VXG, a globally renowned cloud video surveillance provider, is excited to integrate with Seagate Technology’s recently launched Lyve Cloud, a frictionless storage-as-a-service cloud service. The collaboration enables a simple, scalable and cost-optimized solution for companies in need of a white-label cloud video surveillance system or VSaaS solution. Cloud video surveillance Cloud video surveillance is a booming industry with an expected market value of US$ 52.98 billion in 2026 up from...
Checkpoint Systems, a vertically integrated supplier of RFID solutions for retail, has again demonstrated its commitment to innovation by becoming the first manufacturer to have an RFID inlay, featuring the new NXP UCODE 9 IC certified by Auburn University’s ARC Laboratory. Impinj M700-based RFID inlays The exciting announcement follows news that Checkpoint Systems recently became the first company to achieve ARC certification for its Impinj M700-based RFID inlays. By setting another ne...
SKIDATA, the globally renowned company in parking access and revenue management, has announced a new technology integration partnership with Openpath, an international company in touchless and modern access control, and workplace safety automation. SKIDATA – Openpath partnership Through this partnership, Openpath’s ground-breaking touchless and mobile access control technology will be integrated into SKIDATA’s parking access and revenue control equipment, in order to permit d...
Just like other industries around the globe, the patience of parking operations management has been tested, as the usage of parking facilities in urban and suburban settings fluctuated widely over the past year, due to local health and safety, and occupancy restrictions. As the overall industry looks to spring back from the COVID-19 levels, it is also simultaneously looking to transition from traditional analog and on-premise managed operations to solutions that digitize parking operations and...
The first inter airport CONNECT event, taking place online from 20 – 21 April 2021, provides a much anticipated trade and networking event for the global airport community, which has been impacted by the ongoing COVID-19 crisis. inter airport CONNECT inter airport CONNECT is a two-day online trading, networking and webinar event for airport professionals. Visitors can virtually meet relevant exhibitors, browse informative product presentations and follow webinars on current industry tren...
Heald, a globally renowned innovator in the field of perimeter security technology and the manufacturer of quality security equipment in the United Kingdom, has announced a partnership with Sweden-based access control solutions firm, Intergate, following a recent installation of their Matador products in Stockholm, Sweden. Intergate is the renowned distributor in Sweden for access control solutions. The firm, which celebrated its 25th anniversary in 2020, is a subsidiary of Indutrade, which has...
Corps Security launches its manned guarding savings calculator to help businesses rightsize their security provision as they plan the return to workplace reoccupation. Facilities or security professionals simply input their manned guarding hourly charge rate and the number of security hours into the calculator and it shows how security costs could be significantly reduced by integrating security monitoring solutions with traditional manned guarding to protect premises, assets, and people. Increasing job satisfaction The calculator is a no-obligation tool to help facilities professionals planning the return to work think differently about their security spend. Organizations can have a clear line of sight of both their manned guarding and monitoring service As well as reducing costs for the organization, a blended approach to security using security monitoring to complement officers on the ground, allows officers to be paid in line with Living Wage levels, increasing job satisfaction and retention. Through Corps Security’s intuitive customer portal, organizations can have a clear line of sight of both their manned guarding and monitoring service making it a completely integrated approach. More flexible approach “We know companies are laden with financial concerns about the costs associated with their premises as well as seeking more flexible ways of using their buildings as people opt for a more hybrid model of work, combining home with the formal workplace,” said Mike Bullock, CEO of Corps Security. “As a result, they are looking for a more flexible approach to their security. Because we provide both manned guarding and remote monitoring, we’re ideally placed to be able to advice on the best blend for an organization.”
Independent cyber security business, Adarma has announced the appointment of Cheryl Martin as the new Head of its Security Consulting practice. The UK-based organization has offices in both, London and Edinburgh, and is one of the largest independent security services companies in the United Kingdom. Security consulting services expert Adarma works to safeguard businesses from ever-evolving cyber threats, through a range of security consulting & managed security services, with deep domain expertise in threat management and managed detection and response solutions. This is the latest in a series of senior appointments at Adarma, following the announcement of ex-Cisco Global Vice President, John Maynard’s appointment as the company’s new Chief Executive Officer (CEO) in November 2020. IT, technology and cyber security veteran Cheryl joins the firm from Gartner Consulting, where as Senior Managing Director, she led the firm’s financial services arm. She has more than 25 years’ experience in IT, technology and cyber security, privacy and operational resilience. Prior to her role at Gartner, Cheryl was an Equity Partner in EY’s EMEA Financial Services Technology Advisory team, leading on the development of numerous technology, risk and cyber security strategies. Efficient tactician in cyber security space Cheryl will also be responsible for driving Adarma’s equality, diversity and inclusion ambitions She has also implemented complex transformation programs in large scale risk and compliance for global institutions, and has helped a number of UK FTSE organizations respond to cyber incidents. Alongside her role as Head of Security Consulting, Cheryl will also be responsible for driving Adarma’s equality, diversity and inclusion ambitions, having previously been the diversity lead on the Gartner Global Board of Directors, as well as Co-chair for EY’s Women in Technology Community. Cheryl Martin, Head of Security Consulting at Adarma, said “This role really plays to my core strength of cyber security and I hope that the knowledge and experiences I’ve gained in my previous positions will aid Adarma as it continues to expand its offerings.” Bespoke advisory services Cherly adds “The business prides itself on the strength of its relationships with clients, and the bespoke advisory services it can provide as a result. I look forward to working in partnership with Adarma’s impressive client roster as we help them navigate the changing threat landscape.” John Maynard, the Chief Executive Officer at Adarma, said “Cheryl represents an extremely valuable addition to the Adarma team as we look to scale our business while retaining the outstanding levels of customer service we are renowned for. Her outstanding knowledge of the financial services space and the complex regulatory landscape will also enable her to create more bespoke and multi-faceted solutions to benefit both our existing and prospective clients across a broad range of industries.”
