoE+), each M73 is a complete video system that features 8-GB DVR as standard — so no additional servers or storage devices are required. The pre-installed apps come with a 30-day free trial, after which users can purchase a license for each app as required. Only high-quality professional market and partner solutions are integrated, all of which have been tested and certified by MOBOTIX as meeting the highest standards in terms of quality and cyber security. Intelligent video monitoring This opens up countless applications for use — for example, one of the MOBOTIX camera apps can detect when a building is in danger of becoming overcrowded. In this case, the camera immediately and automatically triggers a diversion for any further persons wishing to enter the building, thus reliably preventing accidents and panic. There are no limits to the applications the camera can be used for There are no limits to the applications the camera can be used for, and the solution platform is particularly suitable for sectors such as building engineering, energy, civil engineering, industry and production, public services, retail, healthcare, and education. The examples given above show that intelligent video monitoring means much more than simply recording footage and analyzing it. Highest level of cybersecurity Together with MOBOTIX, Konica Minolta aims to develop a multitude of other solutions based on artificial intelligence to help predict events and facilitate the early introduction of effective countermeasures aimed at protecting the environment, buildings, systems, people or animals. The MOBOTIX 7 and M73 provide apps with functions such as the ability to recognize faces, characteristics, age, mood or sex, as well as specialized custom solutions. "MOBOTIX 7 meets the requirements of a wide range of industries, including transport, retail, industry and public services, as well as fire prevention," says Gary Fletcher-Moore, adding: "The MOBOTIX systems had to have the highest level of cybersecurity in order to be released on the market in accordance with global standards such as ONVIF."

Suprema ID To Showcase World’s Slimmest Fingerprint Authentication Scanners, FAP20/FAP30 At TRUSTECH 2019
Suprema ID To Showcase World’s Slimmest Fingerprint Authentication Scanners, FAP20/FAP30 At TRUSTECH 2019

Suprema ID., global provider of biometrics and ID solutions, has announced that the company would showcase a wide range of global partner's solutions integrating its World's slimmest FAP20/FAP30 fingerprint authentication scanners at TRUSTECH 2019 in Cannes, France on 26-28 November 2019. Live Finger Detection (LFD)  The partner's solutions include Sleek Android Tablet/POS, Rugged Windows 10 Capturing Terminal, and Programmable Fingerprint Keyboard. All products have adopted Suprema ID's latest technologies such as World's slimmest form factor, Multi Dynamic Range (MDR) technology, and IP65-rated dust and water-resistant structure ensuring robust operation all over the time in harsh environments. Suprema ID's patented Live Finger Detection (LFD) technology applies a machine learning method based AI In addition, Suprema ID's patented Live Finger Detection (LFD) technology applying a machine learning method based AI(Artificial Intelligence) has been fully implemented in all partner's solutions to ensure the utmost security in a real field operation. fingerprint authentication scanners "It is our great pleasure to display our partner's solutions for mutual benefit that will enable our potential customers to experience the state-of-art biometrics performance that is uncompromising in security and convenience as market demand is getting intricate," said Bogun Park, CEO at Suprema ID. "The Suprema ID has completed the full lineup of Fingerprint Authentication with BioMini Slim 2/BioMini Slim 3 that are fully compliant with the industry's requirements, planning to add more versatile solutions for further customer satisfaction," Park added. TRUSTECH 2019 At the TRUSTECH 2019 show, Suprema ID will present a full demonstration of its BioMini Slim 3 ultra-slim FAP30 authentication scanners as well as RealScan-G10 FBI-certified fingerprint enrollment scanners.