The Boson camera core represents the best in FLIR high-performance uncooled thermal imaging technology within a small, lightweight, and low-power package. Additionally, FLIR partners and customers will have the option to purchase radiometric versions that can capture the temperature data of every pixel in the scene. Boson radiometric camera The new Boson radiometric camera core comes in two versions, 640 x 512 or 320 x 256 resolutions, with multiple lens configurations and the ability to capture temperature data for quantitative assessment. The camera core is meant for use in systems across a variety of applications, including in firefighting, surveillance, security, unmanned systems, industrial inspection, and fixed-asset monitoring. Featuring ‘Spot Meter Accuracy’ software Featuring radiometric accuracy provides ±5 °C (±8 °F) or ±5% temperature measurement accuracy, the Boson Radiometric cameras include a ‘Spot Meter Accuracy’ software feature that provides an assessment of how accurate a given temperature measurement appears in the scene. Available as telemetry data accessed through the Boson SDK or the Boson graphical user interface (GUI), this feature provides guidance across five confidence grades, offering in-the-moment assessment to help improve temperature measurement confidence. Accounting for dynamic ambient temperatures The 'Spot Meter Accuracy' software feature gives operators the ability to account for dynamic ambient temperatures In addition, the 'Spot Meter Accuracy' software feature gives operators the ability to account for dynamic ambient temperatures, along with the ability to configure measurements prior to operation, including adjusting emissivity and thermal gain settings. These functions are crucial for outdoor environments and the swift movements of unmanned aerial drones and automated ground vehicles. The software also offers inspection and assessment features, including spot meters and windows that pinpoint temperature measurement in the scene that the camera is focused on and atmospheric correction capabilities, during post-processing analysis. Thermal imaging experts The Boson family of thermal imaging cores is an important part of the 40-plus years of thermal imaging expertise that FLIR Systems offer. As a result of this expertise, the Boson thermal imaging cores utilize a high sensitivity 12-micron pixel pitch detector that provides high-resolution thermal imaging in a small, low power, light weight, and turnkey package. All Boson cores feature FLIR infrared video processing architecture, noise reduction filters and local area contrast. The imaging processing capabilities accommodate industry-standard communication interfaces, including visible CMOS and USB. FLIR Boson Radiometric cores are available globally through FLIR and preferred distributors.
Argon, a new security startup securing the modern software delivery process, emerges from stealth mode as the first unified security solution that protects all stages of the continuous integration/continuous delivery (CI/CD) pipeline and ensures the integrity of the software development lifecycle (SDLC). “The massive effect of the SolarWinds’ IT management software breach that began when hackers compromised one of its software updates, signaled the birth of a new cyberattack surface that organizations are not equipped to defend,” said Eilon Elhadad, CEO, Argon. Strong security posture “Our solution provides full visibility into the development environment and protects our customers from bad actors who seek to plant malicious code or tamper with the native behavior and uptime of the applications.” Automated software delivery through a CI/CD pipeline process offers application developers a fast and efficient way to develop, build, test, and deploy new software. The CI/CD pipelines use a series of cloud and hosted services and open-source tools which open the organization’s network to new environments where the source code is copied, moved, and shared. Maintaining a strong security posture in a cloud-native environment requires security and DevOps personnel to have full visibility over the entire environment to mitigate risk. Code-Tampering detection technology Argon seamlessly connects to the existing CI/CD pipelines via an agentless implementation and instantly maps the development environment, assets, and user activities. The solution prioritizes and automates remediation of alerts according to security best practices and compliance rules, ensuring zero trust deployment. Argon’s code-tampering detection technology performs validity checks on every step of the CI/CD process to confirm no tampering has occurred. “The way companies release software has evolved from a manual, controlled, and timed process to one that is fully automated, distributed, and complex,” said Eylam Milner, CTO, Argon. “Vendors deploy new code on a daily basis, and it’s irrational for them to expect their DevOps and security teams to protect their release pipelines without a dedicated solution.” Accelerating development processes Elhadad and Milner are both former leaders of security and engineering teams in the Israeli military. Eran Orzel, Chief Revenue Officer (CRO) has over 20 years of experience in sales leadership roles in cybersecurity and enterprise software. Prior to joining Argon, Eran held several roles at Check Point Software Technologies, most recently as the Global Head of Strategic Sales and Partnerships where he led and played a significant role in the rapid growth of Check Point’s major business growth engines. “Companies are accelerating the development processes using DevOps pipeline infrastructures and the trend is at its peak,” said Orzel. “Consequently, the threats are growing stronger than ever, with dozens of incidents from code theft to code manipulation in the last six months alone.” Argon is launching with 15 employees after raising more than $4 million (USD) in initial funding led by Hyperwise Ventures. Software-Driven companies “Bad actors are exploiting new weaknesses in the modern software delivery pipeline to gain access, leak data, and tamper with the product’s source code,” said Nathan Shuchami, Managing partner at Hyperwise Ventures. “Argon has developed an innovative solution that software-driven companies need in order to block those attacks and secure their customers and products.” Several high-profile cybersecurity angel investors have joined Hyperwise Ventures, including Shlomo Kramer, the founder of Check Point, Imperva, and Cato Networks; Zohar Alon, Founder of Dome9; Giora Yaron, chairman of Amdocs Technology Committee; Avery More, managing partner of ORR Partners; and Harel Kodesh, a former partner at Silver Lake.