Suprema ID’s RealScan Series Fingerprint Scanners Integrated With secunet biomiddle
Suprema ID’s RealScan Series Fingerprint Scanners Integrated With secunet biomiddle

Suprema ID., globally renowned provider of biometrics and identity solutions, has announced that its best-selling RealScan Series, including RealScan-G10 and RealScan-D are now compatible with secunet biomiddle. secunet biomiddle platform The secunet biomiddle is an intermediate platform for biometric systems and eIDs The secunet biomiddle is an intermediate platform for biometric systems and eIDs, enabling the modular use of biometric system components and card readers in various biometric or eID applications. Both functions are provided via one interface. Biometric hardware- and software-components are embedded and used by the secunet biomiddle via an integrated BioAPI 2.1 framework, according to ISO/IEC 19784-1. The secunet biomiddle communicates with client applications via a SOAP interface, which makes the middleware independent of system platforms and programming languages. Therefore, the secunet biomiddle is easily and quickly integrated into existing infrastructures and already the linchpin in many regulatory and border control projects. Fingerprint Live Scanners “It is our great pleasure having achieved integration of our proven Fingerprint Live Scanners into the secunet biomiddle, a reliable platform for many opportunities that are currently ongoing. With its award-winning live fingerprint detection based on deep-learning and versatile performances offering Multi-OS (operating system) for various environments, it is expected that we could join various global projects simultaneously such as the Biometrics based EU Entry-Exit System (EES) for Stronger and Smarter Borders for the European Union using secunet biomiddle that is recognized internationally as the reference implementation and preferred architecture for the use of biometrics in connection with official ID documents,” said Bogun Park, CEO at Suprema ID. Suprema ID is a globally renowned provider of biometrics and ID solutions. By combining the world’s renowned biometric algorithm with superior engineering, Suprema ID continually designs and develops high-tech identity products and solutions. Suprema ID’s extensive range of portfolio includes fingerprint enrollment scanners, fingerprint authentication scanners, fingerprint embedded modules and ePassport readers.

Panasonic i-PRO Sensing Solutions Corp. To Exhibit Advanced Security Solutions At ISC East 2019
Panasonic i-PRO Sensing Solutions Corp. To Exhibit Advanced Security Solutions At ISC East 2019

Panasonic Security Systems, a business unit of the newly formed Panasonic i-PRO Sensing Solutions Co., Ltd., is showcasing its impressive solutions capabilities at ISC East 2019, booth #435 at the Javits Center. By combining superior imaging technologies with new AI-driven software and analytics solutions, Panasonic i-PRO Security Systems offers comprehensive, customizable solutions to meet the most diverse range of users’ specific needs. Core solutions on display include the company’s fully integrated Video Insight 7 Video Management System Video Insight 7 VMS solution Core solutions on display include the company’s fully integrated Video Insight 7 Video Management System (VMS) and MonitorCast access control platform, innovative FacePRO facial recognition software, and a wide variety of analytics. “There are many new and exciting developments at Panasonic that we will be unveiling over the next several months – the most significant being our enhanced solutions portfolio,” said Bill Brennan, Vice President of the Security Division., Ltd. AI-driven software and analytics Bill adds, “Where Panasonic was once almost exclusively recognized for our superior imaging products, our enhanced portfolio of AI-driven software and analytics enables us to provide advanced integrated solutions that move beyond detection to preventive analysis and business intelligence. This is the new Panasonic i-PRO.” Video Insight 7.5, a powerful and versatile VMS solution with innovative 3D De-warp functionality, fully integrates the company’s MonitorCast access control platform to deliver uncompromised system management and control with unlimited scalability, and no license fees when used with i-PRO Extreme cameras. FacePRO facial recognition solution FacePRO facial recognition software employs an innovative neural network with deep learning technology FacePRO facial recognition software employs an innovative neural network with deep learning technology providing fast face matching on both live and recorded video; the ability to identify and match multiple faces against 10 million records in seconds; and GDPR compliant privacy protection via end-to-end SSL communications and fully encrypted facial data. The National Institute of Standards and Technology (NIST) rated FacePRO as the ‘world’s most highly rated facial recognition engine’. A new portfolio of Intelligent Analytics including, License Plate Recognition; Vehicle Search Detection; Intruder Detection, Loitering Detection, Direction Detection, Object Left Behind Detection; Object Removed Detection; and Cross Line Detection. i-PRO Extreme IP cameras i-PRO Extreme IP cameras in a wide range of models with up to 4K/9MP resolution, and in multi-sensor, PTZ, dome, and box configurations. Highlights include the new WV-X8570N iA (intelligent Auto) 4K/33MP H.265 Panoramic Multi-Sensor Camera; WV-S3532LM iA H.265 Compact Dome Camera; and the WV-S2570L4K iA H.265 Dome Camera. The ISC East exhibit also showcases new Remote Demo Sites, with feeds from the majority of the i-PRO Extreme line-up, as well as the ability to demo FacePRO. For added versatility, the Panasonic Partner Ecosystem includes deep integration with over 4,500 cameras from 151 different manufacturers, and integration with 19 access control partners.

View all

Expert commentary

Can AI Video Analytics Ever Really Be Intelligent?
Can AI Video Analytics Ever Really Be Intelligent?

Video surveillance is commonly associated with security. But in most cases, it's used to record incidents and assist in investigations after the fact rather than prevent undesirable events. Artificial intelligence–powered video analytics is a highly promising trend that fundamentally changes the way things work. Extracting manageable data from a video stream can help recognize risky situations early on, minimizing damage and, ideally, completely avoid emergencies. At the same time, AI significantly expands the areas of application of video surveillance beyond security systems. AI significantly expands the areas of application of video surveillance beyond security systems However, the hype around this new, trendy technology prevents the potential user from choosing quality solutions in a wide variety of products. This often leads to over-expectation, followed by a complete let-down. Can AI-powered video analytics really be the key to a technological breakthrough in video surveillance? We'll take a look at what the technology can do, what it can't, and where it can go from here. Technological breakthrough or just another bubble? It's often said that the video management software (VMS) market is becoming increasingly commoditized and widely available. A lot of products with similar features (or, at least, similar promises from the manufacturer) make it hard to choose. As a result, vendor names and reputations are turning into one of their primary selling points. Manufacturers have two choices available: get wrapped up in a price war and rely on cutting expenses, or offer a product that's truly innovative and revolutionary. Manufacturers have two choices available: get wrapped up in a price war, or offer a product that's truly innovative and revolutionary VMS developers who choose the second route are gravitating towards creating products that use artificial intelligence based on neural networks and deep learning. Emerging two or three years ago, the AI video analytics market is experiencing a boom in growth. This new tech wave has stirred the still, stagnant backwaters of the VMS world and gave small, ambitious developers something to be optimistic about. It seems they now have a chance to emerge as market leaders in the next few years. However, the hype around this popular trend is raising reasonable concerns among experienced security industry professionals. These concerns come from clients looking for a solution to their problems, and from suppliers building a long-term development strategy. This largely resembles another tech bubble, like the one built up around pre-AI video analytics and burst when it became clear that the sensational promises around it were pure marketing hype (and rather unscrupulously so). However, there are a lot of factors that indicate that AI-powered video surveillance systems aren't another bubble. The three factors The first — and the main one — comes from systems already in place on customers' sites. They fulfill the same promises made during the previous bubble by hotheads in a rush to teach the computer to analyze events in real time using a classical algorithmic approach. The second is the fact that this new technology has seen investment from not only software and cloud startups, but also established VMS developers. Even giants like Intel, which has presented a full line of neural network accelerator hardware and a set of software tools that streamlines working with them, specifically in the field of computer vision. This new technology has seen investment from not only software and cloud startups, but also established VMS developers The third factor lies in artificial intelligence's abilities. AI plays chess, drives cars, and works wonders in many other fields. Why shouldn't it be applied to video monitoring and analysis? What AI can do Just what can artificial intelligence do in video surveillance systems at this stage of development? It can't quite analyze a sequence of events and understand the "logic" of what's happening in the cameras' field of view. At least not yet. But it's probable that AI will learn to do this in the next few years. But neural network analytics can already detect, classify, and track objects very well, providing high accuracy even in busy scenes. Artificial intelligence can be used in the real world to: detect smoke and flames for early fire warning at open areas (forest, open warehouse, parking lot, etc.); distinguish people/vehicles from animals and other moving objects, e.g. to protect the perimeter of a nature park from poachers; distinguish a person in a