Funds advised by Triton (‘Triton’) acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton will invest alongside the current management team of ACRE. ACRE’s previous majority investor, LLR Partners, who has partnered with the company since 2013, will exit the business. The financial terms of the transaction were not disclosed. ACRE is a pioneer in the delivery of security systems for access control and intrusion detection as well as innovative video solutions with a communication networking and intelligent appliance portfolio. Electronic security solutions The software and solutions provided by ACRE’s family of companies (Vanderbilt, Open Options, RS2 Technologies, ComNet, and Razberi) help secure the highest valued assets of large and small customers operating in the private and public sectors. Triton will bring industry expertise and additional capital to support ACRE’s continued innovation and proven buy & build strategy. Triton will bring industry expertise and additional capital to support ACRE’s continued innovation Peder Prahl, Director of the General Partner for the Triton funds, said: "We look forward to actively supporting the management and employees of ACRE as a stable owner by investing in the growth and development of the company. Our industry expertise and international network will further strengthen ACRE’s position as a leading global provider of intelligent electronic security solutions.” Electronic security market Joseph Grillo, ACRE’s CEO, stated: “As we reach our next stage of growth and strive to hit new milestones, we are pleased to welcome Triton as the partner to help us expand our presence and capabilities organically and via new acquisitions. This partnership will allow us to continue to invest in innovation and bring our market-leading solutions to customers.” “ACRE operates in the structurally growing, fragmented, and resilient electronic security market, with an attractive product portfolio and strong market position in the geographies it operates in. We look forward to partnering with Joe and the team as ACRE embarks on the next phase of its journey,” adds Sachin Jivanji, Investment Advisory Professional and advisor to the Triton Funds.
Check Point Research (CPR) reports that since the recently disclosed vulnerabilities on Microsoft Exchange Servers, a race has started between hackers and security professionals. CPR is seeing hundreds of exploitation attempts against organizations world-wide that are related to the four zero-day vulnerabilities currently affecting the Microsoft Exchange Server. In the past 24 hours alone, CPR has observed that the number of exploitation attempts on organizations it tracks doubled every two to three hours. Popular mail server Of the targeted organizations, 17% belong to the Government and Military sectors and 14% are in manufacturing. Looking at the attack from a geographical perspective, the most targeted country was Turkey (19%), followed by the US (18%) and Italy (10%). On March 3, 2021, Microsoft released an emergency patch for its Exchange Server product, the most popular mail server worldwide. All incoming and outgoing emails, calendar invitations, and virtually anything accessed within Outlook goes through the Exchange server. The vulnerabilities allow an attacker to read emails from an Exchange server without authentication or accessing an individual’s email account. Critical security risk Further vulnerability chaining enables attackers to completely take over the mail server itself Further vulnerability chaining enables attackers to completely take over the mail server itself. Once an attacker takes over the Exchange server, they can open the network to the internet and access it remotely, posing a critical security risk for millions of organizations. "Compromised servers could enable an unauthorized attacker to extract your corporate emails and execute malicious code inside your organization with high privileges," commented Lotem Finkelsteen, Manager of Threat Intelligence at Check Point. "Organizations who are at risk should not only take preventive actions on their Exchange, but also scan their networks for live threats and assess all assets." Latest patched versions The good news is that only highly skilled and well-financed threat actors are capable of using the front door to potentially enter tens of thousands of organizations worldwide. While hacking the exchange server with zero days is quite impressive, the purpose of the attack and what cybercriminals wanted within the network is still unknown. Organizations who are at risk should not only take preventive actions on their Exchange, but also scan their networks for live threats and assess all assets. Check Point’s recommendation is that organizations immediately update all Microsoft Exchange Servers to the latest patched versions available by Microsoft. This update is not automatic and users are expected to perform it manually.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organizations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centers or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognize individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analyzing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognize. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the center of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
As the multi-billion-dollar market for artificial-intelligence-based video analytics continues to grow, so does the number of video analytics solution providers. In Q3 of 2018, Stockholm-based consulting company Memoori identified 128 active companies in the supply chain for AI video analytics [i]. This list is far from exhaustive, considering how analytics has been gaining interest and becoming mainstream in 2020, with users expecting more accurate alerts based on object detection instead of motion detection, hardware providers developing more powerful but compact chip sets for deployment, and more startup solution providers carving out their niche in the market. Given so many choices, the question arises as to how a system integrator can evaluate and select the best solution for his customer. Although the criteria vary for each vertical, there are some key metrics to consider across the field: Open platform Ease of use Robustness and reliable performance Versatility Good support and integration Low total cost of ownership 1. Open platform Open platform allows the user to have complete flexibility, avoid being locked into any particular manufacturer, and utilize the best-of-breed solution available in each category. Analytics has been gaining interest and becoming mainstream in 2020 In 2019, an IPVM survey shows that 51% of system integrators always prefer an open platform to an end-to-end solution (i.e., all components including camera, VMS, analytics, etc. provided by one manufacturer), and 24% select open platform or end-to-end depending on customer requirements [ii]. For analytics, as the users commonly have an existing infrastructure, investing in a technology overhaul would be too expensive. An open-platform analytics product, i.e., a camera-agnostic, VMS-agnostic, and computer-server-agnostic product, will add value to the existing infrastructure within a reasonable budget. Open platform also makes it easier and more cost-efficient to upgrade each component when necessary. 2. Ease of use One of the main reasons and goals of applying AI to security is to help the user automate the process of watching hours and hours of surveillance videos, extract useful information and send alerts when necessary. In other words, AI should make it easier for the user to operate the security system. Thus, a good AI video analytics solution must be easy to set up and connect to the existing infrastructure, easy to use on a daily basis, and easy to scale with the expansion of the business. Let us examine each point in more details: Easy to set up: a turn-key, plug-and-play solution helps save time and money. The system integrator can spend a couple of hours instead of days to help the customer set up. In both 2018 and 2020, the most common reason that integrators cited for choosing a solution is that “it just works” [iii][iv]. Easy to use: an intuitive, no-learning-curve user interface allows the customer to make the solution second-nature, maximize its utility and gets the highest return on investment. The best-case scenario is that everyone in the user’s organization, e.g., every police officer in a city police department, can use the solution on a daily basis, not limited to a technical staff with rigorous training. Easy to scale: the solution must be designed to seamlessly scale in different ways: number of cameras (e.g., from a few to a few thousands); deployment locations (e.g., can we access data in our branch office in another city? how about another country?); types of device and deployment (e.g., body-worn cameras, in-vehicle, control center, cloud). 3. Robustness and reliable performance Traditional VMD (video motion detection) -based analytics have many limitations and false alarms, so AI-based analytics were developed, primarily to identify different objects in the videos with high accuracy. However, such accuracy must be achievable in different real-life environments. The best solution does not let low lighting, snow and rain, spider crawling in front of the cameras, etc., interfere with human intrusion detection or license plate recognition at night. In the case of temperature detection, users should be able to walk by the system at a normal pace without removing the mask to minimize disruption and maximize worker efficiency. A more robust solution means less time and resource spent on false alarms. 4. Versatility A versatile, feature-rich, multi-functionality video analytics is the most effective choice for system integrators in the long term. Not limited to only object detection, AI can be trained to recognize higher levels of details (e.g., faces, age, gender, license plates), track objects (including people and vehicles), and detect certain behaviours (e.g., loitering, theft). In other words, a more versatile analytics solution can recognize more types and behaviors of objects for more use cases. Most users have certain pain points today and are looking for only one or a few solutions. However, as the organization grows, new situations and requirements may arise, which call for new detection functions in video analytics. The costs and complexity will add up quickly if each solution has only one function. A few examples: An LPR camera may be perfect for the need to record all license plates today, but if the police wants to find a black Toyota Prius with “A23” in the plate number, a solution that can detect the plate number, vehicle make and model will save much more time and effort. Intrusion detection based on the ability to distinguish human from other moving objects (e.g., animals) is only the first step. What if the user needs an alert for people that enter a construction zone without a hard hat and safety vest? The answer is an AI solution that can grow its repertoire. In the current pandemic, business must adopt temperature screening, distancing detection, occupancy detection, and mask detection; a solution that can provide all four analytics in one platform is clearly more useful than four individual solutions, not to mention whether the solution can be repurposed after the pandemic has been resolved. 5. Good support and good integration One of the main reasons that system integrators might select an end-to-end solution instead of an open-platform one is technical support: more responsiveness and less finger-pointing. In terms of responsiveness, good technical support is a part of the ease of use, where the system integrator and the user can rest assured that any question can be answer via email or a phone call to the manufacturer. A more robust solution means less time and resource spent on false alarms In terms of having a one-stop-shop solution to reduce finger-pointing, good support means the manufacturer can provide easy integration to 3rd-party systems, which includes API interface support. One example is access control. Video analytics is a great tool to enhance access security (e.g., face recognition to open doors for employees; LPR for parking management; weapon detection linked to automatic locked-down system), but only 24% of video surveillance systems today are integrated with access control [v]. Two of the main reasons: (1) integration is expensive, and (2) the systems are not compatible. Both hurdles can be overcome if the analytics solution bridges the gap between cameras and access control system via its API. 6. Low total cost of ownership These six criteria help both the system integrator and the end-user save time, money, and effort Cost is always a determining factor, especially in the SMB market [vi]. Customers’ expectations are high, and higher-resolution cameras are decreasing in price and increasing in numbers, which means more data to process than ever. A good analytic software solution is not only capable of many functions, its algorithms are efficient enough to