helmet and protective clothing from a person without them to prevent accidents at a dangerous production facility or construction site; count objects of a specific type, e.g. cars in a parking lot, people in the sales floor, wares moving on a conveyor belt, etc. in non-security-related solutions. Those are just a few examples. After training a neural network, it can tackle other, similar tasks, too. Generally, a neural network trained in specific conditions isn't replicable. In other words, it won't work as well under different conditions. On the other hand, developers have learned how to quickly train AI for the needs of a specific project. The most important requirement is having enough video footage. Somewhat apart from that is the use of neural networks in facial and automatic number-plate recognition. This is an example of reproducible neural networks (train once, deploy everywhere), which makes them more appealing commercially. If non-reproducible neural networks have only recently become economically feasible due to the rapid evolution of specialized hardware (aforementioned Intel's product, for example), then the use of AI in facial recognition and ANPR has been well established for a long time. The use of AI in facial recognition and ANPR has been well established for a long time Another kind of AI analytics that we'll explore is behavior analytics. This function, probably more than any other, is bringing video surveillance systems closer to understanding what's happening on camera. Its potential is vast. How Behavior Analytics Works From a technical point of view, behavior analytics combines artificial intelligence with a classic algorithmic approach. A neural network trained on a multitude of scenarios can determine the position of the bodies, heads, and limbs of humans in the camera's field of view. The algorithm outputs an array of data containing descriptions of their poses. Conditions can be set for data to detect a specific pose, such as raised hands, prostrated or crouching persons. Developers can use this to quickly create new detection tools to identify potentially dangerous behavior specified by a government or business client. There's no need for additional training of the neural network. How Behavior Analytics Can Be Deployed Someone crouched down next to an ATM could be a technician, CIT guard, or burglar. Bank security should be notified in any of the cases. A person in shooter position, together with a bank employee or cashier with their hands raised could indicate a robbery. The system can be configured to automatically send alerts with a surveillance snapshot to the police so they can assess the threat and take action if needed. It's vital that the police receive the alert, even if the employee is unable to activate the alarm. In many cases, attention should be directed to a prostrate individual. This could be somebody who needs immediate help, or it could be someone sleeping in an inappropriate public place, for example, a 24/7 ATM space. Behavioral analytics can also be used to ensure workplace safety. For example, tracking whether employees are holding the handrails when using the stairs at a manufacturing facility or a construction site. What Now? Behavior analytics can be deployed wherever your clients' imagination takes them. With this feature, practically any pose that indicates potentially dangerous behavior can be detected. Timely response to an alarm helps avoid material damages or, in other situations, casualties. Practically any pose that indicates potentially dangerous behavior can be detected An area of potential development for behavior analytics is the ability to analyze a sequence of poses by the same person or a combination of poses and relative positions of several individuals. That will be the next level of evolution in AI's use in video surveillance: moving from "detecting" to "understanding" behavior in real time. In its most basic form, this type of analytics can be deployed to detect deviations from the search procedure in correctional facilities when a person being inspected must assume a pre-defined sequence of poses. A more advanced form allows it to detect any kind of abnormal behavior, such as a brawl breaking out in a public space. Ideally, behavior analytics can predict dangerous situations based on nearly imperceptible cues gleaned from collected statistics and a Big Data analysis. At the moment, this sounds like pure fantasy, but what seemed like whimsy not too long ago is now a reality with AI. It's already beaten humans in chess and the game of Go (Weiqi). Will artificial intelligence be able to outplay humans at charades one day? It's entirely possible that we'll soon see for ourselves.