fit more into the same server specs, and it does not require expensive cameras to have good accuracy, thereby increasing cost saving for the entire system. In summary, these six criteria help both the system integrator and the end-user save time, money, and effort and get the most out of video analytics in the long run. A high-performance, versatile, turnkey solution is already a reality with today’s technology, and it will only continue to improve, so there is no reason to settle for less. [i] Memoori, The Global Market for Intelligent Video Analytics 2018 to 2023, 2018 [ii] IPVM, Open vs. End-to-End System: Statistics 2019, November 11, 2019 [iii] John Honovich, IPVM, Favorite Video Analytic Manufacturers 2018, April 2, 2018 [iv] IPVM, Favorite Video Analytic Manufacturers 2020, February 25, 2020 [v] Brian Rhodes, IPVM, Access Control and Video Integration Statistics 2020, October 8, 2020. [vi] Brian Karas, IPVM, Low Cost, Low End Competitors Challenge SMB Surveillance Market, September 1, 2017
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Digital Barriers, a globally renowned provider of edge-intelligent surveillance and security technologies, reveals its collaboration with the Future Farms Cymru project, run by North Wales Police. Real-time surveillance solutions Digital Barriers has equipped a farm in North Wales with its real-time surveillance solutions, to demonstrate the role that sophisticated technologies can play in cutting the cost of rural crime, estimated by the National Farmers Union to have reached 54 million pounds in 2019. Rural areas and farmland can be inherently difficult environments to secure. However, Digital Barriers’ scalable and flexible solutions are designed to work in demanding conditions, such as remote and vulnerable locations. AI-based edge analytics Digital Barriers’ video streaming capability and AI-based edge analytics can provide reliable and secure monitoring Proven and trusted within the military and defense domain, Digital Barriers’ state-of-the-art video streaming capability and AI-based edge analytics can provide reliable and secure monitoring, thereby protecting people, places, and assets. The first technology being showcased as part of Future Farms Cymru project is a live streaming body worn camera for the enhanced protection of lone workers. If an incident occurs, the wearer can press the urgent assistance button, which transmits video and a live GPS location back to a designated monitoring center, providing immediate response. EdgeVis Shield The second is EdgeVis Shield, a combination of easy-to-deploy ground sensors that can be used to secure vast perimeters, including farmland containing high value assets. The autonomous system automatically detects when irregular behavior occurs around a perimeter, sending alerts and live video, if a trespasser or vehicle approaches. PC Dewi Evans of the North Wales Police Rural Crime Team commented on the announcement, “In recent years, we are increasingly seeing rural communities and businesses being targeted by criminals. Therefore, it is vital that rural businesses employ the right security methods to protect their assets. Criminals need to know that the farm they’re targeting could be equipped with this cutting-edge technology and they will be almost certainly caught.” Countering rise in rural crime Neil Hendry, Vice President EMEA at Digital Barriers, said, “I am happy that our technology is being used on the front line in the fight against rural crime. The COVID-19 pandemic has adversely affected businesses of all shapes and sizes, with farmers struggling to protect themselves against criminal activity.” Neil Hendry adds, “Future Farms Cymru is an important initiative, and we are delighted to be able help shape and support the future food and farming policy, with our robust video surveillance technology.”
Videosoft's adaptive low bandwidth video streaming technology has been selected and installed on the Mayflower Autonomous Ship (MAS), in order to help relay high-quality footage of the ship’s various missions, back to humans on land. On its maiden voyage this spring, the Mayflower Autonomous Ship will trace the route of the famous 1620 Mayflower ship, sailing from Plymouth, in the United Kingdom to Plymouth, in Massachusetts, USA. Only this time, there will be no human captain or crew on board, as the 15 meters, lightweight, hybrid-electric powered trimaran (multi-hull vessel) crosses the Atlantic Ocean. Real-time feedback and visuals Videosoft’s technology will help capture footage from the Mayflower's six onboard cameras at sea. Using satellite connectivity and compression technologies, footage will be transmitted back to AI developers and research scientists, providing them real-time feedback and visuals, during the mission. It will also be used to provide the media and public with updates about interesting events that occur during the ship’s ocean adventures. “The ability to receive live video feed from the ship using minimal communication bandwidth is a game changer for us,” said Don Scott, the Chief Technology Officer (CTO) of the Mayflower Autonomous Ship for Marine AI. Reliable monitoring of the live situation Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation" Don Scott adds, “Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation and give us confidence in the vehicle’s operation at sea. It has already been an invaluable tool during sea trials and we look forward to having the live feed during the voyage itself.” The international grassroots project is led by marine research organization, ProMare, alongside IBM, which is acting as both lead technology partner and lead scientific partner, with other key design and construction partners, including MSubs, Aluship (Aluship Technology) and Marine AI. AI Captain with computer vision technology With an AI Captain at the helm, MAS is able to operate for long distances and durations at sea collecting critical data about the ocean. Powered by IBM’s computer vision, automation, and machine learning technologies, the AI Captain maintains constant situational awareness and makes decisions about what to do next in line with collision regulations. Small, lightweight edge devices from NVIDIA provide local computer power for operational independence, relying on IBM Cloud connectivity when available. Cutting-edge video streaming solution Videosoft was selected for its cutting-edge video streaming solution and its ability to reliably stream video from onboard cameras and computer vision systems, which scan the horizon for hazards, as the Mayflower Autonomous Ship sails. Videosoft's software runs on IBM's platform, which skippers the vessel and is linked via satellite. Videosoft's Chief Executive Officer (CEO), Stewart McCone said, “This project is designed to transform humanity’s relationship with the ocean. To say we're totally thrilled to be involved in the Mayflower Autonomous Ship project would be an understatement.” Stewart McCone adds, “By working alongside innovative and specialist companies, who are experts in their field and have an intimate knowledge of what they are doing, Videosoft is enabling the ambitions of this multi-million-pound project. Streaming live video from ocean-going vessels is not straightforward and you really need to know what you're doing to pull it off successfully.” Intelligent transmission protocol An intelligent transmission protocol is required to maintain connectivity" He further stated, “An intelligent transmission protocol is required to maintain connectivity. In addition to switching between satellite and cellular networks, variable signal strength, the topography of network masts, atmospheric conditions, satellite capabilities, speed, and variables all impact the available bandwidth.” Stewart McCone said, “Videosoft, which has developed software specifically for the satellite and cellular industry, to negate the typical issues that arise when using such networks, has made it possible to have eyes on the ocean 24/7. The unique protocols that the Videosoft team has built into our software mean that any video delay from the Mayflower will be dramatically reduced, with any streamed video automatically adapting to the amount of available bandwidth, while retaining good quality.” Real-time situational awareness Stewart continues, “Even in our knowledge-rich industry, not many people realize that this can be done, but it can and is relatively simple to put in place, thanks to our easy-to-use software platform. As with CCTV, IoT and surveillance applications, Videosoft's ability to provide reliable video streams creates a real-time situational awareness that is critical to the operational success of projects, such as the Mayflower Autonomous Ship.” He further adds, “The Videosoft vision has always been to get involved in pioneering projects, such as the Mayflower and serves to underpin Videosoft's mission statement of deploying technology to solve real-world problems at the highest global level, using video and remote services, to make the world be a better, safer place. We're showing that this specialist tech does exist and that we can enable all Internet of Things (IoT) applications for the common good. If that interests you, come and talk to us.”
The MiQro Innovation Collaborative Centre (C2MI), the largest electronics systems research and development center in Canada, has announced that they recently selected Honeywell for its new thermal screening and risk self-assessment process, at its Bromont, Quebec location, to better sustain operations and to help improve the well-being of building occupants and visitors. Thermal cameras installed C2MI is an internationally known micro-electronics research center that requires 24/7 laboratory access for its team and collaborators. The COVID-19 pandemic challenged its standard operations and ability to provide laboratory access, while limiting potential virus exposure. Honeywell worked with C2MI to install a thermal camera solution to screen elevated skin temperatures and risk self-assessment, in order to streamline building access control, without the need for human interaction. Healthy Building Kiosk thermal sensors Using AI, the Healthy Building Kiosk thermal sensor monitors for trends and leverages variables Using artificial intelligence (AI), the Healthy Building Kiosk thermal sensor monitors for trends and leverages variables, such as the outdoor temperature to provide more accurate readings. If an elevated skin temperature is detected, the staffer or visitor is referred for testing, before being authorized access to the center. The solution allows C2MI security staff to focus on other critical tasks and gives building users shared accountability. C2MI and Honeywell collaboration C2MI and Honeywell are continuously working to refine the technology, in order to create a more efficient and safer access control. C2MI will see a return on investment in less than one year, when calculating the cost of a security personnel dedicated to managing staff access control. “We’ve worked with C2MI to create a custom solution to improve the efficiency of building access and support a return to more normal operations,” said Laura Laltrello, Vice President and General Manager of North America services for Honeywell Building Technologies. 24/7 operations simplified Laura Laltrello adds, “With the implementation of the new Healthy Building Kiosk at the entrance, C2MI’s 24/7 operations are simplified, while allowing the security staff to focus on other critical tasks. We’ve also deployed a continuous improvement process with C2MI to refine the solution to best suit its needs and manage issues such as queuing.” “As a center of collaboration and innovation, C2MI faced two challenges in the past year: the ability to sustain operations, while also taking steps to help make our staff and researchers safer,” said Marie-Josée Turgeon, General Manager for C2MI. Streamlining building access control Our collaboration with Honeywell has allowed us to streamline building entry" Marie-Josée Turgeon adds, “Our collaboration with Honeywell has allowed us to streamline building entry and remove the semi-manual process of individuals’ skin temperature reading, to help provide a safer environment for our teams.” C2MI also implemented health protocols aligned with local guidelines and recommendations, such as a work-from-home (WFH) policy, limiting the number of people in the cafeteria and conference rooms, encouraging social distancing, optimizing disinfecting and cleaning, as well as mandatory procedural mask wearing. Honeywell Healthy Buildings solutions Honeywell’s Healthy Building solutions are part of a comprehensive effort to quickly develop innovative solutions that will help critical sectors of the global economy to recover, without the need to replace existing infrastructure at high costs. Honeywell’s Healthy Building solutions also provide a holistic view of a building’s health, based on the key factors, such as indoor air quality (IAQ), occupant flow, personal protective equipment (PPE) analytics, thermal screening, skin temperature monitoring, social distancing and sanitation efficacy.