What’s Old Is New Again: Security Industry Trends That Will Continue Into 2020
What’s Old Is New Again: Security Industry Trends That Will Continue Into 2020

It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating.  Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts.  Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical.  Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns  In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights. 

Why Integrated Access Control Is About More Than Security?
Why Integrated Access Control Is About More Than Security?

Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.

View all

Security beat

Smiths Detection Explores Biometric Solutions For Airport Security Checkpoints
Smiths Detection Explores Biometric Solutions For Airport Security Checkpoints

Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimizes security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimized operational costs; and an improved passenger experience. AI for Object Recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.

STANLEY Drives IT-Centric Solutions For Security And Greater Business Value
STANLEY Drives IT-Centric Solutions For Security And Greater Business Value

As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe.  PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”

Securing New Ground Considers Impact Of Technologies And A Holistic Approach
Securing New Ground Considers Impact Of Technologies And A Holistic Approach

Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization. A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.”  Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).

View all

Case studies

IronYun AI NVR Animal Detection System Helps Secure Animals Crossing The Roads In Singapore’s National Parks
IronYun AI NVR Animal Detection System Helps Secure Animals Crossing The Roads In Singapore’s National Parks

With the opening of the new Thomson Nature Park, Singapore, the National Parks Board (NParks) recently unveiled a new system to help detect wildlife crossing the roads between forests and provide real-time warning messages for approaching vehicles, so that the vehicles can slow down and let the animals safely walk onto the other side (The Strait Times). IronYun AI NVR Animal Detection solution IronYun AI NVR Animal Detection is the solution that NParks has selected to realize the system IronYun AI NVR Animal Detection is the solution that NParks has selected to realize the system. On one hand, AI NVR uses deep learning AI models to accurately recognize animals versus vehicles and people via camera feeds on the roadside. On the other hand, AI NVR integrates with signage systems to trigger the appropriate alerts when such animals are detected. Wildlife protection program: “Thomson Nature Park (TNP) is a 50-hectar (124-acre) green space to buffer between the eastern forests of the Central Catchment Nature Reserve and the new infrastructure developments. TNP is separated from the Nature Reserve by a 3-km-long Old Upper Thomson Road, on which visitor cars frequently travel. Animals, however, do not recognize manmade geographical boundaries”, said NParks Director for Conservation, Sharon Chan, and thus often walk across the road from the forest into TNP and vice versa to forage for foods and find mates. Animal-vehicle collisions have occurred because the cars and motorcycles cannot see the animals and stop in time. Meanwhile, biodiversity surveys have indicated that many native animals, including critically endangered species such as the Raffles' banded langur and the Sunda pangolin often cross this road. Several measures have been implemented to protect the animals, including: Aerial crossing: a rope ladder and a single rope crossing along the Old Upper Thomson Road to help canopy-dwelling animals crossing overhead Culverts: five culverts to help ground-dwelling mammals crossing underground Reducing traffic: turning Old Upper Thomson Road from a dual-lane road to a single-lane road in June 2018; plans to close the road to vehicles between 7:30 pm – 6 am daily in the future Roadway animal detection system: a combination of IronYun AI NVR, cameras, and signage to alert vehicles to slow down from afar when an animal crosses the road In particular, the roadway animal detection system is co-funded by NParks and the Land Transport Authority (LTA) to reduce animal-vehicle accidents. At the heart of the system is IronYun AI NVR. AI technology for wildlife protection The system is guaranteed to recognize a human versus an animal versus a vehicle AI NVR is a deep learning video analytics solution, which can distinguish several types of objects, including vehicles (car, bus, motorcycle, etc.), people, manmade objects (backpack, suitcase, etc.), and animals. IronYun engineering teams train the AI models using thousands of hours of video data to ensure high accuracy, so the benefits are two-fold: No false alarms: the system is guaranteed to recognize a human versus an animal versus a vehicle. As an improvement compared to legacy sensor-based systems, motions caused by tree branches swaying, people walking/biking, cars driving by, etc. do not trigger any alarm. In this case, only an animal crossing the road would trigger an alarm. Easy to use: no calibration to the environment is required. The model is pre-trained and ready to use from day 1. AI Network Video Recorders (NVRs) The LTA and NParks users set the alert rule so that when an animal appears, AI NVR recognizes, records the metadata and triggers lights to flash under a sign that reads ‘Animals Ahead’, all within 3 seconds. The car sees the flashing light and slows down, allowing the animals to reach safety. The unintrusive monitoring and alert system AI NVR has proven useful The current system supports 5 cameras along Old Upper Thomson Road. The system was announced on October 11, 2019, and is a year-long pilot project in the joint effort of LTA and NParks to protect wildlife in Singapore national parks. Unobtrusive and alert video system While the rope crossing and culverts help providing the animals safe alternative travel routes, Dr. Andie Ang, a primate scientist and chair of the Raffles’ Banded Langur Working Group, has commented that it would take time for animals like the Langurs to get used to artificial structures, so long-term monitoring is necessary. Therefore, the unintrusive monitoring and alert system AI NVR has proven useful. According to LTA Chief Executive, Ngien Hoon Ping, “Joint efforts, such as the one on the roadway animal detection system, help us understand how technology could be deployed to achieve our aims.”

Dahua HOC Safe City Solution Enables Hangzhou Jianggan Public Security To Create ‘Online Police’ Mode
Dahua HOC Safe City Solution Enables Hangzhou Jianggan Public Security To Create ‘Online Police’ Mode

Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.

Dahua IP Cameras And AI Tech Ensure Enhanced Security Of The China International Import Expo
Dahua IP Cameras And AI Tech Ensure Enhanced Security Of The China International Import Expo

The first China International Import Expo was held on November 5, 2018 in Shanghai. As the world's first import-themed national exhibition, it attracted more than 3,600 exhibitors from 172 countries, regions and international organizations, making security a top priority during the event. As an essential force in the global security industry, Dahua Technology has performed outstandingly in assuring the security of many international events such as the Rio Olympic Games, G20 Hangzhou Summit and the 9th BRICS Summit. This time, Dahua Technology has shouldered the security responsibility again with its state-of-the-art products and solutions. Event security Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment The Expo expected a total number of 800,000 visitors, as well as tens of thousands of displayed goods, coming from more than 3,000 companies in more than 130 countries, demanding safety as the top priority in the venue. Integrating data from various departments as well as monitoring the venue and command dispatching became a huge challenge for the security and police personnel. Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment in the core locations of the Shanghai National Convention and Exhibition Center and its surrounding areas, using video AR, face recognition, ANPR, video structuring, intelligent analysis and other technologies to improve the venue’s level of security. Artificial Intelligence solutions In order to further enlarge the area security coverage, Dahua Technology set up video surveillance points in key areas of Shanghai National Convention and Exhibition Center including entrance and exit points of the outer ring, interior area, office buildings, as well the surrounding major passages, plazas, commanding points, subway entrances and exits, pedestrian bridges, etc. In addition to the already pre-installed surveillance equipment, new monitoring devices were also added to make sure that there will be no blind spots and interruptions of the video transmission in the whole area. Panoramic cameras Dahua panoramic cameras installed at the commanding point of the Shanghai National Convention and Exhibition Center employs AR technology in order to achieve omni-directional and no blind spot surveillance. Additionally, the panoramic cameras deployed inside the exhibition center monitor the situation inside the exhibition hall and obtain real-time dynamic information that builds a three-dimensional platform that are visual, controllable and schedulable to facilitate an efficient security operation. Intelligent video analysis system Intelligent video analysis system was built in the exhibition area to classify the acquired data  Moreover, intelligent video analysis system was built in the exhibition area to classify the acquired data according to the preset rules and application requirements, such as crowd detection, behavior analysis, map search, etc. This system expands and deepens the application of video information in the efficiency of public security. Furthermore, through the Dahua Deep Learning Series video alert camera, people who would illegally climb over the perimeter fence built within the 4-kilometer area of the exhibition hall would be identified and captured. Dahua face recognition system The Dahua face recognition system deployed at the entrance and exit of the exhibition center could recognize the identity of all visitors in real time by comparing their ID card’s recorded information with the face photo captured by the front-end smart camera. This system did not just improve the traffic efficiency of the entrance and exit points, but also guaranteed the safety and accuracy of the identification of people walking in and out of the venue. High-definition smart cameras Dahua high-definition smart cameras were also set up at the entrance and exit around the transportation hub of the Shanghai National Convention and Exhibition Center to monitor and track high-risk vehicles and people in real-time. This effectively improved the road management and traffic control in the area. Fully structured cameras capturing real-time videos of motor vehicles, pedestrians and non-motor vehicles were deployed in the surrounding area, which also support face and body recognition for a more comprehensive security. Video network platform Video network platform automatically connects the video and image data captured within the area  Additionally, a video network platform automatically connects the video and image data captured within the area to the public security command center, creating a resource sharing integration of valuable information. China International Import Expo has facilitated countries and regions all over the world in strengthening economic cooperation and trade, and promoting global trade and world economic growth. Dahua AI solutions has greatly enhanced the prevention and control measures within the key areas around the venue, assuring security during the Expo. Cutting-edge security solutions After the event, Dahua Technology received letters from the Shanghai Public Security Bureau, Qingpu Public Security Bureau, Changning Public Security Bureau, Shanghai Hongqiao Integrated Transportation Hub Emergency Response Center, and other offices, thanking Dahua Technology for its strong support and contributions to the success of the security management during the event. From the Rio Olympic Games to the G20 Hangzhou Summit, from the 9th BRICS Summit to the first China International Import Expo, Dahua Technology always accomplishes various security tasks with high quality and efficiency. With its cutting-edge products and solutions, quality operation services and professional technical team, Dahua Technology will continue to assist more major international events in the future.

Leveraging AI Technology To Combat Modern Cyber Security Threats
Leveraging AI Technology To Combat Modern Cyber Security Threats

Delfina Chain, Sr Associate Customer Engagement & Development at Flashpoint, discusses what resources defenders must access to in order to keep a finger on the pulse of the cybercriminal underground. Artificial intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices - such as voice-controlled personal assistants and self-directed vacuum cleaners - to ground-breaking business applications that optimize everything from drug discovery to financial portfolio management. So naturally, there is growing interest within the information security community around how we can leverage AI - which encompasses the concepts of machine learning (ML) and deep learning (DL) - to combat cyber threats. AI-enhanced cyber security The effectiveness and scalability of cybersecurity-related tasks has already been enhanced by AI The effectiveness and scalability of cybersecurity-related tasks, such as malware and spam detection, has already been enhanced by AI, and many expect ongoing AI innovations to have a transformative impact on cyber defence capabilities. However, security practitioners must also recognize that the rise of AI presents a potent opportunity for cybercriminals to optimize their malicious activities. Much like the rise of cybercrime-as-a-service offerings in the underground economy, threat-actor adoption of AI technology is expected to lower barriers to entry for lower-skilled actors seeking to conduct advanced malicious operations. A report from the Future of Humanity Institute emphasizes the potential for AI to be used toward beneficial and harmful ends within the cyber realm, which is amplified by its efficiency, scalability, diffusibility, and potential to exceed human capabilities. Encrypted chat services Potential uses of AI among cybercriminals could include the development of highly evasive malware, the ability for automated systems to exhibit human-like behaviour during denial-of-service attacks, and the optimization of activities such as vulnerability discovery and target prioritization. Fortunately, defenders have a leg up over adversaries in this arms race to harness the power of AI technology, largely due to the time- and resource-intensive nature of deploying AI at its current stage in development. The purpose of intelligence is to inform a course of action. For defenders, this course of action should be guided by the level of risk (likelihood x potential impact) posed by a threat. The best way to evaluate how likely a threat is to manifest is by monitoring threat-actor activity on the deep-and-dark-web (DDW) forums, underground marketplaces, and encrypted chat services on which they exchange resources and discuss their tactics, techniques, and procedures (TTPs). Cobalt Strike threat-emulation software Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of way Cybercriminal abuse of technology is nothing new, and by gaining visibility into adversaries’ ongoing efforts to develop more advanced TTPs, defenders can better anticipate and defend against evolving attack methods. Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of ways, ranging from the use of pirated versions of the Cobalt Strike threat-emulation software to elude server fingerprinting to the use of tools designed to aid visually impaired or dyslexic individuals to bypass CAPTCHA in order to deliver automated spam. EMV-chip technology Flashpoint analysts also observe adversaries adapting their TTPs in response to evolving security technologies, such as the rise of ATM shimmers in response to EMV-chip technology. In all of these instances, Flashpoint analysts provided customers with the technical and contextual details needed take proactive action in defending their networks against these TTPs. When adversaries’ abuse of AI technology begins to escalate, their activity within DDW and encrypted channels will be one of the earliest and most telling indicators. So by establishing access to the resources needed to keep a finger on the pulse of the cybercriminal underground, defenders can rest easy knowing they’re laying the groundwork needed to be among the first to know when threat actors develop new ways of abusing AI and other emerging technologies.

View all

Round table discussion

How Does Technology Innovation Impact Security In Public Spaces?
How Does Technology Innovation Impact Security In Public Spaces?

Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?

What’s New In Video Storage Solutions?
What’s New In Video Storage Solutions?

Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?

What’s New In Command-And-Control Systems?
What’s New In Command-And-Control Systems?

Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?

View all

Products

Avigilon Appearance Search Technology

Avigilon Appearance Search Technology

Dahua Dual 4MP Starlight Hunter Camera

Dahua Dual 4MP Starlight Hunter Camera

Dahua Technology AI WDR Bullet Network Camera

Dahua Technology AI WDR Bullet Network Camera

New Management Experience With VIVOTEK VAST 2

New Management Experience With VIVOTEK VAST 2

Avigilon AI Appliance

Avigilon AI Appliance

AxxonSoft Axxon Next Video Management Software

AxxonSoft Axxon Next Video Management Software

View all

White papers

How To Overcome The Storage Challenges Of Adopting Surveillance AI

How To Overcome The Storage Challenges Of Adopting Surveillance AI

Download
Five Things To Consider For AI With Video Technology

Five Things To Consider For AI With Video Technology

Download
View all

Videos

AxxonSoft And Intel Corporation Enter Strategic Technology Partnership

AxxonSoft And Intel Corporation Enter Strategic Technology Partnership

AxxonSoft Highlights Features Of Its Face Search Application

AxxonSoft Highlights Features Of Its Face Search Application

FLIR TruWITNESS Mobile Security Platform For City Surveillance

FLIR TruWITNESS Mobile Security Platform For City Surveillance

Mobotix M16 Camera

Mobotix M16 Camera

View More

Follow us

Sections Products Companies News Insights Case studies Markets Events White papers Videos
Topics ISC West Artificial intelligence (AI) Counter Terror Cyber security Robotics Body worn video cameras Intrusion detection Video management software Trade Show/Exhibition
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Limited 2000 - 2019, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download SecurityInformed.com product tech spec