Meeting a challenge is what business is all about. Challenges are beneficial to any company, providing a valuable learning opportunity and a means to demonstrate expertise, skill, and an approach to solving a problem in a unique or innovative way. Working in partnership with Oslo Airport to install the RTT110 EDS system presented Rapiscan Systems with not just one, but two unique challenges. Challenges faced by Rapiscan The first was creating a proprietary water cooling system that worked in tandem with the airport’s green initiatives, and the second a ‘Level 4’ review option running in parallel to the traditional baggage screening process. Both would be challenges enough for a well-established technology, but the Oslo Airport project came at a formative time in the RTT’s history. A key step for RTT110 “We had a machine that was very much in its infancy, that still had its fair share of teething problems,” explains Craig Chitty, Head of International Aviation Programmes. “It was a big undertaking at a very early stage of our experience installing the RTT out in the field.” Steve Revell, Senior Director of Aviation CT at Rapiscan explains that the Oslo Airport project was a key step for the RTT. “The first major airport in Western Europe to take on the RTT was Oslo Airport. It’s a very prestigious and forward-thinking airport, and the operators were not afraid to take pioneering risks.” Eco-friendly system Rapiscan's water-cooling solution would allow the RTT to integrate with Oslo’s eco-friendly concept The standard throughout the industry is for EDS and baggage scanning systems to employ Air Conditioning to cool machinery and manage the thermal load. However, as a result of Oslo Airport’s commitment to environmentally responsible construction (the first Oslo Airport terminal was considered the greenest in the world at the time construction finished in 2017), Rapiscan was tasked with designing an entirely unique water-cooling solution that would allow the RTT to integrate with Oslo’s eco-friendly concept of operations – to think outside the ‘cooling box’. “The curveball was that ordinarily, you would use air conditioning, but Oslo wanted to use chilled water to help reduce carbon emissions,” Steve Revell explains. Integrating water cooling system This was a challenge that sent the Rapiscan design team back to the drawing board, as Craig Chitty recalls. “We had to work with our supplier to come up with a solution that met the airport’s requirement to use reclaimed snow, which is melted down and pumped around the airport. We had to design a method of integrating this water cooling concept into our system, meeting some very stringent criteria that the airport set.” “It was incredibly challenging because the original design of these water-cooled AC’s needed a specific pressure and temperature, which the airport couldn’t provide us with as their supply fluctuated too much. We had to go back to the drawing board, to redesign our system to make it more robust.” World’s first RTT system Rapiscan's flexible RTT technology became the world's first such technology This innovation put Rapiscan at the forefront of flexible RTT technology, resulting in a world-first; “To this day we are the only company who can provide the RTT as an externally water-cooled system, or an internally cooled air-conditioned system,” Steve Revell summarises. This example of NRE, or ‘Non-Recurring Engineering’, was not the only instance of Rapiscan’s commitment to working alongside partners to develop bespoke solutions to the challenges of each application. Oslo not only necessitated an original approach in terms of product design but also process implementation – recurrent Level 4 image analysis. Security screening for baggage As baggage travels through an airport, it is subjected to multiple levels of security screening and imaging, both by human operators and computer algorithms. Baggage that is deemed to contain a potential security threat is escalated to higher levels of scrutiny by multiple operators, balancing the consistent throughput of baggage and passengers against ensuring constant levels of safety. Oslo required an extra level added to the normal ‘flow’ of screening. “If a bag is rejected by a Level 3 operator it goes into a Level 4 area within the BHS (Baggage Handling System) of the airport”, explains Craig Chitty. “It shows up on a screen. It is a concept of operations that we don’t employ in any other airport even now; it is still very unique to Oslo.” Concept of operations Rapiscan’s Director of Business Development for EDS, Martin Zborovjan, explains further, “We had to do some development to allow that concept of operations to happen. They decided they wanted to re-screen baggage for a second time using the same machine.” “Usually this would rely on a machine decision, but in this case but the operator sees the second image automatically, right next to the image from the first screening, and the machine does not make a decision. It’s a very unusual concept.” Benefits of Level 4 function The Level 4 function enabled processing bags more quickly and more correctly Steve Revell is quick to identify the benefits the Level 4 function provides both the airport and the passengers, “We were the first to establish a Level 4 system in Oslo. If technology is able to produce a machine decision very quickly, and if that’s a reject decision to get that image off to an operator very quickly, the only two things it can do are to process bags more quickly and more correctly.” “By default, more bags are getting onto the right airplane, people are standing in queues for less time and the airside customer experience is much improved.” Going an extra mile While many companies will consider a project as ‘job done' when equipment is installed and running, for the Rapiscan team the Oslo project was a committed partnership from the initial tender phase, through the design process, and on into the future. “Oslo was effectively our first competitive tender,” Martin Zborovjan explains. “We were willing to listen to Oslo and to go the extra mile. This behavior was the underlying theme of the interaction with Oslo”. The project was more than just a sales opportunity; “Complex projects allow us to learn something.” Forming a partnership The working partnership between Rapiscan and Oslo is something Steve Revell is very proud of. “It [was] and is a very long-established partnership; from the start of engaging with us at contract award, through to going operationally live was just under three years,” he explains. “There was lots of testing, analysis, and development, lots of joint agreements with the government. We agreed on the final solution which we very much wanted to do as a partnership.” Delivering a successful project “There were also problems, which gave us an opportunity to showcase our most important tool which is how we behave when things are going wrong. We never shied away from our responsibilities, we took every problem presented to us and worked together to find the solution.” “A strong working partnership developed; we were always on the end of a phone with the Oslo team, or on a plane for face-to-face meetings. This partnership continues today and is the backbone to delivering this complex but successful project,” Revell summarises. Adopting new technology The aviation industry thrives on partnerships, on service providers working to meet challenging requirements through innovation and cooperation. Taking a technology that was, at the time, still in its infancy and working to adapt this technology to a stringent set of requirements is a clear example of Rapiscan’s dedication to working with its partners – a commitment the company makes to every project, both now and into the future.
Essence SmartCare, part of global IoT solutions provider, Essence Group, has announced that ADT Security Australia, a globally renowned provider of security monitoring services, has selected its Care@Home Enhanced Telecare Services platform to expand ADT’s Health and Wellness services offering in Australia. Care@Home solution ADT Security Australia is part of Johnson Controls, the global company in smart, healthy and sustainable building solutions. This partnership was facilitated in conjunction with, HSC Technology Group. It will enable ADT to enhance its senior care offerings in Australia by providing a new range of assistive services through Essence’s Care@Home solution, under the banner of ADT Home Assure. The rollout of Essence’s technologies will allow ADT Security Australia to offer breakthrough telecare services to seniors using state-of-the-art technology and utilizing the LTE network. Enhancing senior care offerings This announcement comes as the senior population is set to grow rapidly in Australia, with the proportion of seniors who are over the age of 75 to grow from 33% to 55% in the next 30 years and annual revenue for home-based care and services of around $ 4.5 billion AUD (Australian Dollar). “We are honored to be joining forces with ADT Security Australia, one of the largest security and safety solutions providers, to enable them to provide the best care and protection to Australian seniors,” said Barak Katz, General Manager for Essence SmartCare. Unified telehealth and care platform Our unified telehealth and care platform enables monitoring at any level" Barak Katz adds, “Our unified telehealth and care platform enables monitoring at any level and through any type of caring device for a wide range of health conditions, both at home or on-the-go, all through one connected Care@Home smart platform.” Essence SmartCare’s award-winning Care@Home platform is an aging-in-place product suite, providing seamless health monitoring solutions that enable seniors to live independent lives, while also providing their families with peace of mind. Leveraging deep AI capabilities Leveraging a variety of advanced technologies, including deep AI capabilities, to ensure the safety of seniors, the platform comprises an integrated suite of services, including continuous monitoring of daily activities, advanced fall detection, and voice-activated alerts to facilitate real-time communication with caregivers and emergency services providers. “At ADT Asia Pacific, our mission is to protect the lives of our customers and their assets across the region by providing the highest quality solutions and services leveraging best-in-class partners,” said David Kirubi, Vice President of ADT Asia Pacific. David Kirubi adds, “Essence’s Care@Home solution presents a substantive and unique industry value proposition in enabling this mission, for the benefit of our customers, while ensuring peace of mind for their loved ones and caregivers.”
HID Global, a globally renowned company in trusted identity solutions, has announced that the American School of Guatemala has selected its Seos credential technology to modernize its physical access system. Enhanced campus security The solution significantly improves campus security and traffic efficiency for students and parents, along with enabling staff to easily issue and manage access credentials. “We’ve significantly improved the management of vehicle traffic by reducing the time it takes for parents to access the parking lot. We’ve been able to improve evacuation and emergency processes for our students and staff,” said a spokesperson for the Security Office, American School of Guatemala. Seos credential technology The spokesperson adds, “And, best of all, we have an automated system to manage the entry and exit times of our employees to know where everyone is located on our large campus.” The American School of Guatemala is a private K-12 college preparatory school in Guatemala City, Guatemala. The school partnered with local security integrator, Grupo RQM and HID Global to replace its legacy system, which consisted of written documentation and fingerprint logs. HID readers installed at access points The new system includes HID readers installed at pedestrian and vehicle access points The new system includes HID readers installed at pedestrian and vehicle access points and 1,500 Seos smart cards issued to students, parents and staff. In addition to automating and streamlining access to the school’s buildings, the solution has led to a reduction in the average student drop-off time from 40 to 18 minutes. The school also launched a pilot with HID Mobile Access to allow secure access to the school’s parking lot via mobile IDs stored on smartphones. To gain entry, users simply drive up and hold their mobile phone to a reader, an important feature since most students travel in bulletproof armored vehicles that lack the ability to lower windows. Upgraded security and authentication solutions “The American School of Guatemala’s access control system has all the hallmarks of HID’s industry-renowned security and authentication solutions,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. Harm Radstaak adds, “From flexibility and security to ease-of-use, HID’s unique combination of forward-looking technology and intuitive design helps create a robust solution that fortifies the school’s campuses and elevates the user experience.” Due to the successful deployment, school officials plan to replace its traditional key system with Seos smart cards for additional use cases, such as library and student payment services.
Round table discussion
Security technology has been a vibrant and successful market for decades now, but sometimes the public is not aware of those successes. Awareness in some cases is limited because security technologies work ‘behind the scenes’ to keep everyone safe. In other cases, the industry may be seen in a negative light, based on misinformation about topics such as surveillance and privacy. How can we get the word out about our industry’s successes? We asked this week’s Expert Panel Roundtable: How can the security industry market and promote itself better?
Artificial intelligence (AI) and machine learning have made a big splash in the physical security market, transforming video analytics to a new level of accuracy. In fact, the terms have become common buzzwords throughout the industry. However, the potential for AI and machine learning to impact the physical security industry goes far beyond their ability to improve video analytics. We asked this week’s Expert Panel Roundtable: Beyond better video analytics, how can artificial intelligence (AI) and/or machine learning benefit the physical security market?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload